?
Solved

Port ssh and port rsysc are different

Posted on 2016-10-27
2
Medium Priority
?
150 Views
Last Modified: 2016-10-28
Hi Experts,

I want to use rsysc to send file.
How to config rsysc & ssh with this topology?
 Rsysc.jpg
Help me please.


Thanks.
0
Comment
Question by:ldvhai
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 79

Accepted Solution

by:
arnold earned 2000 total points
ID: 41862838
not sure what you are asking, when you configure rsync you would specify the ports for the rsync.
If you use rsync over/within an ssh tunnel, you do the same.

If you setup an ssh tunnel from the server root you would use the -L to setup the local tunnel to remote
so 1245:localhost:1415
1245 local
localhost (is the remote server reference)
1415

This means that rsync to the localhost:1245 will reach the rsync server on the remote server.
If your SSH server is a termination point,
you would use
-L 1245:server1:1415 -L 1246:server2:1415 -L 1247:servern:1415
this will mean
Server root's rsync  connecting to localhost ports 1245, will end up reaching server1 port 1415

You effectively using ssh as the VPN tunnel to each destination.
and you can only initiate data transfer in both directions from server Root.]

Server root to fileserver SSH tunnel
Server toot to Server1-n SSH tunnel if you can centralize on one server and tunnel to the rest through it( sshd.conf has to have forwarding enabled/allowed/permitted) server1-n will see the traffic as coming from the server to which server root establishes the ssh tunnel in those cases.
0
 
LVL 62

Expert Comment

by:gheist
ID: 41862871
Nowadays (like since 2010) rsync defaults to SSH tunnel and does not need any port.
0

Featured Post

Why Off-Site Backups Are The Only Way To Go

You are probably backing up your data—but how and where? Ransomware is on the rise and there are variants that specifically target backups. Read on to discover why off-site is the way to go.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A look at what happened in the Verizon cloud breach.
This article is written by John Gates, CISSP. Gates, the SNUG President-Elect, currently holds the position of Manager of Information Systems at Lake Park High School in Roselle, Illinois.
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Suggested Courses

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question