Solved

Port ssh and port rsysc are different

Posted on 2016-10-27
2
97 Views
Last Modified: 2016-10-28
Hi Experts,

I want to use rsysc to send file.
How to config rsysc & ssh with this topology?
 Rsysc.jpg
Help me please.


Thanks.
0
Comment
Question by:ldvhai
2 Comments
 
LVL 77

Accepted Solution

by:
arnold earned 500 total points
ID: 41862838
not sure what you are asking, when you configure rsync you would specify the ports for the rsync.
If you use rsync over/within an ssh tunnel, you do the same.

If you setup an ssh tunnel from the server root you would use the -L to setup the local tunnel to remote
so 1245:localhost:1415
1245 local
localhost (is the remote server reference)
1415

This means that rsync to the localhost:1245 will reach the rsync server on the remote server.
If your SSH server is a termination point,
you would use
-L 1245:server1:1415 -L 1246:server2:1415 -L 1247:servern:1415
this will mean
Server root's rsync  connecting to localhost ports 1245, will end up reaching server1 port 1415

You effectively using ssh as the VPN tunnel to each destination.
and you can only initiate data transfer in both directions from server Root.]

Server root to fileserver SSH tunnel
Server toot to Server1-n SSH tunnel if you can centralize on one server and tunnel to the rest through it( sshd.conf has to have forwarding enabled/allowed/permitted) server1-n will see the traffic as coming from the server to which server root establishes the ssh tunnel in those cases.
0
 
LVL 61

Expert Comment

by:gheist
ID: 41862871
Nowadays (like since 2010) rsync defaults to SSH tunnel and does not need any port.
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

How important is it to take extra precautions to protect your online business? These are some steps you can take to make sure you're free of any cyber crime.
In 2017, ransomware will become so virulent and widespread that if you aren’t a victim yourself, you will know someone who is.
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now