You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-machines/linux-vm-connect.md
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,20 +13,20 @@ ms.reviewer: jamesser
13
13
---
14
14
# Connect to a Linux VM
15
15
16
-
When hosting a Linux virtual machine on Azure, the most common method for accessing that VM is through the Secure Shell Protocol (SSH). Any standard SSH client commonly found in Linux and Windows will allow you to connect. You can also use [Azure Cloud Shell](../cloud-shell/overview.md) from any browser.
16
+
When hosting a Linux virtual machine on Azure, the most common method for accessing that VM is through the Secure Shell Protocol (SSH). Any standard SSH client commonly found in Linux and Windows allows you to connect. You can also use [Azure Cloud Shell](../cloud-shell/overview.md) from any browser.
17
17
18
18
This document describes how to connect, via SSH, to a VM that has a public IP. If you need to connect to a VM without a public IP, see [Azure Bastion Service](../bastion/bastion-overview.md).
19
19
20
20
## Prerequisites
21
21
22
-
- You need an SSH key pair. If you don't already have one, Azure will create a key pair during the deployment process. If you need help with creating one manually, see [Create and use an SSH public-private key pair for Linux VMs in Azure](./linux/mac-create-ssh-keys.md).
22
+
- You need an SSH key pair. If you don't already have one, Azure creates a key pair during the deployment process. If you need help with creating one manually, see [Create and use an SSH public-private key pair for Linux VMs in Azure](./linux/mac-create-ssh-keys.md).
23
23
- You need an existing Network Security Group (NSG). Most VMs have an NSG by default, but if you don't already have one you can create one and attach it manually. For more information, see [Create, change, or delete a network security group](../virtual-network/manage-network-security-group.md).
24
24
- To connect to a Linux VM, you need the appropriate port open. Typically SSH uses port 22. The following instructions assume port 22 but the process is the same for other port numbers. You can validate an appropriate port is open for SSH using the troubleshooter or by checking manually in your VM settings. To check if port 22 is open:
25
25
26
26
1. On the page for the VM, select **Networking** from the left menu.
27
-
1. On the **Networking** page, check to see if there is a rule that allows TCP on port 22 from the IP address of the computer you are using to connect to the VM. If the rule exists, you can move to the next section.
27
+
1. On the **Networking** page, check to see if there's a rule that allows TCP on port 22 from the IP address of the computer you are using to connect to the VM. If the rule exists, you can move to the next section.
28
28
29
-
:::image type="content" source="media/linux-vm-connect/check-rule.png" alt-text="Screenshot showing how to check to see if there is already a rule allowing S S H connections.":::
29
+
:::image type="content" source="media/linux-vm-connect/check-rule.png" alt-text="Screenshot showing how to check to see if there's already a rule allowing S S H connections.":::
30
30
31
31
1. If there isn't a rule, add one by selecting **Add inbound port rule**.
32
32
1. For **Service**, select **SSH** from the dropdown.
@@ -40,7 +40,7 @@ This document describes how to connect, via SSH, to a VM that has a public IP. I
40
40
41
41
- Your VM must have a public IP address. To check if your VM has a public IP address, select **Overview** from the left menu and look at the **Networking** section. If you see an IP address next to **Public IP address**, then your VM has a public IP
42
42
43
-
If your VM does not have a public IP Address, it looks like this:
43
+
If your VM doesn't have a public IP Address, it looks like this:
44
44
45
45
:::image type="content" source="media/linux-vm-connect/no-public-ip.png" alt-text="Screenshot of how the networking section looks when you do not have a public I P.":::
46
46
@@ -53,7 +53,7 @@ This document describes how to connect, via SSH, to a VM that has a public IP. I
53
53
54
54
## Connect to the VM
55
55
56
-
Once the above prerequisites are met, you are ready to connect to your VM. Open your SSH client of choice. The SSH client command is typically included in Linux, macOS, and Windows. If you are using Windows 7 or older, where Win32 OpenSSH is not included by default, consider installing [WSL](/windows/wsl/about) or using [Azure Cloud Shell](../cloud-shell/overview.md) from the browser.
56
+
Once the above prerequisites are met, you're ready to connect to your VM. Open your SSH client of choice. The SSH client command is typically included in Linux, macOS, and Windows. If you're using Windows 7 or older, where Win32 OpenSSH isn't included by default, consider installing [WSL](/windows/wsl/about) or using [Azure Cloud Shell](../cloud-shell/overview.md) from the browser.
57
57
58
58
> [!NOTE]
59
59
> The following examples assume the SSH key is in the key.pem format. If you used CLI or Azure PowerShell to download your keys, they may be in the id_rsa format.
