{"id":24004,"date":"2024-01-31T13:20:29","date_gmt":"2024-01-31T13:20:29","guid":{"rendered":"https:\/\/linuxways.net\/?p=24004"},"modified":"2024-01-31T13:25:40","modified_gmt":"2024-01-31T13:25:40","slug":"enable-ssh-debian-12","status":"publish","type":"post","link":"https:\/\/linuxways.net\/de\/debian\/enable-ssh-debian-12\/","title":{"rendered":"How to Enable SSH on Debian 12"},"content":{"rendered":"<p><strong>SSH<\/strong> <strong>(Secure Shell)<\/strong> protocol allows Debian users to enable encrypted connections and tunneling between two devices using the unsecured Internet. It is an essential tool in operating systems including Debian for transferring files from one device to another and remotely accessing the system\u2019s terminal. The conversations are like a secret tunnel that keeps the connection safe and private.<\/p>\n<p>The <strong>SSH <\/strong>runs at TCP\/IP port 22 and uses a client-server architecture where the client initiates a connection and requests a secure connection to the remote device. It makes the connection between remote servers and devices more secure.<\/p>\n<h2><strong>Quick Outline<\/strong><\/h2>\n<ul>\n<li><a href=\"#post-24004-_heading=h.9mo0legt1sd\"><strong>How to Install SSH on Debian 12<\/strong><\/a><\/li>\n<li><a href=\"#post-24004-_heading=h.mkfdrsz7csi4\"><strong>How to Start SSH Service on Debian 12<\/strong><\/a><\/li>\n<li><a href=\"#post-24004-_heading=h.cc6o4szbwplt\"><strong>How to Configure Firewall Status of SSH on Debian 12<\/strong><\/a><\/li>\n<li><a href=\"#post-24004-_heading=h.hraul6sworho\"><strong>How to Configure SSH on Debian 12<\/strong><\/a><\/li>\n<li><a href=\"#post-24004-_heading=h.vl9kibcpywe4\"><strong>How to Connect With Remote Device Using SSH on Debian 12<\/strong><\/a><\/li>\n<li><a href=\"#post-24004-_heading=h.y6gyhkto98vk\"><strong>How to Disable SSH on Debian 12<\/strong><\/a><\/li>\n<li><a href=\"#post-24004-_heading=h.f5tfdzp90r8q\"><strong>How to Uninstall SSH on Debian 12<\/strong><\/a><\/li>\n<li><a href=\"#post-24004-_heading=h.w77r1bvx4ow2\"><strong>Conclusion<\/strong><\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2><a id=\"post-24004-_heading=h.9mo0legt1sd\"><\/a><strong>How to Install SSH on Debian 12<\/strong><\/h2>\n<p>On some Linux distributions, <strong>SSH<\/strong> is not installed by default. You can check whether the <strong>SSH service<\/strong> is installed on your system by executing the following command:<\/p>\n<div class=\"codecolorer-container bash blackboard\" style=\"width:100%;\"><div class=\"bash codecolorer\"><span class=\"kw2\">ssh<\/span> localhost<\/div><\/div>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"656\" height=\"91\" class=\"wp-image-24015\" src=\"http:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-1.png\" srcset=\"https:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-1.png 656w, https:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-1-300x42.png 300w\" sizes=\"auto, (max-width: 656px) 100vw, 656px\" \/><\/p>\n<p>If the output is \u201c<strong>Connection refused<\/strong>\u201d, it is confirmed that the SSH server is not installed on your system.<\/p>\n<p>Update the system before installing the <strong>SSH server <\/strong>on Debian:<\/p>\n<div class=\"codecolorer-container bash blackboard\" style=\"width:100%;\"><div class=\"bash codecolorer\"><span class=\"kw2\">sudo<\/span> apt update <span class=\"sy0\">&amp;&amp;<\/span> <span class=\"kw2\">sudo<\/span> apt upgrade <span class=\"re5\">-y<\/span><\/div><\/div>\n<p>Once your system is up to date, run the following command on the terminal to install <strong>SSH <\/strong>on<strong> Debian<\/strong>:<\/p>\n<div class=\"codecolorer-container bash blackboard\" style=\"width:100%;\"><div class=\"bash codecolorer\"><span class=\"kw2\">sudo<\/span> apt <span class=\"kw2\">install<\/span> openssh-server <span class=\"re5\">-y<\/span><\/div><\/div>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"729\" height=\"363\" class=\"wp-image-24016\" src=\"http:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-2.png\" srcset=\"https:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-2.png 729w, https:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-2-300x149.png 300w\" sizes=\"auto, (max-width: 729px) 100vw, 729px\" \/><\/p>\n<p>You can also check the version of <strong>SSH<\/strong> on Debian to confirm its installation:<\/p>\n<div class=\"codecolorer-container bash blackboard\" style=\"width:100%;\"><div class=\"bash codecolorer\"><span class=\"kw2\">ssh<\/span> <span