SlideShare a Scribd company logo
www.glcnetworks.com
UP and RUNNING
SSH service
GLC collaboration webinar,
9 nov 2021
Achmad Mardiansyah
M. Taufik nurhuda
1
Source: wikipedia.com
www.glcnetworks.com
Agenda
● Introduction
● Review prerequisite knowledge
● SSH application
● SSH implementation
● Q & A
2
www.glcnetworks.com
introduction
3
www.glcnetworks.com
What is GLC?
● Garda Lintas Cakrawala (www.glcnetworks.com)
● Based in Bandung, Indonesia
● Areas: Training, IT Consulting
● Certified partner for: Mikrotik, Ubiquity, Linux foundation
● Product: GLC radius manager
● Regular event
4
www.glcnetworks.com
Trainer Introduction
● Name: Achmad Mardiansyah
● Base: bandung, Indonesia
● Linux user since 1999, mikrotik user since 2007, UBNT
2011
● Mikrotik Certified Trainer
(MTCNA/RE/WE/UME/INE/TCE/IPv6)
● Mikrotik/Linux Certified Consultant
● Website contributor: achmadjournal.com, mikrotik.tips,
asysadmin.tips
● More info:
http://au.linkedin.com/in/achmadmardiansyah
5
www.glcnetworks.com
Past experience
6
● 2021 (Congo DRC, Malaysia): network support,
radius/billing integration
● 2020 (Congo DRC, Malaysia): IOT integration,
network automation
● 2019, Congo (DRC): build a wireless ISP from
ground-up
● 2018, Malaysia: network revamp, develop billing
solution and integration, setup dynamic routing
● 2017, Libya (north africa): remote wireless migration
for a new Wireless ISP
● 2016, United Kingdom: workshop for wireless ISP,
migrating a bridged to routed network
www.glcnetworks.com
About GLC webinar?
● First webinar: january 1, 2010 (title:
tahun baru bersama solaris - new year
with solaris OS)
● As a sharing event with various topics:
linux, networking, wireless, database,
programming, etc
● Regular schedule
● Irregular schedule: as needed
● Checking schedule:
http://www.glcnetworks.com/schedule
● You are invited to be a presenter
○ No need to be an expert
○ This is a forum for sharing: knowledge,
experiences, information
7
www.glcnetworks.com
Please introduce yourself
● Your name
● Your company/university?
● Your networking experience?
● Your general experience?
● Your expectation from this course?
8
www.glcnetworks.com
Prerequisite
● This presentation some prerequisite knowledge
● We assume you already know:
○ Networking in general
○ Computer network
9
www.glcnetworks.com
Review prerequisite knowledge
10
www.glcnetworks.com
7 OSI layer & protocol
11
● OSI layer Is a conceptual model from ISO
(International Standard Organization) for project
OSI (Open System Interconnection)
● When you send a message with a courier, you
need to add more info to get your message arrived
at the destination (This process is called
encapsulation)
● What is protocol
○ Is a set of rules for communication
○ Available on each layer
● Communication consist of series encapsulation
○ SDU: service data unit (before PDU)
○ PDU: protocol data unit (after header is added)
www.glcnetworks.com
Layered model (TCP/IP vs ISO) and encapsulation
12
/ datagram
www.glcnetworks.com
Layer 4 header (which one is TCP?)
13
www.glcnetworks.com
Layer 3 header (which one is IPv4?)
14
www.glcnetworks.com
Ethernet header (which is the MTU?)
15
www.glcnetworks.com
802.11 header
16
www.glcnetworks.com
Did you notice?
● There is a big overhead on encapsulation process
● More encapsulation means less payload?
17
www.glcnetworks.com
Layers in internet communication
18
Source: APNIC
www.glcnetworks.com
Security and encryption
19
www.glcnetworks.com
General Security Aspects (CIA)
● Confidentiality. prevents
unauthorized use or
disclosure of information
● Integrity. safeguards the
accuracy and
completeness of
information
● Availability. authorized
users have reliable and
timely access to information
20
www.glcnetworks.com
AAA security
• Authentication: only registered user can
access
– What you know: username and password
– What you have: token, sms
– What you are: retina scan, fingerprint
• Authorization: define rights of a user
– Access control
– Data access control
– Restriction
– Type of Service
• Accounting: recording of what user is doing
(useful for billing/reporting)
– Traffic volume
– Online time
– Session
– Log: login, logout
Mainly implemented using radius
www.glcnetworks.com 21
www.glcnetworks.com
Goals of Information Security (CIA)
● Confidentiality. prevents
unauthorized use or
disclosure of information
● Integrity. safeguards the
accuracy and
completeness of
information
● Availability. authorized
users have reliable and
timely access to information
22
www.glcnetworks.com
Security mechanism…
Source: william stalling, network security essentials
www.glcnetworks.com
Cryptography - encryption
● practice and study of techniques for
secure communication in the presence
of third parties.
● cryptography is about constructing and
analyzing protocols that prevent third
parties or the public from reading
private messages
● General implementation:
○ Start with asymmetric encryption, to transfer
shared-key
○ Switch to symmetric encryption
24
Source:
medium/com/hackernoon
www.glcnetworks.com
Secure shell (SSH)
25
www.glcnetworks.com
A bit of history, accessing remote nodes...
Remote access protocols
● Command line interface:
○ Lighter, faster
○ Less bandwidth
○ Example:
■ Telnet
■ Rsh (remote shell)
○ Issue: no security (plain text) → alternatives :
SSH
● GUI
○ Require higher bandwidth
○ slower
○ Example:
■ VNC
■ Remote desktop
26
www.glcnetworks.com
SSH
● An alternative of insecure protocol (telnet, rsh)
● Open standard: RFC 4250
● Security feature:
○ Asymmetric encryption for initial connection
○ Symmetric encryption for data exchange
○ Authentication:
■ key-based authentication
■ password-based authentication
● Implementation:
○ Openssh (openbsd community)
○ Solaris SSH
○ Other ssh
○
27
www.glcnetworks.com
LIVE practice
28
www.glcnetworks.com
preparation
● SSH client
● SSH parameters
○ SSH address
○ SSH port
○ SSH username
○ SSH password
29
www.glcnetworks.com
Q & A
30
www.glcnetworks.com
Interested? Just come to our training...
● Topics are arranged in systematic and logical way
● You will learn from experienced teacher
● Not only learn the materials, but also sharing experiences, best-practices, and
networking
31
www.glcnetworks.com
End of slides
● Thank you for your attention
● Please submit your feedback: http://bit.ly/glcfeedback
● Find our further event on our website : https://www.glcnetworks.com/en/
● Like our facebook page: https://www.facebook.com/glcnetworks
● Slide: https://www.slideshare.net/glcnetworks/
● Discord (bahasa indonesia): (https://discord.gg/6MZ3KUHHBX)
● Recording (youtube): https://www.youtube.com/c/GLCNetworks
● Stay tune with our schedule
● Any questions?
32
Ad