@@ -84,7 +84,7 @@ Once the above prerequisites are met, you are ready to connect to your VM. Open
84
84
```
85
85
4. Validate the returned fingerprint.
86
86
87
-
If you have never connected to this VM before, you'll be asked to verify the hosts fingerprint. It's tempting to simply accept the fingerprint presented, but that exposes you to a potential person in the middle attack. You should always validate the hosts fingerprint. You only need to do this the first time you connect from a client. To get the host fingerprint via the portal, use the Run Command feature to execute the command:
87
+
If you've never connected to this VM before, you're asked to verify the hosts fingerprint. It's tempting to simply accept the fingerprint presented, but that exposes you to a potential person in the middle attack. You should always validate the hosts fingerprint. You only need to do this the first time you connect from a client. To get the host fingerprint via the portal, use the Run Command feature to execute the command:
@@ -98,7 +98,7 @@ Once the above prerequisites are met, you are ready to connect to your VM. Open
98
98
```
99
99
2. Validate the returned fingerprint.
100
100
101
-
If you've never connected to the desired VM from your current SSH client before you're asked to verify the host's fingerprint. While the default option is to accept the fingerprint presented, this exposes youto a possible "person in the middle attack". You should always validate the host's fingerprint. You only need to do this the first time your client connects. To obtain the host fingerprint via the portal, use the Run Command feature to execute the command:
101
+
If you've never connected to the desired VM from your current SSH client before you're asked to verify the host's fingerprint. While the default option is to accept the fingerprint presented, you're exposed to a possible "person in the middle attack". You should always validate the host's fingerprint which only needs to be done the first time your client connects. To obtain the host fingerprint via the portal, use the Run Command feature to execute the command:
@@ -121,12 +121,12 @@ Once the above prerequisites are met, you are ready to connect to your VM. Open
121
121
122
122
2. Validate the returned fingerprint.
123
123
124
-
If you have never connected to this VM before you will be asked to verify the hosts fingerprint. It is tempting to simply accept the fingerprint presented, however, this exposes youto a possible person in the middle attack. You should always validate the hosts fingerprint. You only need to do this on the first time you connect from a client. To obtain the host fingerprint via the portal, use the Run Command feature to execute the command:
124
+
If you've never connected to the desired VM from your current SSH client before you're asked to verify the host's fingerprint. While the default option is to accept the fingerprint presented, you're exposed to a possible "person in the middle attack". You should always validate the host's fingerprint which only needs to be donethe first timeyour client connects. To obtain the host fingerprint via the portal, use the Run Command feature to execute the command:
3. Success! You should now be connected to your VM. If you're unable to connect using the correct method above, see [Troubleshoot SSH connections](/troubleshoot/azure/virtual-machines/troubleshoot-ssh-connection).
129
+
3. Success! You should now be connected to your VM. If you're unable to connect, see [Troubleshoot SSH connections](/troubleshoot/azure/virtual-machines/troubleshoot-ssh-connection).
130
130
131
131
132
132
## [Windows command line (cmd.exe, PowerShell etc.)](#tab/Windows)
@@ -142,7 +142,7 @@ Once the above prerequisites are met, you are ready to connect to your VM. Open
142
142
```
143
143
3. Validate the returned fingerprint.
144
144
145
-
If you have never connected to this VM before you will be asked to verify the hosts fingerprint. It is tempting to simply accept the fingerprint presented, however, this exposes youto a possible person in the middle attack. You should always validate the hosts fingerprint. You only need to do this on the first timeyou connect from a client. To obtain the host fingerprint via the portal, use the Run Command feature to execute the command:
145
+
If you've never connected to the desired VM from your current SSH client before you're asked to verify the host's fingerprint. While the default option is to accept the fingerprint presented, you're exposed to a possible "person in the middle attack". You should always validate the host's fingerprint which only needs to be donethe first timeyour client connects. To obtain the host fingerprint via the portal, use the Run Command feature to execute the command:
@@ -166,7 +166,7 @@ Once the above prerequisites are met, you are ready to connect to your VM. Open
166
166
167
167
2. Validate the returned fingerprint.
168
168
169
-
If you have never connected to this VM before you will be asked to verify the hosts fingerprint. It is tempting to simply accept the fingerprint presented, however, this exposes youto a potential person in the middle attack. You should always validate the hosts fingerprint. You only need to do this on the first timeyou connect from a client. To obtain the host fingerprint via the portal, use the Run Command feature to execute the command:
169
+
If you've never connected to the desired VM from your current SSH client before you're asked to verify the host's fingerprint. While the default option is to accept the fingerprint presented, you're exposed to a possible "person in the middle attack". You should always validate the host's fingerprint which only needs to be done the first time your client connects. To obtain the host fingerprint via the portal, use the Run Command feature to execute the command:
0 commit comments