Solved

SCP from AIX to Solaris, Solaris to Windows and AIX to Windows

Posted on 2006-11-18
1
1,065 Views
Last Modified: 2013-12-21
Hello All,

Normally we can do scp and ssh between any 2 solaris machines with the use of passwd by exchanging Public/Private keys for the IDs that we use.

How do we do this between

1. An AIX and a Solaris machine both ways. Is the procedure same? Can you please explain in detail?
2. How do we do this between a Solaris and Windows machine? Normally in Solaris the public key will be stored in /export/home/<ID name>/.ssh directory in a file "authorize_keys2" file. Where will this be stored in a Windows environment.
3. Do we need to run any processes in windows for scp/ssh in windows. Any daemons to be run in Solaris machine.
4. Do we need run any daemons in AIX for AIX and what is the process between AIX and Windows.
5. Is SSH/SCP a separate software installed or does it come as a part of Solaris or AIX installation. I think we need to install separately for Windos.
6. Port 22 need to be opened in case of a firewall. Apart fromt this do we need to do anything more.

Please let me know in detail as we are in the process of setting up the same.

Thanks.

Regards.
Hari.
0
Comment
Question by:rharivenkatesh
1 Comment
 
LVL 48

Accepted Solution

by:
Tintin earned 250 total points
ID: 17973889
1.  The procedure should be the same between AIX and Solaris depending on exactly what ssh servers you are running.
2.  The key is stored in the equivalent Windows home directory.  This very much depends on what ssh server you are running on Windows.  
3.  If you want to ssh/scp to the Windows server, then you will need a ssh server running on the Windows box.
4.  No ssh daemons are need to ssh from a server.  The ssh server is for processing incoming connections.
5.  ssh is standard with all recent versions of Solaris and AIX.  For Windows, you'll need to install a SSH server.
6.  You only need port 22 and nothing else.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

I have been running these systems for a few years now and I am just very happy with them.   I just wanted to share the manual that I have created for upgrades and other things.  Oooh yes! FreeBSD makes me happy (as a server), no maintenance and I al…
Java performance on Solaris - Managing CPUs There are various resource controls in operating system which directly/indirectly influence the performance of application. one of the most important resource controls is "CPU".   In a multithreaded…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

24 Experts available now in Live!

Get 1:1 Help Now