Recommended

Up and Running DNS Service
Up and Running DNS Service
GLC Networks
 
Mikrotik Bridge Deep Dive
Mikrotik Bridge Deep Dive
GLC Networks
 
Manage Your Router with Dynamic Public IP
Manage Your Router with Dynamic Public IP
GLC Networks
 
Layer 7 Firewall on Mikrotik
Layer 7 Firewall on Mikrotik
GLC Networks
 
Using Zettabyte Filesystem (ZFS)
Using Zettabyte Filesystem (ZFS)
GLC Networks
 
Using Mikrotik Switch Features to Improve Your Network
Using Mikrotik Switch Features to Improve Your Network
GLC Networks
 
Machine Learning with Python
Machine Learning with Python
GLC Networks
 
Socket Programming with Python
Socket Programming with Python
GLC Networks
 
Zabbix for Monitoring
Zabbix for Monitoring
GLC Networks
 
Choosing Mikrotik Platform x86 vs chr
Choosing Mikrotik Platform x86 vs chr
GLC Networks
 
Trusted Email Server DKIM, SPF, DMARC, RDNS
Trusted Email Server DKIM, SPF, DMARC, RDNS
GLC Networks
 
Logical Volume Manager
Logical Volume Manager
GLC Networks
 
Running Moodle for High Concurrent Users
Running Moodle for High Concurrent Users
GLC Networks
 
Troubleshooting Layer 2 Ethernet Problem: Loop, Broadcast, Security
Troubleshooting Layer 2 Ethernet Problem: Loop, Broadcast, Security
GLC Networks
 
Using Kubernetes to Provide Services
Using Kubernetes to Provide Services
GLC Networks
 
Using Control-Webpanel for Hosting Service - Part 1
Using Control-Webpanel for Hosting Service - Part 1
GLC Networks
 
Up and Running with Freebsd
Up and Running with Freebsd
GLC Networks
 
CCNA : Intro to Cisco IOS - Part 1
CCNA : Intro to Cisco IOS - Part 1
GLC Networks
 
Networking in Telecommunication (signalling, tcp, ucp, ss7, sctp, sigtran)
Networking in Telecommunication (signalling, tcp, ucp, ss7, sctp, sigtran)
GLC Networks
 
MTCNA Intro to routerOS
MTCNA Intro to routerOS
GLC Networks
 
Mikrotik IP Settings For Performance and Security
Mikrotik IP Settings For Performance and Security
GLC Networks
 
Machine Learning with Python
Machine Learning with Python
GLC Networks
 
Using Docker Platform to Provide Services
Using Docker Platform to Provide Services
GLC Networks
 
Network Monitoring with The Dude and Whatsapp
Network Monitoring with The Dude and Whatsapp
GLC Networks
 
MTCNA : Intro to RouterOS - Part 1
MTCNA : Intro to RouterOS - Part 1
GLC Networks
 
Building Indoor Wireless Network
Building Indoor Wireless Network
GLC Networks
 
ACL on Linux - Part 1
ACL on Linux - Part 1
GLC Networks
 
Building Local-loop Services for Customers
Building Local-loop Services for Customers
GLC Networks
 
BGP Services IP Transit vs IP Peering
BGP Services IP Transit vs IP Peering
GLC Networks
 
IPv6 with Mikrotik
IPv6 with Mikrotik
GLC Networks
 

More Related Content

What's hot (20)

Zabbix for Monitoring
Zabbix for Monitoring
GLC Networks
 
Choosing Mikrotik Platform x86 vs chr
Choosing Mikrotik Platform x86 vs chr
GLC Networks
 
Trusted Email Server DKIM, SPF, DMARC, RDNS
Trusted Email Server DKIM, SPF, DMARC, RDNS
GLC Networks
 
Logical Volume Manager
Logical Volume Manager
GLC Networks
 
Running Moodle for High Concurrent Users
Running Moodle for High Concurrent Users
GLC Networks
 
Troubleshooting Layer 2 Ethernet Problem: Loop, Broadcast, Security
Troubleshooting Layer 2 Ethernet Problem: Loop, Broadcast, Security
GLC Networks
 
Using Kubernetes to Provide Services
Using Kubernetes to Provide Services
GLC Networks
 
Using Control-Webpanel for Hosting Service - Part 1
Using Control-Webpanel for Hosting Service - Part 1
GLC Networks
 
Up and Running with Freebsd
Up and Running with Freebsd
GLC Networks
 
CCNA : Intro to Cisco IOS - Part 1
CCNA : Intro to Cisco IOS - Part 1
GLC Networks
 
Networking in Telecommunication (signalling, tcp, ucp, ss7, sctp, sigtran)
Networking in Telecommunication (signalling, tcp, ucp, ss7, sctp, sigtran)
GLC Networks
 
MTCNA Intro to routerOS
MTCNA Intro to routerOS
GLC Networks
 
Mikrotik IP Settings For Performance and Security
Mikrotik IP Settings For Performance and Security
GLC Networks
 
Machine Learning with Python
Machine Learning with Python
GLC Networks
 
Using Docker Platform to Provide Services
Using Docker Platform to Provide Services
GLC Networks
 
Network Monitoring with The Dude and Whatsapp
Network Monitoring with The Dude and Whatsapp
GLC Networks
 
MTCNA : Intro to RouterOS - Part 1
MTCNA : Intro to RouterOS - Part 1
GLC Networks
 
Building Indoor Wireless Network
Building Indoor Wireless Network
GLC Networks
 
ACL on Linux - Part 1
ACL on Linux - Part 1
GLC Networks
 
Building Local-loop Services for Customers
Building Local-loop Services for Customers
GLC Networks
 
Zabbix for Monitoring
Zabbix for Monitoring
GLC Networks
 
Choosing Mikrotik Platform x86 vs chr
Choosing Mikrotik Platform x86 vs chr
GLC Networks
 
Trusted Email Server DKIM, SPF, DMARC, RDNS
Trusted Email Server DKIM, SPF, DMARC, RDNS
GLC Networks
 
Logical Volume Manager
Logical Volume Manager
GLC Networks
 
Running Moodle for High Concurrent Users
Running Moodle for High Concurrent Users
GLC Networks
 
Troubleshooting Layer 2 Ethernet Problem: Loop, Broadcast, Security
Troubleshooting Layer 2 Ethernet Problem: Loop, Broadcast, Security
GLC Networks
 
Using Kubernetes to Provide Services
Using Kubernetes to Provide Services
GLC Networks
 
Using Control-Webpanel for Hosting Service - Part 1
Using Control-Webpanel for Hosting Service - Part 1
GLC Networks
 
Up and Running with Freebsd
Up and Running with Freebsd
GLC Networks
 
CCNA : Intro to Cisco IOS - Part 1
CCNA : Intro to Cisco IOS - Part 1
GLC Networks
 
Networking in Telecommunication (signalling, tcp, ucp, ss7, sctp, sigtran)
Networking in Telecommunication (signalling, tcp, ucp, ss7, sctp, sigtran)
GLC Networks
 
MTCNA Intro to routerOS
MTCNA Intro to routerOS
GLC Networks
 
Mikrotik IP Settings For Performance and Security
Mikrotik IP Settings For Performance and Security
GLC Networks
 
Machine Learning with Python
Machine Learning with Python
GLC Networks
 
Using Docker Platform to Provide Services
Using Docker Platform to Provide Services
GLC Networks
 
Network Monitoring with The Dude and Whatsapp
Network Monitoring with The Dude and Whatsapp
GLC Networks
 
MTCNA : Intro to RouterOS - Part 1
MTCNA : Intro to RouterOS - Part 1
GLC Networks
 
Building Indoor Wireless Network
Building Indoor Wireless Network
GLC Networks
 
ACL on Linux - Part 1
ACL on Linux - Part 1
GLC Networks
 
Building Local-loop Services for Customers
Building Local-loop Services for Customers
GLC Networks
 

Similar to Up and Running SSH Service - Part 1 (20)

BGP Services IP Transit vs IP Peering
BGP Services IP Transit vs IP Peering
GLC Networks
 
IPv6 with Mikrotik
IPv6 with Mikrotik
GLC Networks
 
Mikrotik Hotspot
Mikrotik Hotspot
GLC Networks
 
Best Current Practice (BCP) 38 Ingress Filtering for Security
Best Current Practice (BCP) 38 Ingress Filtering for Security
GLC Networks
 
IPsec on Mikrotik
IPsec on Mikrotik
GLC Networks
 
Internet Protocol Deep-Dive
Internet Protocol Deep-Dive
GLC Networks
 
Running BGP with Mikrotik
Running BGP with Mikrotik
GLC Networks
 
Dynamic Website with Python
Dynamic Website with Python
GLC Networks
 
RouterOS Migration From v6 to v7
RouterOS Migration From v6 to v7
GLC Networks
 
Network LACP/Bonding/Teaming with Mikrotik
Network LACP/Bonding/Teaming with Mikrotik
GLC Networks
 
Controlling Access Between Devices in the same Layer 2 Segment
Controlling Access Between Devices in the same Layer 2 Segment
GLC Networks
 
EOIP Deep Dive
EOIP Deep Dive
GLC Networks
 
Building a Web Server with NGINX
Building a Web Server with NGINX
GLC Networks
 
Build Your Own ISP
Build Your Own ISP
GLC Networks
 
OSPF On Router OS7
OSPF On Router OS7
GLC Networks
 
BGP on RouterOS7 -Part 1
BGP on RouterOS7 -Part 1
GLC Networks
 
Introduction to Python
Introduction to Python
GLC Networks
 
Firewall mangle PBR: steering outbound path similar to inbound
Firewall mangle PBR: steering outbound path similar to inbound
GLC Networks
 
