Solved

Port ssh and port rsysc are different

Posted on 2016-10-27
2
125 Views
Last Modified: 2016-10-28
Hi Experts,

I want to use rsysc to send file.
How to config rsysc & ssh with this topology?
 Rsysc.jpg
Help me please.


Thanks.
0
Comment
Question by:ldvhai
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 78

Accepted Solution

by:
arnold earned 500 total points
ID: 41862838
not sure what you are asking, when you configure rsync you would specify the ports for the rsync.
If you use rsync over/within an ssh tunnel, you do the same.

If you setup an ssh tunnel from the server root you would use the -L to setup the local tunnel to remote
so 1245:localhost:1415
1245 local
localhost (is the remote server reference)
1415

This means that rsync to the localhost:1245 will reach the rsync server on the remote server.
If your SSH server is a termination point,
you would use
-L 1245:server1:1415 -L 1246:server2:1415 -L 1247:servern:1415
this will mean
Server root's rsync  connecting to localhost ports 1245, will end up reaching server1 port 1415

You effectively using ssh as the VPN tunnel to each destination.
and you can only initiate data transfer in both directions from server Root.]

Server root to fileserver SSH tunnel
Server toot to Server1-n SSH tunnel if you can centralize on one server and tunnel to the rest through it( sshd.conf has to have forwarding enabled/allowed/permitted) server1-n will see the traffic as coming from the server to which server root establishes the ssh tunnel in those cases.
0
 
LVL 62

Expert Comment

by:gheist
ID: 41862871
Nowadays (like since 2010) rsync defaults to SSH tunnel and does not need any port.
0

Featured Post

Defend Your Organization from The Greatest Threats

Looking to fill the gaps in your security? Bring together information from the network, endpoint and threat intelligence feeds to really see what's happening in your organization. Join the WatchGuardians in their adventures fighting cyber crime!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article describes my battle tested process for setting up delegation. I use this process anywhere that I need to setup delegation. In the article I will show how it applies to Active Directory
Many old projects have bad code, but the budget doesn't exist to rewrite the codebase. You can update this code to be safer by introducing contemporary input validation, sanitation, and safer database queries.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

737 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question