If you need to manage a Solaris 10 box with a minimal install, and SSH is not available, you can install it off of the 2nd CD. Rather than figure out the path to your CDROM (see this article), it was easier in our case to just tar up the needed packages and FTP them to our Solaris box:
root@srv-3 Product # cp -R SUNWsshcu SUNWsshdr SUNWsshdu SUNWsshr
SUNWsshu /home/srv-1/sshpkg/
root@srv-3 Product # cd /home/srv-1/sshpkg/
root@srv-3 sshpkg # ls
SUNWsshcu SUNWsshdr SUNWsshdu SUNWsshr SUNWsshu
root@srv-3 sshpkg # tar -cf ../ssh.tar *
root@srv-3 sshpkg # tar -tf ../ssh.tar
SUNWsshcu/
SUNWsshcu/archive/
.
.
.
SUNWsshu/reloc/
SUNWsshu/reloc/usr/
SUNWsshu/reloc/usr/bin/
SUNWsshu/reloc/usr/lib/
SUNWsshu/reloc/usr/lib/ssh/
root@srv-3 sshpkg #
|
On the Solaris side, FTP these to /tmp, then from tmp:
tar -xf ssh.tar
pkgadd -d .
svcadm enable ssh
svcadm restart ssh
|
vi /etc/ssh/sshd_config
....
# Are root logins permitted using sshd.
# Note that sshd uses pam_authenticate(3PAM) so the root (or any other) user
# maybe denied access by a PAM module regardless of this setting.
# Valid options are yes, without-password, no.
PermitRootLogin yes
....
分享到:
相关推荐
New Oracle Solaris 10 Zone Clusters allow customers to consolidate mission critical Oracle Solaris 10 applications on Oracle Solaris 11 cloud environments. Expanded disaster recovery operations using ...
1.2.1 Installing Solaris on a SPARC System 6 1.2.2 Installing Solaris on an x86 System 9 1.3 Solaris JumpStart Installation 13 1.3.1 Setting up a JumpStart Server 13 1.3.2 Creating a Pro?le Server for...
Towards A Novel Architecture for Enabling Interoperability Amongst Multiple Blockchains论文笔记
Enabling network-layer security on IPv6 Wireless Sensor NetworksEnabling network-layer security on IPv6 Wireless Sensor Networks
Agile Application Security Enabling Security in a Continuous Delivery Pipeline 英文epub 本资源转载自网络,如有侵权,请联系上传者或csdn删除 本资源转载自网络,如有侵权,请联系上传者或csdn删除
Agile Application Security Enabling Security in a Continuous Delivery Pipeline 英文无水印pdf pdf所有页面使用FoxitReader和PDF-XChangeViewer测试都可以打开 本资源转载自网络,如有侵权,请联系上传者或...
Agile Application Security Enabling Security in a Continuous Delivery Pipeline 英文azw3 本资源转载自网络,如有侵权,请联系上传者或csdn删除 本资源转载自网络,如有侵权,请联系上传者或csdn删除
A Method Enabling Feasible Conformance Test Sequence Generation for EFSM Models 继续是IEEE协会研究成果
In particular, we identify a range of application fields, showing how it constitutes a universal enabling technology for both smart vehicles and cooperative systems, and naturally sets out a program ...
嵌入推理在ARM架构的实现案例Enabling Embedded Inference Engine with the ARM Compute Library A Case Study.pdf
The Handbook on Ontologies provides a comprehensive overview of the current status and future prospectives of the field of ontologies considering ontology languages, ontology engineering methods, ...
PRISM: Enabling Personal Verification of Code Integrity, untampered execution, and Trusted I/O on legacy systems. One in the seriese of work by Mark Ryan on trusted computing.
A powerful flow control component enabling reli-Sentinel
University of Oulu 写的6G通信白皮书,详细介绍未来6G通信面临的机会和挑战。
Chapter 1, Installing Magento 2 on Apache and NGINX, is a totally different ballgame compared to Magento 1. Where Magento 1 could be installed through FTP or SSH, Magento 2 is installable only via the...
ALE configuration There are two company(A and B) in one sap system, after create a purchase order in compay A, automatic crate a sales order in company B through by ALE.
Enabling ABAP in Eclipse
Hardware verification engineers often run bare-metal tests to verify core-related function in a System on Chip (SoC). However, it can be challenging to write boot code for a bare-metal system, without...
Chapter 1, Installing Magento 2 on Apache and NGINX, is a totally different ballgame compared to Magento 1. Where Magento 1 could be installed through FTP or SSH, Magento 2 is installable only via the...