Telecommunication Evolution
Telecommunication Evolution
GLC Networks
 
Hackerworkshop exercises
Hackerworkshop exercises
Henrik Kramshøj
 
BGP Services IP Transit vs IP Peering
BGP Services IP Transit vs IP Peering
GLC Networks
 
IPv6 with Mikrotik
IPv6 with Mikrotik
GLC Networks
 
Best Current Practice (BCP) 38 Ingress Filtering for Security
Best Current Practice (BCP) 38 Ingress Filtering for Security
GLC Networks
 
Internet Protocol Deep-Dive
Internet Protocol Deep-Dive
GLC Networks
 
Running BGP with Mikrotik
Running BGP with Mikrotik
GLC Networks
 
Dynamic Website with Python
Dynamic Website with Python
GLC Networks
 
RouterOS Migration From v6 to v7
RouterOS Migration From v6 to v7
GLC Networks
 
Network LACP/Bonding/Teaming with Mikrotik
Network LACP/Bonding/Teaming with Mikrotik
GLC Networks
 
Controlling Access Between Devices in the same Layer 2 Segment
Controlling Access Between Devices in the same Layer 2 Segment
GLC Networks
 
Building a Web Server with NGINX
Building a Web Server with NGINX
GLC Networks
 
Build Your Own ISP
Build Your Own ISP
GLC Networks
 
OSPF On Router OS7
OSPF On Router OS7
GLC Networks
 
BGP on RouterOS7 -Part 1
BGP on RouterOS7 -Part 1
GLC Networks
 
Introduction to Python
Introduction to Python
GLC Networks
 
Firewall mangle PBR: steering outbound path similar to inbound
Firewall mangle PBR: steering outbound path similar to inbound
GLC Networks
 
Telecommunication Evolution
Telecommunication Evolution
GLC Networks
 
Ad

More from GLC Networks (19)

Internal BGP tuning: Mesh peering to avoid loop
Internal BGP tuning: Mesh peering to avoid loop
GLC Networks
 
BGP tuning: Peer with loopback
BGP tuning: Peer with loopback
GLC Networks
 
BGP security tuning: pull-up route
BGP security tuning: pull-up route
GLC Networks
 
BGP troubleshooting: route origin
BGP troubleshooting: route origin
GLC Networks
 
Steering traffic in OSPF: Interface cost
Steering traffic in OSPF: Interface cost
GLC Networks
 
Tuning OSPF: Bidirectional Forwarding Detection (BFD)
Tuning OSPF: Bidirectional Forwarding Detection (BFD)
GLC Networks
 
Tuning OSPF: Prefix Aggregate
Tuning OSPF: Prefix Aggregate
GLC Networks
 
Tuning OSPF: area hierarchy, LSA, and area type
Tuning OSPF: area hierarchy, LSA, and area type
GLC Networks
 
Stable OSPF: choosing network type.pdf
Stable OSPF: choosing network type.pdf
GLC Networks
 
GIT as Mikrotik Configuration Management
GIT as Mikrotik Configuration Management
GLC Networks
 
Policy Based Routing with Indirect BGP - Part 2
Policy Based Routing with Indirect BGP - Part 2
GLC Networks
 
Policy Based Routing with Indirect BGP - Part 1
Policy Based Routing with Indirect BGP - Part 1
GLC Networks
 
Automatic Backup via FTP - Part 2
Automatic Backup via FTP - Part 2
GLC Networks
 
Automatic Backup via FTP - Part 1
Automatic Backup via FTP - Part 1
GLC Networks
 
Voice Services, From Circuit Switch to VoIP
Voice Services, From Circuit Switch to VoIP
GLC Networks
 
MPLS on Router OS V7 - Part 2
MPLS on Router OS V7 - Part 2
GLC Networks
 
MPLS on Router OS V7 - Part 1
MPLS on Router OS V7 - Part 1
GLC Networks
 
BGP on RouterOS7 - Part 2
BGP on RouterOS7 - Part 2
GLC Networks
 
OSPF On Router OS7 - Part 2
OSPF On Router OS7 - Part 2
GLC Networks
 
Internal BGP tuning: Mesh peering to avoid loop
Internal BGP tuning: Mesh peering to avoid loop
GLC Networks
 
