How To Assign IP Address To Remote Linux Systems Via SSH
This guide demonstrates how to assign an IP address to a remote Linux system using the nmcli
command. This is useful for various reasons, including network policy compliance, troubleshooting, network migration, and enhanced security.
Several scenarios necessitate remote IP address changes:
- Network Policy Adherence: Many organizations mandate specific IP address ranges.
- Network Troubleshooting: Altering the IP address can sometimes resolve network issues.
- Network Migration: Moving a system to a new network requires an IP address change.
- Security Enhancement: A new IP address makes the system harder for attackers to identify.
Using nmcli
via SSH provides a convenient solution.
Assigning an IP Address with nmcli
First, identify the remote system's network interface using:
ssh user@remote_ip 'nmcli con show'
Replace user
and remote_ip
with the appropriate credentials. The output will show the network interface name (e.g., Wired connection 1
).
Next, modify the IP address using:
ssh -t user@remote_ip "sudo nmcli con modify 'Interface Name' ipv4.address new_ip/subnet_mask"
Replace Interface Name
, new_ip
, and subnet_mask
with the correct values (e.g., "Wired connection 1"
, 192.168.1.50/24
). The -t
flag ensures proper password prompting. You'll be prompted for the remote user's password, and then for sudo
on the remote machine.
Verify the change with:
ssh user@remote_ip "ip addr show interface_name"
Replace interface_name
with the interface's name (e.g., ens18
).
Alternative (Insecure) Method:
While less secure, you can use echo
and piping to avoid repeated password entry:
echo 'password' | ssh -t user@remote_ip "sudo -S nmcli con modify 'Interface Name' ipv4.address new_ip/subnet_mask"
Caution: This method exposes your password and is strongly discouraged. Using SSH keys is the recommended secure approach.
Automated Script:
A Bash script, nmcli_remote_ip_changer.sh
, simplifies this process. It prompts for remote credentials, identifies interfaces, and applies the new IP configuration, including gateway and DNS settings. The script can be found at [GitHub Link - Replace with actual GitHub link if available]. Remember to make it executable (chmod x nmcli_remote_ip_changer.sh
) before running.
Conclusion:
nmcli
offers a streamlined method for managing remote Linux system IP addresses. While direct command execution is efficient, using a script like nmcli_remote_ip_changer.sh
enhances usability and security when coupled with SSH key-based authentication. Prioritize secure practices to protect your systems.
The above is the detailed content of How To Assign IP Address To Remote Linux Systems Via SSH. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

Linux is best used as server management, embedded systems and desktop environments. 1) In server management, Linux is used to host websites, databases, and applications, providing stability and reliability. 2) In embedded systems, Linux is widely used in smart home and automotive electronic systems because of its flexibility and stability. 3) In the desktop environment, Linux provides rich applications and efficient performance.

The five basic components of Linux are: 1. The kernel, managing hardware resources; 2. The system library, providing functions and services; 3. Shell, the interface for users to interact with the system; 4. The file system, storing and organizing data; 5. Applications, using system resources to implement functions.

Linux system management ensures the system stability, efficiency and security through configuration, monitoring and maintenance. 1. Master shell commands such as top and systemctl. 2. Use apt or yum to manage the software package. 3. Write automated scripts to improve efficiency. 4. Common debugging errors such as permission problems. 5. Optimize performance through monitoring tools.

Linux is widely used in servers, embedded systems and desktop environments. 1) In the server field, Linux has become an ideal choice for hosting websites, databases and applications due to its stability and security. 2) In embedded systems, Linux is popular for its high customization and efficiency. 3) In the desktop environment, Linux provides a variety of desktop environments to meet the needs of different users.

The methods for basic Linux learning from scratch include: 1. Understand the file system and command line interface, 2. Master basic commands such as ls, cd, mkdir, 3. Learn file operations, such as creating and editing files, 4. Explore advanced usage such as pipelines and grep commands, 5. Master debugging skills and performance optimization, 6. Continuously improve skills through practice and exploration.

Linuxisfundamentallyfree,embodying"freeasinfreedom"whichallowsuserstorun,study,share,andmodifythesoftware.However,costsmayarisefromprofessionalsupport,commercialdistributions,proprietaryhardwaredrivers,andlearningresources.Despitethesepoten

Linux devices are hardware devices running Linux operating systems, including servers, personal computers, smartphones and embedded systems. They take advantage of the power of Linux to perform various tasks such as website hosting and big data analytics.

The disadvantages of Linux include user experience, software compatibility, hardware support, and learning curve. 1. The user experience is not as friendly as Windows or macOS, and it relies on the command line interface. 2. The software compatibility is not as good as other systems and lacks native versions of many commercial software. 3. Hardware support is not as comprehensive as Windows, and drivers may be compiled manually. 4. The learning curve is steep, and mastering command line operations requires time and patience.
