Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell PowerProtect Cyber Recovery 19.12 on Google Cloud Platform Deployment Guide

PDF

Creating SSH keys

Create SSH keys to be able to access the Cyber Recovery management host from the jump host.

About this task

During the deployment, SSH keys were not applied to the Cyber Recovery management host instance. These keys must be available to access the Cyber Recovery management host.

Steps

  1. From your local workstation, go to the directory in which you want to create the SSH keys.

    For example:

     cd C:/Users/<localuser>/Desktop
  2. Run the following command to generate a private and public key:
    ssh-keygen -t rsa -m PEM -f .\cruser-key-file -C cruser -b 2048
    NOTE cruser is a built-in operating system user on the Cyber Recovery management host.
  3. Do not enter a passphrase at each of the two prompts; press Enter twice.
    The command creates a public key, which will be used for the Cyber Recovery management host and a private key, which will be used for the jump host.
  4. Copy the contents of the public key to the Cyber Recovery management host:
    1. Copy the contents of the public key that you created in step 2.
    2. From the Google Cloud portal, click Compute Engine and click the Cyber Recovery management host instance.
    3. Click Edit on the top menu bar.
    4. Scroll to Security and Access.
    5. Under SSH Keys, click ADD ITEM, paste the contents of the public key, and then click Save.
  5. Copy the contents of the private key to the jump host:
    1. Copy the contents of the private key that you created in step 2.
    2. Use Remote Desktop Protocol (RDP) to log in to the jump host.
    3. On the jump host, create a file using Notepad and paste the contents of the private key.
    4. Save the file as a .pem file.

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\