Summary
In this chapter, we covered SSH and how to use it to connect to remote systems, how to use keys to authenticate with or without a password, and how to take advantage of it for automation, transferring files, and even making services accessible or reachable via port redirection. With tmux
, we learned how to make our administration sessions survive network interruptions and at the same time, show important information at a glance by automating the layouts for it.
In the next chapter, we'll be digging into securing our system network via firewalld to only expose the services that are required for operation.