Solved

Port ssh and port rsysc are different

Posted on 2016-10-27
2
111 Views
Last Modified: 2016-10-28
Hi Experts,

I want to use rsysc to send file.
How to config rsysc & ssh with this topology?
 Rsysc.jpg
Help me please.


Thanks.
0
Comment
Question by:ldvhai
2 Comments
 
LVL 77

Accepted Solution

by:
arnold earned 500 total points
ID: 41862838
not sure what you are asking, when you configure rsync you would specify the ports for the rsync.
If you use rsync over/within an ssh tunnel, you do the same.

If you setup an ssh tunnel from the server root you would use the -L to setup the local tunnel to remote
so 1245:localhost:1415
1245 local
localhost (is the remote server reference)
1415

This means that rsync to the localhost:1245 will reach the rsync server on the remote server.
If your SSH server is a termination point,
you would use
-L 1245:server1:1415 -L 1246:server2:1415 -L 1247:servern:1415
this will mean
Server root's rsync  connecting to localhost ports 1245, will end up reaching server1 port 1415

You effectively using ssh as the VPN tunnel to each destination.
and you can only initiate data transfer in both directions from server Root.]

Server root to fileserver SSH tunnel
Server toot to Server1-n SSH tunnel if you can centralize on one server and tunnel to the rest through it( sshd.conf has to have forwarding enabled/allowed/permitted) server1-n will see the traffic as coming from the server to which server root establishes the ssh tunnel in those cases.
0
 
LVL 62

Expert Comment

by:gheist
ID: 41862871
Nowadays (like since 2010) rsync defaults to SSH tunnel and does not need any port.
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Here are the five steps I suggest to every sysadmin to fix the fall-out from a security breach.
One of the biggest threats in the cyber realm pertains to advanced persistent threats (APTs). This paper is a compare and contrast of Russian and Chinese APT's.
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

786 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question