BGP tuning: Peer with loopback
BGP tuning: Peer with loopback
GLC Networks
 
BGP security tuning: pull-up route
BGP security tuning: pull-up route
GLC Networks
 
BGP troubleshooting: route origin
BGP troubleshooting: route origin
GLC Networks
 
Steering traffic in OSPF: Interface cost
Steering traffic in OSPF: Interface cost
GLC Networks
 
Tuning OSPF: Bidirectional Forwarding Detection (BFD)
Tuning OSPF: Bidirectional Forwarding Detection (BFD)
GLC Networks
 
Tuning OSPF: Prefix Aggregate
Tuning OSPF: Prefix Aggregate
GLC Networks
 
Tuning OSPF: area hierarchy, LSA, and area type
Tuning OSPF: area hierarchy, LSA, and area type
GLC Networks
 
Stable OSPF: choosing network type.pdf
Stable OSPF: choosing network type.pdf
GLC Networks
 
GIT as Mikrotik Configuration Management
GIT as Mikrotik Configuration Management
GLC Networks
 
Policy Based Routing with Indirect BGP - Part 2
Policy Based Routing with Indirect BGP - Part 2
GLC Networks
 
Policy Based Routing with Indirect BGP - Part 1
Policy Based Routing with Indirect BGP - Part 1
GLC Networks
 
Automatic Backup via FTP - Part 2
Automatic Backup via FTP - Part 2
GLC Networks
 
Automatic Backup via FTP - Part 1
Automatic Backup via FTP - Part 1
GLC Networks
 
Voice Services, From Circuit Switch to VoIP
Voice Services, From Circuit Switch to VoIP
GLC Networks
 
MPLS on Router OS V7 - Part 2
MPLS on Router OS V7 - Part 2
GLC Networks
 
MPLS on Router OS V7 - Part 1
MPLS on Router OS V7 - Part 1
GLC Networks
 
BGP on RouterOS7 - Part 2
BGP on RouterOS7 - Part 2
GLC Networks
 
OSPF On Router OS7 - Part 2
OSPF On Router OS7 - Part 2
GLC Networks
 
Ad

Recently uploaded (20)

Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
caoyixuan2019
 
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
FIDO Alliance
 
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Priyanka Aash
 
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Alliance
 
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Alliance
 
Improving Data Integrity: Synchronization between EAM and ArcGIS Utility Netw...
Improving Data Integrity: Synchronization between EAM and ArcGIS Utility Netw...
Safe Software
 
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik
 
War_And_Cyber_3_Years_Of_Struggle_And_Lessons_For_Global_Security.pdf
War_And_Cyber_3_Years_Of_Struggle_And_Lessons_For_Global_Security.pdf
biswajitbanerjee38
 
Wenn alles versagt - IBM Tape schützt, was zählt! Und besonders mit dem neust...
Wenn alles versagt - IBM Tape schützt, was zählt! Und besonders mit dem neust...
Josef Weingand
 
Creating Inclusive Digital Learning with AI: A Smarter, Fairer Future
Creating Inclusive Digital Learning with AI: A Smarter, Fairer Future
Impelsys Inc.
 
From Manual to Auto Searching- FME in the Driver's Seat
From Manual to Auto Searching- FME in the Driver's Seat
Safe Software
 
FIDO Alliance Seminar State of Passkeys.pptx
FIDO Alliance Seminar State of Passkeys.pptx
FIDO Alliance
 
9-1-1 Addressing: End-to-End Automation Using FME
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
 
Techniques for Automatic Device Identification and Network Assignment.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Priyanka Aash
 
The Future of Technology: 2025-2125 by Saikat Basu.pdf
The Future of Technology: 2025-2125 by Saikat Basu.pdf
Saikat Basu
 
Securing AI - There Is No Try, Only Do!.pdf
Securing AI - There Is No Try, Only Do!.pdf
Priyanka Aash
 
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
revolcs10
 
MuleSoft for AgentForce : Topic Center and API Catalog
MuleSoft for AgentForce : Topic Center and API Catalog
shyamraj55
 
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
FIDO Alliance
 
Cyber Defense Matrix Workshop - RSA Conference
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
 