class=\"re5\">-V<\/span><\/div><\/div>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"666\" height=\"128\" class=\"wp-image-24020\" src=\"http:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-3.png\" srcset=\"https:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-3.png 666w, https:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-3-300x58.png 300w\" sizes=\"auto, (max-width: 666px) 100vw, 666px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h2><a id=\"post-24004-_heading=h.mkfdrsz7csi4\"><\/a><strong>How to Start SSH Service on Debian 12<\/strong><\/h2>\n<p>The <strong>SSH service <\/strong>automatically starts, once the process of installation completes. To verify <strong>SSH server <\/strong>is installed and running on your device, run the following <strong>systemctl<\/strong> command:<\/p>\n<div class=\"codecolorer-container bash blackboard\" style=\"width:100%;\"><div class=\"bash codecolorer\">systemctl status <span class=\"kw2\">ssh<\/span><\/div><\/div>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"745\" height=\"304\" class=\"wp-image-24025\" src=\"http:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-4.png\" srcset=\"https:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-4.png 745w, https:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-4-300x122.png 300w\" sizes=\"auto, (max-width: 745px) 100vw, 745px\" \/><\/p>\n<p>In case, the <strong>SSH server <\/strong>is not running on your system, run this command to enable it:<\/p>\n<div class=\"codecolorer-container bash blackboard\" style=\"width:100%;\"><div class=\"bash codecolorer\"><span class=\"kw2\">sudo<\/span> systemctl start <span class=\"kw2\">ssh<\/span><\/div><\/div>\n<p>The <strong>SSH server <\/strong>is successfully installed and running on your Debian system. You can also enable the <strong>SSH service <\/strong>on Debian through the following command, so it automatically starts wherever you boot the device:<\/p>\n<div class=\"codecolorer-container bash blackboard\" style=\"width:100%;\"><div class=\"bash codecolorer\"><span class=\"kw2\">sudo<\/span> systemctl <span class=\"kw3\">enable<\/span> <span class=\"kw2\">ssh<\/span><\/div><\/div>\n<p><strong><img loading=\"lazy\" decoding=\"async\" width=\"749\" height=\"124\" class=\"wp-image-24029\" src=\"http:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-5.png\" srcset=\"https:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-5.png 749w, https:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-5-300x50.png 300w\" sizes=\"auto, (max-width: 749px) 100vw, 749px\" \/><\/strong><\/p>\n<h2><a id=\"post-24004-_heading=h.cc6o4szbwplt\"><\/a><strong>How to Configure Firewall Status of SSH on Debian 12<\/strong><\/h2>\n<p>The <strong>SSH server <\/strong>runs on <strong>port 22<\/strong> by default and requires the approval of a Firewall on your system to establish a secure connection. To allow <strong>SSH <\/strong>over Firewall with <strong>UFW<\/strong>, execute the following command:<\/p>\n<div class=\"codecolorer-container bash blackboard\" style=\"width:100%;\"><div class=\"bash codecolorer\"><span class=\"kw2\">sudo<\/span> ufw allow <span class=\"kw2\">ssh<\/span><\/div><\/div>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"703\" height=\"120\" class=\"wp-image-24035\" src=\"http:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-6.png\" srcset=\"https:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-6.png 703w, https:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-6-300x51.png 300w\" sizes=\"auto, (max-width: 703px) 100vw, 703px\" \/><\/p>\n<p><strong>Note: <\/strong>Ensure <strong>UFW<\/strong> is installed on your system, if it\u2019s not, you can use the below-given command to install <strong>UFW<\/strong> on Debian 12:<\/p>\n<div class=\"codecolorer-container bash blackboard\" style=\"width:100%;\"><div class=\"bash codecolorer\"><span class=\"kw2\">sudo<\/span> apt <span class=\"kw2\">install<\/span> ufw <span class=\"re5\">-y<\/span><\/div><\/div>\n<p>If the <strong>SSH server<\/strong> is running over another port instead of 22 then specify the port using the following fundamental syntax:<\/p>\n<div class=\"codecolorer-container bash blackboard\" style=\"width:100%;\"><div class=\"bash codecolorer\"><span class=\"kw2\">sudo<\/span> ufw allow <span class=\"sy0\">&lt;<\/span>port-no<span class=\"sy0\">&gt;<\/span><\/div><\/div>\n<p>Execute the <strong>verbose <\/strong>command to verify the current status of <strong>SSH<\/strong> over the Firewall:<\/p>\n<div class=\"codecolorer-container bash blackboard\" style=\"width:100%;\"><div class=\"bash