Connecting via SSH to Server (Putty)

Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. The best known example application is for remote login to computer systems by users.

SSH provides a secure channel over an unsecured network in a client-server architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH. The protocol specification distinguishes between two major versions, referred to as SSH-1 and SSH-2.

Connecting to the server

  • Mac OS User’s have already  SSH terminal by default.
  • Windows based Systems do not come with an SSH client by default.
  • Windows User need to install putty  (Download)
  • Linux User have already  SSH terminal by default.

Login credentials

  • If your Host provider provides PassWord for the login then you don’t need to do  much 🙂
  • if your host provides key’s like .pem or in other format then you need to convert in .ppk format to access your server using putty. (Only Window’s User need to convert there files )

Converting your key to .ppk  format using putty gen

  1. Start PuTTYgen .
  2. Choose Load. By default, PuTTYgen displays files with the extension .ppk.  locate your .pem file by selecting the option to display files of all types.

  3. Select your .pem file for the key pair that you specified when you launched your instance, and then choose Open. Choose OK to dismiss the confirmation dialog box.
  4. Choose Save private key  Option and Save your File .  PuTTYgen will display a warning about saving the key without a passphrase. Click on Yes.
  5. Now save your File 🙂 .

    Starting a PuTTY Session

    To start a PuTTY session

    1. Open PuTTY.
    2. In the Category pane, choose Session and complete the following fields:
      1. In the Host Name box, enter user_name@public_dns_name  or user_name@elastic-ip 
      2. you can choose a username from below list  if you are confused 🙂 .
        • For an Amazon Linux AMI, the user name is ec2-user.
        • For a RHEL AMI, the user name is ec2-user or root.
        • For an Ubuntu AMI, the user name is ubuntu or root.
        • For a Centos AMI, the user name is centos.
        • For a Fedora AMI, the user name is ec2-user.
        • For SUSE, the user name is ec2-user or root.
        • Otherwise, if ec2-user and root don’t work, check with the AMI provider.
      3. Under Connection type, select SSH.
      4. Ensure that Port is 22.
    3. In the Category pane, expand Connection, expand SSH, and then choose Auth. Complete the following:
      1. Choose Browse.
      2. Select the .ppk file that you generated for your key pair, and then choose Open.
      3. Choose Session in the Category tree, enter a name for the session in Saved Sessions, and then choose Save.
      4. Choose Open to start the PuTTY session.
    4. If this is the first time you have connected to this instance, PuTTY displays a security alert dialog box that asks whether you trust the host you are connecting to.
    5. (Optional) Verify that the fingerprint in the security alert dialog box matches the fingerprint that you previously obtained in step 1. If these fingerprints don’t match, someone might be attempting a “man-in-the-middle” attack. If they match, continue to the next step.
    6. Choose Yes. A window opens and you are connected to your instance.

      Woo!!  we are connected 🙂


Leave a comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: