Support for remote access error (Linux)
    • PDF

    Support for remote access error (Linux)

    • PDF

    Article Summary

    Available in Classic

    This document describes how to troubleshoot symptoms of server remote access errors in the Linux environment.

    Check Linux server remote access settings

    To remotely access the Linux server, ensure that the IP or subnet of the server to access is applied to the ACG. If not applied, see Set ACG and change the ACG settings.

    If there is no problem in ACG settings, check the following matters:

    • Check if the server allows access to SSH/RDP service.

      • SSH service: TCP, allowed port 22
      • RDP service: TCP, allowed port 3389
      Note

      If the port setting on the server has been changed, update the settings accordingly.

    • Check the port forwarding settings.

      • If both public IP and port forwarding are set simultaneously, you cannot communicate through a public IP. When using a public IP, remove the port forward settings.

    Even if no problem is found as a result of checking the above, the SSH service port or the RDP service port may not work normally for various reasons. In this case, the [Server connection console] button is activated in the server information of NAVER Cloud Platform console. To resolve this issue, see Troubleshooting Linux server remote access errors.
    server-ts-remote-lin-classic_image01_en

    Troubleshooting Linux server remote access errors

    If Linux server remote access errors occur, see the OS-specific solutions to troubleshoot them.

    CentOS 7

    To troubleshoot a remote access error on CentOS 7 in Linux environment, perform the following steps in order.

    1. Check daemon status

    To check the daemon status, perform the following steps in order.

    1. Run the following command to check if the daemon is properly running.

      systemctl status sshd
      

      server-ts-remote-lin-classic_image02

      • If the daemon is inactive, try to start. If an error occurs, check the server log to ensure that the sshd daemon can properly start.
    2. Run the following command to check if ssh is LISTEN on port 22.

      netstat -nap | grep ssh
      

      server-ts-remote-lin-classic_image03

      Note
      • The default setting on NAVER Cloud Platform's server is port 22.
      • If the port setting on the server has been changed, update the settings accordingly.
    3. Run the following command to check if the port and ListenAddress have any settings.

      vi /etc/ssh/sshd_config
      

      server-ts-remote-lin-classic_image04

      • The default setting is annotated.

    2. Check status of hosts.deny setting

    The hosts.allow and hosts.deny files control the service to allow or block specific clients only.
    Check if the hosts.allow and hosts.deny files have any settings. The default setting is annotated.
    server-ts-remote-lin-classic_image05

    Note
    • The /etc/hosts.allow and /etc/hosts.deny files control only tcp_wrappers. Apply the rules in the following order:
      1. Set to allow what is defined in the /etc/hosts.allow file.
      2. Set to block what is not defined in the /etc/hosts.allow file but is defined in /etc/hosts.deny the file.
      3. Set to allow what is defined in both /etc/hosts.allow and /etc/hosts.deny files.
    • It can control certain services of the daemon managed by tcp_wrappers and xinetd.
      <example> ssh, telnet, ftp

    3. Check firewall

    Check the firewall with the following:

    a. iptables

    If iptables.service is installed, the daemon is also affected by rules even in the inactive status and excludes the rules to block ssh in iptables rules. No applied rules in default setting.
    server-ts-remote-lin-classic_image06

    b. firewalld

    The firewalld is not applied if the daemon is inactive. If you need to run firewalld, exclude the rule to block ssh. No applied rules in default setting.
    server-ts-remote-lin-classic_image07

    4. Check routing

    Without a default route for eth0, it cannot communicate. Set the default route for eth0.
    server-ts-remote-lin-classic_image08

    5. Check authority problem

    Depending on the ssh config, remote access of the root account may be blocked. If unable to access through root, try connecting with a regular account. If you don't have a regular access account, activate the server connection console to access root.

    Ubuntu 18.04

    To troubleshoot a remote access error on Ubuntu 18.04 in Linux environment, perform the following steps in order.

    1. Check daemon status

    To check the daemon status, perform the following steps in order.

    1. Run the following command to check if the daemon is properly running.

      systemctl status sshd
      

      server-ts-remote-lin-classic_image10

      • If the daemon is inactive, try to start. If an error occurs, check the server log to ensure that the sshd daemon can properly start.
    2. Run the following command to check if it is LISTEN on the ssh port.

      netstat -nap | grep ssh
      

      server-ts-remote-lin-classic_image11

      Note
      • The default setting on NAVER Cloud Platform's server is port 22.

      • If the port setting on the server has been changed, update the settings accordingly.

    3. Run the following command to check if the port and ListenAddress have any settings.

      vi /etc/ssh/sshd_config
      

      server-ts-remote-lin-classic_image12

      • The default setting is annotated.

    2. Check status of hosts.deny setting

    The hosts.allow and hosts.deny files control the service to allow or block specific clients only.
    Check if the hosts.allow and hosts.deny files have any settings. The default setting is annotated.
    server-ts-remote-lin-classic_image13

    Note
    • The /etc/hosts.allow and /etc/hosts.deny files control only tcp_wrappers. Apply the rules in the following order:
      1. Set to allow what is defined in the /etc/hosts.allow file.
      2. Set to block what is not defined in the /etc/hosts.allow file but is defined in /etc/hosts.deny the file.
      3. Set to allow what is defined in both /etc/hosts.allow and /etc/hosts.deny files.
    • It can control certain services of the daemon managed by tcp_wrappers and xinetd.
      <example> ssh, telnet, ftp

    3. Check firewall

    Check the firewall with the following:

    a. iptables

    If iptables.service is installed, the daemon is also affected by rules even in the inactive status and excludes the rules to block ssh in iptables rules. No applied rules in default setting.
    server-ts-remote-lin-classic_image14

    b. ufw

    The ufw is not applied if the daemon is inactive. If you need to run ufw, exclude the rule to block ssh. No applied rules in default setting.
    server-ts-remote-lin-classic_image15

    4. Check routing

    Without a default route for eth0, it cannot communicate. Set the default route for eth0.
    server-ts-remote-lin-classic_image16

    5. Check authority problem

    Depending on the ssh config, remote access of the root account may be blocked. If unable to access through root, try connecting with a regular account. If you don't have a regular access account, activate the server connection console to access root.


    Was this article helpful?

    Changing your password will log you out immediately. Use the new password to log back in.
    First name must have atleast 2 characters. Numbers and special characters are not allowed.
    Last name must have atleast 1 characters. Numbers and special characters are not allowed.
    Enter a valid email
    Enter a valid password
    Your profile has been successfully updated.