Skip to content

Commit 8937cc8

Browse files
authored
Update linux-vm-connect.md
Initial edits for Acrolinx
1 parent 9ccec44 commit 8937cc8

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

articles/virtual-machines/linux-vm-connect.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -13,18 +13,18 @@ ms.reviewer: jamesser
1313
---
1414
# Connect to a Linux VM
1515

16-
In Azure there are multiple ways to connect to a Linux virtual machine. The most common practice for connecting to a Linux VM is using the Secure Shell Protocol (SSH). This is done via any standard SSH client commonly found in Linux and Windows. You can also use [Azure Cloud Shell](../cloud-shell/overview.md) from any browser.
16+
When hosting a Linux virtual machine on Azure, the most common method for accessing that VM is through the Secure Shell Protocol (SSH). Any standard SSH client commonly found in Linux and Windows will allow you to connect. You can also use [Azure Cloud Shell](../cloud-shell/overview.md) from any browser.
1717

1818
This document describes how to connect, via SSH, to a VM that has a public IP. If you need to connect to a VM without a public IP, see [Azure Bastion Service](../bastion/bastion-overview.md).
1919

2020
## Prerequisites
2121

2222
- You need an SSH key pair. If you don't already have one, Azure will create a key pair during the deployment process. If you need help with creating one manually, see [Create and use an SSH public-private key pair for Linux VMs in Azure](./linux/mac-create-ssh-keys.md).
23-
- You need an existing Network Security Group (NSG). Most VMs will have an NSG by default, but if you don't already have one you can create one and attach it manually. For more information, see [Create, change, or delete a network security group](../virtual-network/manage-network-security-group.md).
24-
- To connect to a Linux VM, you need the appropriate port open. Typically this will be port 22. The following instructions assume port 22 but the process is the same for other port numbers. You can validate an appropriate port is open for SSH using the troubleshooter or by checking manually in your VM settings. To check if port 22 is open:
23+
- You need an existing Network Security Group (NSG). Most VMs have an NSG by default, but if you don't already have one you can create one and attach it manually. For more information, see [Create, change, or delete a network security group](../virtual-network/manage-network-security-group.md).
24+
- To connect to a Linux VM, you need the appropriate port open. Typically SSH uses port 22. The following instructions assume port 22 but the process is the same for other port numbers. You can validate an appropriate port is open for SSH using the troubleshooter or by checking manually in your VM settings. To check if port 22 is open:
2525

2626
1. On the page for the VM, select **Networking** from the left menu.
27-
1. On the **Networking** page, check to see if there is a rule which allows TCP on port 22 from the IP address of the computer you are using to connect to the VM. If the rule exists, you can move to the next section.
27+
1. On the **Networking** page, check to see if there is a rule that allows TCP on port 22 from the IP address of the computer you are using to connect to the VM. If the rule exists, you can move to the next section.
2828

2929
:::image type="content" source="media/linux-vm-connect/check-rule.png" alt-text="Screenshot showing how to check to see if there is already a rule allowing S S H connections.":::
3030

@@ -40,7 +40,7 @@ This document describes how to connect, via SSH, to a VM that has a public IP. I
4040

4141
- Your VM must have a public IP address. To check if your VM has a public IP address, select **Overview** from the left menu and look at the **Networking** section. If you see an IP address next to **Public IP address**, then your VM has a public IP
4242

43-
If your VM does not have a public IP Address, it will look like this:
43+
If your VM does not have a public IP Address, it looks like this:
4444

4545
:::image type="content" source="media/linux-vm-connect/no-public-ip.png" alt-text="Screenshot of how the networking section looks when you do not have a public I P.":::
4646

@@ -63,7 +63,7 @@ Once the above prerequisites are met, you are ready to connect to your VM. Open
6363
### SSH with a new key pair
6464
1. Ensure your public and private keys are in the correct directory. The directory is usually `~/.ssh`.
6565

66-
If you generated keys manually or generated them with the CLI, then the keys are probably already there. However, if you downloaded them in pem format from the Azure portal, you may need to move them to the right location. This can be done with the following syntax: `mv PRIVATE_KEY_SOURCE PRIVATE_KEY_DESTINATION`
66+
If you generated keys manually or generated them with the CLI, then the keys are probably already there. However, if you downloaded them in pem format from the Azure portal, you may need to move them to the right location. Moving the keys is done with the following syntax: `mv PRIVATE_KEY_SOURCE PRIVATE_KEY_DESTINATION`
6767

6868
For example, if the key is in the `Downloads` folder, and `myKey.pem` is the name of your SSH key, type:
6969
```bash
@@ -98,18 +98,18 @@ Once the above prerequisites are met, you are ready to connect to your VM. Open
9898
```
9999
2. Validate the returned fingerprint.
100100

101-
If you have never connected to this VM before you will be asked to verify the hosts fingerprint. It is tempting to simply accept the fingerprint presented, however, this exposes you to a possible person in the middle attack. You should always validate the hosts fingerprint. You only need to do this on the first time you connect from a client. To obtain the host fingerprint via the portal, use the Run Command feature to execute the command:
101+
If you've never connected to the desired VM from your current SSH client before you're asked to verify the host's fingerprint. While the default option is to accept the fingerprint presented, this exposes you to a possible "person in the middle attack". You should always validate the host's fingerprint. You only need to do this the first time your client connects. To obtain the host fingerprint via the portal, use the Run Command feature to execute the command:
102102

103103
```bash
104104
ssh-keygen -lf /etc/ssh/ssh_host_ecdsa_key.pub | awk '{print $2}'
105105
```
106106

107-
3. Success! You should now be connected to your VM. If you're unable to connect, see our troubleshooting guide [Troubleshoot SSH connections](/troubleshoot/azure/virtual-machines/troubleshoot-ssh-connection).
107+
3. Success! You should now be connected to your VM. If you're unable to connect, see our [troubleshooting guide](/troubleshoot/azure/virtual-machines/troubleshoot-ssh-connection).
108108
109109
### Password authentication
110110
111111
> [!WARNING]
112-
> This type of authentication method is not as secure and is not recommended.
112+
> This type of authentication method is not as secure as an SSH key pair and is not recommended.
113113
114114
1. Run the following command in your SSH client. In this example, *20.51.230.13* is the public IP Address of your VM and *azureuser* is the username you created when you created the VM.
115115

0 commit comments

Comments
 (0)