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
caoyixuan2019
 
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
FIDO Alliance
 
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Priyanka Aash
 
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Alliance
 
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Alliance
 
Improving Data Integrity: Synchronization between EAM and ArcGIS Utility Netw...
Improving Data Integrity: Synchronization between EAM and ArcGIS Utility Netw...
Safe Software
 
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik
 
War_And_Cyber_3_Years_Of_Struggle_And_Lessons_For_Global_Security.pdf
War_And_Cyber_3_Years_Of_Struggle_And_Lessons_For_Global_Security.pdf
biswajitbanerjee38
 
Wenn alles versagt - IBM Tape schützt, was zählt! Und besonders mit dem neust...
Wenn alles versagt - IBM Tape schützt, was zählt! Und besonders mit dem neust...
Josef Weingand
 
Creating Inclusive Digital Learning with AI: A Smarter, Fairer Future
Creating Inclusive Digital Learning with AI: A Smarter, Fairer Future
Impelsys Inc.
 
From Manual to Auto Searching- FME in the Driver's Seat
From Manual to Auto Searching- FME in the Driver's Seat
Safe Software
 
FIDO Alliance Seminar State of Passkeys.pptx
FIDO Alliance Seminar State of Passkeys.pptx
FIDO Alliance
 
9-1-1 Addressing: End-to-End Automation Using FME
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
 
Techniques for Automatic Device Identification and Network Assignment.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Priyanka Aash
 
The Future of Technology: 2025-2125 by Saikat Basu.pdf
The Future of Technology: 2025-2125 by Saikat Basu.pdf
Saikat Basu
 
Securing AI - There Is No Try, Only Do!.pdf
Securing AI - There Is No Try, Only Do!.pdf
Priyanka Aash
 
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
revolcs10
 
MuleSoft for AgentForce : Topic Center and API Catalog
MuleSoft for AgentForce : Topic Center and API Catalog
shyamraj55
 
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
FIDO Alliance
 
Cyber Defense Matrix Workshop - RSA Conference
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
 

