# Setting Up SSH Access in Pop!_OS (Proxmox VM)

**Date:** June 1st, 2025  
**Category:** Remote Access / Virtual Machine Setup  
**Backlink:** [Installing Pop!\_OS (NVIDIA Edition) in Proxmox with GPU Passthrough](https://docs.natenetworks.com/books/09-proxmox/page/project-proxmox-standalone-gpu-passthrough-server-build)

<div id="bkmrk-">---

</div>## Goal

Enable secure remote access to your Pop!\_OS virtual machine via SSH.

<div id="bkmrk--1">---

</div>## Step 1: Install and Enable OpenSSH Server

Open a terminal in your Pop!\_OS VM and run:

```
sudo apt update
sudo apt install openssh-server -y
```

Then start and enable the service:

```
sudo systemctl enable ssh
sudo systemctl start ssh
```

[![image.png](https://docs.natenetworks.com/uploads/images/gallery/2025-06/scaled-1680-/yPEYyIf2MzQA4rDy-image.png)](https://docs.natenetworks.com/uploads/images/gallery/2025-06/yPEYyIf2MzQA4rDy-image.png)

<div id="bkmrk--3">---

</div>## Step 2: Verify SSH is Running

Check the status of the SSH server:

```
sudo systemctl status ssh
```

You should see:

- `Active: active (running)`

[![image.png](https://docs.natenetworks.com/uploads/images/gallery/2025-06/scaled-1680-/QGJup0ZW02p9FcjX-image.png)](https://docs.natenetworks.com/uploads/images/gallery/2025-06/QGJup0ZW02p9FcjX-image.png)

<div id="bkmrk--5">---

</div>## Step 3: Find the IP Address

You can find the IP address in two ways:

- **From Proxmox Dashboard**: Under the VM summary tab
- **Inside Pop!\_OS**:

```
ip a | grep inet
```

[![image.png](https://docs.natenetworks.com/uploads/images/gallery/2025-06/scaled-1680-/DGzdnGNpVbSpHdmu-image.png)](https://docs.natenetworks.com/uploads/images/gallery/2025-06/DGzdnGNpVbSpHdmu-image.png)

<div id="bkmrk--7">---

</div>## Step 4: SSH From Another Machine

From your host machine or another computer on the LAN, connect:

```bash
ssh zippyb@192.168.1.151
```

You’ll be prompted to accept the fingerprint and then enter your user password.

[![image.png](https://docs.natenetworks.com/uploads/images/gallery/2025-06/scaled-1680-/Rs8QEqXBVOSCxqfL-image.png)](https://docs.natenetworks.com/uploads/images/gallery/2025-06/Rs8QEqXBVOSCxqfL-image.png)

<div id="bkmrk--9">---

</div>## Optional: Use SCP to Transfer Files

```powershell
scp file.txt zippyb@192.168.1.151:/home/nate/
```

Or use `rsync` for large/recurring syncs:

```powershell
rsync -avz project/ zippyb@192.168.1.151:/home/nate/project/
```

<div id="bkmrk--10">---

</div>## Step 4: Enable and Configure UFW Firewall

1. Enable UFW:

```bash
sudo ufw enable
```

2. Allow SSH through the firewall:

```bash
sudo ufw allow ssh
```

3. Check firewall status:

```bash
sudo ufw status verbose
```

[![image.png](https://docs.natenetworks.com/uploads/images/gallery/2025-06/scaled-1680-/mjtqmqHSN387EFCc-image.png)](https://docs.natenetworks.com/uploads/images/gallery/2025-06/mjtqmqHSN387EFCc-image.png)

<div id="bkmrk--12">---

</div>## Done

I can now securely connect to my Pop!\_OS VM using SSH for remote configuration and file transfers.