Book Image

Red Hat Enterprise Linux 8 Essentials

By : Neil Smyth
1 (1)
Book Image

Red Hat Enterprise Linux 8 Essentials

1 (1)
By: Neil Smyth

Overview of this book

Red Hat Enterprise Linux 8 is one of the most secure and dependable operating systems available. For this reason, the ambitious system or network engineer will find a working knowledge of Red Hat Enterprise 8 to be an invaluable advantage in their respective fields. This book, now updated for RHEL 8.1, begins with a history of Red Enterprise Linux and its installation. You will be virtually perform remote system administration tasks with cockpit web interface and write shell scripts to maintain server-based systems without desktop installation. Then, you will set up a firewall system using a secure shell and enable remote access to Gnome desktop environment with virtual network computing (VNC). You’ll share files between the Red Hat Enterprise Linux 8 (RHEL 8) and Windows System using Samba client and NFS. You will also run multiple guest operating systems using virtualization and Linux containers, and host websites using RHEL 8 by installing an Apache web server. Finally, you will create logical disks using logical volume management and implement swap space to maintain the performance of a RHEL 8 system. By the end of this book, you will be armed with the skills and knowledge to install the RHEL 8 operating system and use it expertly.
Table of Contents (32 chapters)
32
Index

15.6 Establishing a Secure Remote Desktop Session

The remote desktop configurations we have explored so far in this chapter are considered to be insecure because no encryption is used. This is acceptable when the remote connection does not extend outside of an internal network protected by a firewall. When a remote session is required over an internet connection, however, a more secure option is needed. This is achieved by tunneling the remote desktop through a secure shell (SSH) connection. This section will cover how to do this on Linux, UNIX and macOS client systems.

The SSH server is typically installed and activated by default on RHEL 8 systems. If this is not the case on your system, refer to the chapter entitled “Configuring SSH Key-based Authentication on RHEL 8”.

Assuming the SSH server is installed and active it is time to move to the other system. At the other system, log in to the remote system using the following command, which will establish the...