Up and Running SSH Service - Part 1

  • 1. www.glcnetworks.com UP and RUNNING SSH service GLC collaboration webinar, 9 nov 2021 Achmad Mardiansyah M. Taufik nurhuda 1 Source: wikipedia.com
  • 2. www.glcnetworks.com Agenda ● Introduction ● Review prerequisite knowledge ● SSH application ● SSH implementation ● Q & A 2
  • 4. www.glcnetworks.com What is GLC? ● Garda Lintas Cakrawala (www.glcnetworks.com) ● Based in Bandung, Indonesia ● Areas: Training, IT Consulting ● Certified partner for: Mikrotik, Ubiquity, Linux foundation ● Product: GLC radius manager ● Regular event 4
  • 5. www.glcnetworks.com Trainer Introduction ● Name: Achmad Mardiansyah ● Base: bandung, Indonesia ● Linux user since 1999, mikrotik user since 2007, UBNT 2011 ● Mikrotik Certified Trainer (MTCNA/RE/WE/UME/INE/TCE/IPv6) ● Mikrotik/Linux Certified Consultant ● Website contributor: achmadjournal.com, mikrotik.tips, asysadmin.tips ● More info: http://au.linkedin.com/in/achmadmardiansyah 5
  • 6. www.glcnetworks.com Past experience 6 ● 2021 (Congo DRC, Malaysia): network support, radius/billing integration ● 2020 (Congo DRC, Malaysia): IOT integration, network automation ● 2019, Congo (DRC): build a wireless ISP from ground-up ● 2018, Malaysia: network revamp, develop billing solution and integration, setup dynamic routing ● 2017, Libya (north africa): remote wireless migration for a new Wireless ISP ● 2016, United Kingdom: workshop for wireless ISP, migrating a bridged to routed network
  • 7. www.glcnetworks.com About GLC webinar? ● First webinar: january 1, 2010 (title: tahun baru bersama solaris - new year with solaris OS) ● As a sharing event with various topics: linux, networking, wireless, database, programming, etc ● Regular schedule ● Irregular schedule: as needed ● Checking schedule: http://www.glcnetworks.com/schedule ● You are invited to be a presenter ○ No need to be an expert ○ This is a forum for sharing: knowledge, experiences, information 7
  • 8. www.glcnetworks.com Please introduce yourself ● Your name ● Your company/university? ● Your networking experience? ● Your general experience? ● Your expectation from this course? 8
  • 9. www.glcnetworks.com Prerequisite ● This presentation some prerequisite knowledge ● We assume you already know: ○ Networking in general ○ Computer network 9
  • 11. www.glcnetworks.com 7 OSI layer & protocol 11 ● OSI layer Is a conceptual model from ISO (International Standard Organization) for project OSI (Open System Interconnection) ● When you send a message with a courier, you need to add more info to get your message arrived at the destination (This process is called encapsulation) ● What is protocol ○ Is a set of rules for communication ○ Available on each layer ● Communication consist of series encapsulation ○ SDU: service data unit (before PDU) ○ PDU: protocol data unit (after header is added)
  • 12. www.glcnetworks.com Layered model (TCP/IP vs ISO) and encapsulation 12 / datagram
  • 13. www.glcnetworks.com Layer 4 header (which one is TCP?) 13
  • 14. www.glcnetworks.com Layer 3 header (which one is IPv4?) 14
  • 17. www.glcnetworks.com Did you notice? ● There is a big overhead on encapsulation process ● More encapsulation means less payload? 17
  • 18. www.glcnetworks.com Layers in internet communication 18 Source: APNIC
  • 20. www.glcnetworks.com General Security Aspects (CIA) ● Confidentiality. prevents unauthorized use or disclosure of information ● Integrity. safeguards the accuracy and completeness of information ● Availability. authorized users have reliable and timely access to information 20
  • 21. www.glcnetworks.com AAA security • Authentication: only registered user can access – What you know: username and password – What you have: token, sms – What you are: retina scan, fingerprint • Authorization: define rights of a user – Access control – Data access control – Restriction – Type of Service • Accounting: recording of what user is doing (useful for billing/reporting) – Traffic volume – Online time – Session – Log: login, logout Mainly implemented using radius www.glcnetworks.com 21
  • 22. www.glcnetworks.com Goals of Information Security (CIA) ● Confidentiality. prevents unauthorized use or disclosure of information ● Integrity. safeguards the accuracy and completeness of information ● Availability. authorized users have reliable and timely access to information 22
  • 23. www.glcnetworks.com Security mechanism… Source: william stalling, network security essentials
  • 24. www.glcnetworks.com Cryptography - encryption ● practice and study of techniques for secure communication in the presence of third parties. ● cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages ● General implementation: ○ Start with asymmetric encryption, to transfer shared-key ○ Switch to symmetric encryption 24 Source: medium/com/hackernoon
  • 26. www.glcnetworks.com A bit of history, accessing remote nodes... Remote access protocols ● Command line interface: ○ Lighter, faster ○ Less bandwidth ○ Example: ■ Telnet ■ Rsh (remote shell) ○ Issue: no security (plain text) → alternatives : SSH ● GUI ○ Require higher bandwidth ○ slower ○ Example: ■ VNC ■ Remote desktop 26
  • 27. www.glcnetworks.com SSH ● An alternative of insecure protocol (telnet, rsh) ● Open standard: RFC 4250 ● Security feature: ○ Asymmetric encryption for initial connection ○ Symmetric encryption for data exchange ○ Authentication: ■ key-based authentication ■ password-based authentication ● Implementation: ○ Openssh (openbsd community) ○ Solaris SSH ○ Other ssh ○ 27
  • 29. www.glcnetworks.com preparation ● SSH client ● SSH parameters ○ SSH address ○ SSH port ○ SSH username ○ SSH password 29
  • 31. www.glcnetworks.com Interested? Just come to our training... ● Topics are arranged in systematic and logical way ● You will learn from experienced teacher ● Not only learn the materials, but also sharing experiences, best-practices, and networking 31
  • 32. www.glcnetworks.com End of slides ● Thank you for your attention ● Please submit your feedback: http://bit.ly/glcfeedback ● Find our further event on our website : https://www.glcnetworks.com/en/ ● Like our facebook page: https://www.facebook.com/glcnetworks ● Slide: https://www.slideshare.net/glcnetworks/ ● Discord (bahasa indonesia): (https://discord.gg/6MZ3KUHHBX) ● Recording (youtube): https://www.youtube.com/c/GLCNetworks ● Stay tune with our schedule ● Any questions? 32