codecolorer\"><span class=\"kw2\">sudo<\/span> ufw status verbose<\/div><\/div>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"732\" height=\"249\" class=\"wp-image-24041\" src=\"http:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-7.png\" srcset=\"https:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-7.png 732w, https:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-7-300x102.png 300w\" sizes=\"auto, (max-width: 732px) 100vw, 732px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h2><a id=\"post-24004-_heading=h.hraul6sworho\"><\/a><strong>How to Configure SSH on Debian 12<\/strong><\/h2>\n<p>To improve the security of the device while using <strong>SSH<\/strong>, edit the <strong>SSH configuration<\/strong> file. To do this, first, open the <strong>SSH file<\/strong> on Debian using the below command:<\/p>\n<div class=\"codecolorer-container bash blackboard\" style=\"width:100%;\"><div class=\"bash codecolorer\"><span class=\"kw2\">sudo<\/span> <span class=\"kw2\">nano<\/span> <span class=\"sy0\">\/<\/span>etc<span class=\"sy0\">\/<\/span>ssh<span class=\"sy0\">\/<\/span>sshd_config<\/div><\/div>\n<p>The following are the various ways to improve the security of <strong>SSH <\/strong>on Debian 12:<\/p>\n<ul>\n<li><a href=\"#post-24004-bookmark=id.2et92p0\"><strong>Change Default Port of SSH<\/strong><\/a><\/li>\n<li><a href=\"#post-24004-bookmark=id.tyjcwt\"><strong>Limit the Number of Users<\/strong><\/a><\/li>\n<li><a href=\"#post-24004-bookmark=id.3dy6vkm\"><strong>Enable\/Disable Login as a Root<\/strong><\/a><\/li>\n<li><a href=\"#post-24004-bookmark=id.1t3h5sf\"><strong>Allow\/Deny Users<\/strong><\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><strong>1: Change Default Port of SSH<\/strong><\/h3>\n<p>You can change the default port 22 of <strong>SSH<\/strong> in Debian 12 for improving your device security. To do so, open the configuration file and look for line <strong>#Port 22. <\/strong>Next, uncomment the line and replace the <strong>22 <\/strong>with the desired port number:<\/p>\n<p><strong><img loading=\"lazy\" decoding=\"async\" width=\"748\" height=\"454\" class=\"wp-image-24049\" src=\"http:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-8.png\" srcset=\"https:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-8.png 748w, https:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-8-300x182.png 300w\" sizes=\"auto, (max-width: 748px) 100vw, 748px\" \/><\/strong><\/p>\n<p>&nbsp;<\/p>\n<h3><strong>2: Limit the Number of Users<\/strong><\/h3>\n<p>By default, the maximum session allowed by <strong>SSH<\/strong> is 10. If you want to limit the number of users to access your Debian 12 using <strong>SSH,<\/strong> then in the same configuration file, uncomment the line <strong>MaxSessions<\/strong> and change the number 10 with the number of your choice:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"743\" height=\"451\" class=\"wp-image-24058\" src=\"http:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-9.png\" srcset=\"https:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-9.png 743w, https:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-9-300x182.png 300w\" sizes=\"auto, (max-width: 743px) 100vw, 743px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h3><strong>3: Enable\/Disable Login as a Root<\/strong><\/h3>\n<p>Root login via <strong>SSH <\/strong>in Debian is permitted by default. However, you can change the settings if you want to remotely access your Debian system. Generally, it is not recommended to enable root login for security purposes. Instead, you can use the <strong>sudo <\/strong>prefix while executing the commands to run them as administrative. If you still want to do so, then in the file, find the <strong>PermitRootLogin prohibit-password. <\/strong>Uncomment the line and replace the <strong>prohibit-password<\/strong> with <strong>yes<\/strong> to enable or <strong>No<\/strong> to disable:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"748\" height=\"456\" class=\"wp-image-24073\" src=\"http:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-10.png\" srcset=\"https:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-10.png 748w, https:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-10-300x183.png 300w\" sizes=\"auto, (max-width: 748px) 100vw, 748px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h3><strong>4: Allow\/Deny Users<\/strong><\/h3>\n<p>You can allow or deny specific users to<strong> SSH<\/strong> into your Debian system. Add the following lines at the end of the file and replace the <strong>user_name<\/strong> with the name of the user you want to allow or block:<\/p>\n<div class=\"codecolorer-container bash blackboard\" style=\"width:100%;\"><div class=\"bash codecolorer\">AllowUsers <span class=\"sy0\">&lt;<\/span>user_name<span class=\"sy0\">&gt;<\/span><\/div><\/div>\n<p>To block users to <strong>SSH<\/strong> into Debian, add:<\/p>\n<div class=\"codecolorer-container bash blackboard\" style=\"width:100%;\"><div class=\"bash codecolorer\">DenyUsers <span class=\"sy0\">&lt;<\/span>user_name<span class=\"sy0\">&gt;<\/span><\/div><\/div>\n<p>Once you are done editing the configuration file of <strong>SSH<\/strong>, press <strong>Ctrl + X<\/strong> and hit <strong>Y<\/strong> to save the file. To apply the changes restart the service using the following command:<\/p>\n<div class=\"codecolorer-container bash blackboard\" style=\"width:100%;\"><div class=\"bash codecolorer\"><span class=\"kw2\">sudo<\/span> systemctl restart <span class=\"kw2\">ssh<\/span><\/div><\/div>\n<h2><a id=\"post-24004-_heading=h.vl9kibcpywe4\"><\/a><strong>How to Connect With Remote Device Using SSH on Debian 12<\/strong><\/h2>\n<p>The following are the prerequisites to connect to a remote device using <strong>SSH <\/strong>on Debian 12:<\/p>\n<ul>\n<li>The remote computer is turned on and has a secure SSH enabled.<\/li>\n<li>Obtain IP address and name of the host machine.<\/li>\n<li>Ensure you have permission to access the other device.<\/li>\n<li>Verify the firewall settings on both the host and remote servers.<\/li>\n<\/ul>\n<p>To set a secure remote connection with another device, the following is the basic syntax:<\/p>\n<div class=\"codecolorer-container bash blackboard\" style=\"width:100%;\"><div class=\"bash codecolorer\"><span class=\"kw2\">ssh<\/span> username<span class=\"sy0\">@<\/span>host_ip_address<\/div><\/div>\n<p>Here, the <strong>username<\/strong> is the server user name and <strong>host_ip_address<\/strong> is the IP address of the server you want to establish a connection with.<\/p>\n<p>To get the IP address of your system, execute the following command:<\/p>\n<div class=\"codecolorer-container bash blackboard\" style=\"width:100%;\"><div class=\"bash codecolorer\"><span class=\"kw2\">hostname<\/span> <span class=\"re5\">-I<\/span><\/div><\/div>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"116\" class=\"wp-image-24087\" src=\"http:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-11.png\" srcset=\"https:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-11.png 750w, https:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-11-300x46.png 300w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/p>\n<p>The following is the example command to establish a connection to the Debian system of username <strong>linuxways<\/strong>:<\/p>\n<div class=\"codecolorer-container bash blackboard\" style=\"width:100%;\"><div class=\"bash codecolorer\"><span class=\"kw2\">ssh<\/span> linuxways<span class=\"sy0\">@<\/span>192.168.18.44<\/div><\/div>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"877\" height=\"159\" class=\"wp-image-24099\" src=\"http:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-12.png\" srcset=\"https:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-12.png 877w, https:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-12-300x54.png 300w, https:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-12-768x139.png 768w\" sizes=\"auto, (max-width: 877px) 100vw, 877px\" \/><\/p>\n<p>A message will appear on your screen asking you to confirm, type <strong>yes <\/strong>and enter the <strong>password<\/strong> of the user name of the server to continue:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"950\" height=\"323\" class=\"wp-image-24111\" src=\"http:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-13.png\" srcset=\"https:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-13.png 950w, https:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-13-300x102.png 300w, https:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-13-768x261.png 768w\" sizes=\"auto, (max-width: 950px) 100vw, 950px\" \/><\/p>\n<p>Once done you will be able to log in to your debian system through <strong>SSH<\/strong>. To break or exit the connection, type the following command in the terminal:<\/p>\n<div class=\"codecolorer-container bash blackboard\" style=\"width:100%;\"><div class=\"bash codecolorer\"><span class=\"kw3\">exit<\/span><\/div><\/div>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"874\" height=\"153\" class=\"wp-image-24118\" src=\"http:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-14.png\" srcset=\"https:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-14.png 