标签:-o name 虚拟机 实现 tool false process vpd ide
克隆虚拟机关闭虚拟机
#shutdown -h now
虚拟机创建完成,开启克隆的虚拟机,修改ip地址
#vi /etc/sysconfig/network-scripts/ifcfg-ens33
#systemctl restart network.service #ifconfig ens33 #hostnamectl set-hostname apenglinux-002 #exit
退出重新登陆,发现主机名已经改为apenglinux-002,主机名已经写入到了配置文件/etc/hostname当中了
用Xshell连接apenglinux-001,apenglinx-002,在apenglinux-001上登陆到apenglinux-002上
[root@apenglinux-001 ~]# ssh -p 22 root@192.168.221.20 [root@apenglinux-002 ~]# ssh -p 22 root@192.168.221.10
这样就实现了Linux机器相互登录了
在apenglinux-001上用私钥连接apenglinux-002
在apenglinux-001生成密钥对
[root@apenglinux-001 ~]# ssh-keygen Generating public/private rsa key pair. Enter file in which to save the key (/root/.ssh/id_rsa): Enter passphrase (empty for no passphrase): Enter same passphrase again: Your identification has been saved in /root/.ssh/id_rsa. Your public key has been saved in /root/.ssh/id_rsa.pub. The key fingerprint is: SHA256:cT+xqNoVvKkiE/hwWKgKXdzFoM/isiil+oHWaDivJ2Q root@apenglinux-001 The key's randomart image is: +---[RSA 2048]----+ | .o | | . o | | o.. .. . . | | . +o. + o o | | o =. o S + + | |+EO.o. . + . | |O*o=.. . + | |B+.++ .o o | |*=+ o..o | +----[SHA256]-----+
将公钥存入到apenglinux-002:~/.ssh/authorized_keys文件中
[root@apenglinux-002 ~]# vi .ssh/authorized_keys
[root@apenglinux-002 ~]# setenforce 0
在 apenglinux-001中登陆到apenglinux-002中
[root@apenglinux-001 ~]# ssh -p 22 root@192.168.221.20 Enter passphrase for key '/root/.ssh/id_rsa': Last login: Tue Jan 30 10:59:00 2018 from 192.168.221.10 [root@apenglinux-002 ~]#
登陆成功
标签:-o name 虚拟机 实现 tool false process vpd ide
原文地址:http://blog.51cto.com/13480443/2066722