Solved

SCP from AIX to Solaris, Solaris to Windows and AIX to Windows

Posted on 2006-11-18
1
1,059 Views
Last Modified: 2013-12-21
Hello All,

Normally we can do scp and ssh between any 2 solaris machines with the use of passwd by exchanging Public/Private keys for the IDs that we use.

How do we do this between

1. An AIX and a Solaris machine both ways. Is the procedure same? Can you please explain in detail?
2. How do we do this between a Solaris and Windows machine? Normally in Solaris the public key will be stored in /export/home/<ID name>/.ssh directory in a file "authorize_keys2" file. Where will this be stored in a Windows environment.
3. Do we need to run any processes in windows for scp/ssh in windows. Any daemons to be run in Solaris machine.
4. Do we need run any daemons in AIX for AIX and what is the process between AIX and Windows.
5. Is SSH/SCP a separate software installed or does it come as a part of Solaris or AIX installation. I think we need to install separately for Windos.
6. Port 22 need to be opened in case of a firewall. Apart fromt this do we need to do anything more.

Please let me know in detail as we are in the process of setting up the same.

Thanks.

Regards.
Hari.
0
Comment
Question by:rharivenkatesh
1 Comment
 
LVL 48

Accepted Solution

by:
Tintin earned 250 total points
ID: 17973889
1.  The procedure should be the same between AIX and Solaris depending on exactly what ssh servers you are running.
2.  The key is stored in the equivalent Windows home directory.  This very much depends on what ssh server you are running on Windows.  
3.  If you want to ssh/scp to the Windows server, then you will need a ssh server running on the Windows box.
4.  No ssh daemons are need to ssh from a server.  The ssh server is for processing incoming connections.
5.  ssh is standard with all recent versions of Solaris and AIX.  For Windows, you'll need to install a SSH server.
6.  You only need port 22 and nothing else.
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

When you do backups in the Solaris Operating System, the file system must be inactive. Otherwise, the output may be inconsistent. A file system is inactive when it's unmounted or it's write-locked by the operating system. Although the fssnap utility…
Using libpcap/Jpcap to capture and send packets on Solaris version (10/11) Library used: 1.      Libpcap (http://www.tcpdump.org) Version 1.2 2.      Jpcap(http://netresearch.ics.uci.edu/kfujii/Jpcap/doc/index.html) Version 0.6 Prerequisite: 1.      GCC …
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now