874w, https:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-14-300x53.png 300w, https:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-14-768x134.png 768w\" sizes=\"auto, (max-width: 874px) 100vw, 874px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h2><a id=\"post-24004-_heading=h.y6gyhkto98vk\"><\/a><strong>How to Disable SSH on Debian 12<\/strong><\/h2>\n<p>If you ever want to stop the <strong>SSH service<\/strong> on Debian 12, run the below-written command:<\/p>\n<div class=\"codecolorer-container bash blackboard\" style=\"width:100%;\"><div class=\"bash codecolorer\"><span class=\"kw2\">sudo<\/span> systemctl stop <span class=\"kw2\">ssh<\/span><\/div><\/div>\n<p>Moreover, you can also disable the <strong>SSH service<\/strong> from starting up automatically when you restart your system through the following command:<\/p>\n<div class=\"codecolorer-container bash blackboard\" style=\"width:100%;\"><div class=\"bash codecolorer\"><span class=\"kw2\">sudo<\/span> systemctl disable <span class=\"kw2\">ssh<\/span><\/div><\/div>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"751\" height=\"178\" class=\"wp-image-24126\" src=\"http:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-15.png\" srcset=\"https:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-15.png 751w, https:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-15-300x71.png 300w\" sizes=\"auto, (max-width: 751px) 100vw, 751px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h2><a id=\"post-24004-_heading=h.f5tfdzp90r8q\"><\/a><strong>How to Uninstall SSH on Debian 12<\/strong><\/h2>\n<p>Just run the following command to completely remove the <strong>SSH service <\/strong>from your Debian system:<\/p>\n<div class=\"codecolorer-container bash blackboard\" style=\"width:100%;\"><div class=\"bash codecolorer\"><span class=\"kw2\">sudo<\/span> apt remove openssh-server <span class=\"re5\">-y<\/span><\/div><\/div>\n<p><strong><img loading=\"lazy\" decoding=\"async\" width=\"728\" height=\"281\" class=\"wp-image-24135\" src=\"http:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-16.png\" srcset=\"https:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-16.png 728w, https:\/\/linuxways.net\/wp-content\/uploads\/2024\/01\/word-image-24004-16-300x116.png 300w\" sizes=\"auto, (max-width: 728px) 100vw, 728px\" \/><\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2><a id=\"post-24004-_heading=h.w77r1bvx4ow2\"><\/a><strong>Conclusion<\/strong><\/h2>\n<p><strong>SSH<\/strong> is a service that provides a secure and safe tunnel to connect with remote servers over the Internet. To connect with a remote host on Debian 12, you must have the necessary permissions, the IP address of the system, and its username. You should also require installing and enabling the <strong>SSH service <\/strong>in order to use it on your Debian system. The above-given sections of this article will help you in installing, enabling and making necessary changes to the configuration file. It will help you access the system remotely in a secure fashion and prevent unwanted access to your system.<\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Enabling the SSH server on Debian is easy, install the SSH server and run the sudo systemctl enable ssh command to enable the service.<\/p>","protected":false},"author":115,"featured_media":24197,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-24004","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-debian"],"_links":{"self":[{"href":"https:\/\/linuxways.net\/de\/wp-json\/wp\/v2\/posts\/24004","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/linuxways.net\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/linuxways.net\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/linuxways.net\/de\/wp-json\/wp\/v2\/users\/115"}],"replies":[{"embeddable":true,"href":"https:\/\/linuxways.net\/de\/wp-json\/wp\/v2\/comments?post=24004"}],"version-history":[{"count":0,"href":"https:\/\/linuxways.net\/de\/wp-json\/wp\/v2\/posts\/24004\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/linuxways.net\/de\/wp-json\/wp\/v2\/media\/24197"}],"wp:attachment":[{"href":"https:\/\/linuxways.net\/de\/wp-json\/wp\/v2\/media?parent=24004"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/linuxways.net\/de\/wp-json\/wp\/v2\/categories?post=24004"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/linuxways.net\/de\/wp-json\/wp\/v2\/tags?post=24004"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}