VPN and GNU/Linux at the University of South Wales

Size: px
Start display at page:

Download "VPN and GNU/Linux at the University of South Wales"

Transcription

1 VPN and GNU/Linux at the University of South Wales These notes are designed to help staff and research students at the University of South Wales connect to their desktop machines using GNU/Linux. You will of course have had to register your username as using vpn with LCSS. The information here is just a consolidation of information held on other publically accessible web servers. Advantages The advantages with this approach are: performance. there is no modification to the kernel, and no proprietry binary modules need to be installed. inpractice both of these advantages mean that the operating system is less likely to crash. ituses thevpnc package which only does one thing and one thing well - namely it creates the vnc connection. using the following steps you should be able to route remote desktop packets to your desktop, any local browsing activity will go to the wider Internet via the ISP rather than via the University. Only DNS queries referencing.glam.ac.uk go to the University nameserver. This improves performance considerably as all packets traversing the vpn tunnel must be encrypted and decrypted. no need to run virtualisation to get the benefits above. Many Windows or Mac users perhaps use VMWare or an equivalent to get the above benefits, that solution does the job however it is really rather like using a sledgehammer to crack a nut. This solution uses much less code to solve the same problem allowing your desktop to run much faster. Disadvantages this solution is not supported by LCSS and you have to follow the instructions below. the instructions only apply to Debian GNU/Linux or Ubuntu - although most of these instructions would probably, with a little modification, work on other GNU/Linux distributions. I think that with even more changes they would also work under MacOS and FreeBSD systems. With a full moon and the realignment of the seven sisters of Pleiades into a regular heptagon they could be adapted to run under cygwin. there is no double click to install all of this.. vpnc Download a copy ofvpnc from here massar/vpnc/ vpnc tar.gz and extract it. You can do this from the command line (open a gnome-terminal) as follows: $ wget massar/vpnc/vpnc tar.gz $ tar zxf vpnc tar.gz now install thelibcrypt11 andlibgpg-error-dev libraries

2 -2- $ sudo apt-get install libgcrypt11-dev libgpg-error-dev (redhat users can install these by) $ sudo yum install libgcrypt-devel libgpg-error-devel now webuild and install the software: $ cd vpnc $ make $ sudo make install download a copy ofthe Windows XP UoG vpn package, extract the pcf file convert and install it into the vpnc directory. $ cd.. $ wget $ mkdir xp-vpn $ cd xp-vpn $ unzip../uogvpn exe $ cd../vpnc $./pcf2vpnc../xp-vpn/uog-vpn.pcf uog.conf $ sudo cp uog.pcf /etc/vpnc/uog.conf at this point you should be able to create a vpn tunnel with the University but it won t bemuch use yet.. Anyhow itwould be a good idea to test what has been installed. To dothis you can: $ sudo vpnc uog VPNC started in background (pid: 15343)... $ sudo route j1vpn3030g-e2.n merlin.example UGH 0 0 0eth * U 0 0 0tun0 default * U 0 0 0tun0 $ sudo vpnc-disconnect Terminating vpnc daemon (pid: 15343) Notice that the tun0 device has come to life and it is set as the default route. The tun0 device will encrypt all packets securely and send them to the University vpn server which in turn decrypts and passes them onto the local network. Now install dnsmasq which will resolve our dns queries and decide which queries need to go along the slow tunnel to work and which ones can be more efficiently sent directly unencrypted to our ISP. The dnsmasq package has a pleasant side effect of caching dns requests, vastly improving the browsing experience. $ sudo apt-get install dnsmasq

3 -3- edit/etc/dnsmasq.conf, and search for the three lines which are: Add other name servers here, with domain specs if they are for non-public domains. server=/localnet/ then add the following line Add other name servers here, with domain specs if they are for non-public domains. server=/localnet/ server=/glam.ac.uk/ this says any dns query matching.glam.ac.uk will be resolved by the University nameserver ( ) also alter the last line of these three Ifyou don t want dnsmasq to poll /etc/resolv.conf or other resolv files for changes and re-read them then uncomment this. no-poll to Ifyou don t want dnsmasq to poll /etc/resolv.conf or other resolv files for changes and re-read them then uncomment this. no-poll Now copy and paste this script into a file called vpn. Essentially all packets which are destined to the University go slowly over thetun0 device and all other go quickly unencrypted to our ISP. You should check (and maybe modify the line following "YOUR desktop net id"). Currently the script will redirect any traffic to the tun0 device. Your desktop net id might be different - to check run /usr/sbin/ifconfig on your desktop and note the network address.

4 -4-!/bin/bash export PATH=/sbin:/usr/local/sbin:$PATH echo "Starting vpn..." vpnc uog default route goes to ISP route add default gw add route for.glam.ac.uk nameserver (remember that dnsmasq only uses this for.glam.ac.uk requests) route add -net netmask dev tun0 add route onto network: mcgreg, floppsie and moppsy route add -net netmask dev tun0 and add route to desktop subnet you might need to alter the following line to match YOUR desktop net id route add -net netmask dev tun0 finally print route info route echo "Press enter to stop vpn" read ans vpnc-disconnect sleep 2 route Now make this script executable via: $ chmod 700 vpn $ cp vpn /usr/local/sbin to invoke the vpn script type: $ sudo /usr/local/sbin/vpn you should see the following:

5 -5- Starting vpn... VPNC started in background (pid: 15972)... j1vpn3030g-e2.n merlin.example UGH 0 0 0eth * U 0 0 0tun * U 0 0 0tun * U 0 0 0tun * U 0 0 0tun0 default merlin.example UG 0 0 0eth1 default * U 0 0 0tun0 Press enter to stop vpn You can now connect to mcgreg.comp.glam.ac.uk using ssh, or to your Windows desktop via the GNU/Linux rdesktop client. To test that different routes are taken try using traceroute: $ traceroute traceroute to ( ), 30 hops max, 52 byte packets 1merlin.example.org ( ) ms ms ms 2sgrs-lns-01-lo0.onetel.net.uk ( ) ms ms ms ˆC $ traceroute mcgreg.comp.glam.ac.uk traceroute to mcgreg.comp.glam.ac.uk ( ), 30 hops max, 52 byte packets 1j1vpn3030g-e2.net.glam.ac.uk ( ) ms ms ms ˆC It is interesting to see that the encrypted route is nearly twice as slow asthe unencrypted route. When you wish to disconnect the vpn tunnel press the <enter> key in the gnome-terminal window. You should see the following messages: Terminating vpnc daemon (pid: 15972) default merlin.example UG 0 0 0eth1

GNU/Linux: An Essential Guide for Students Undertaking BLOSSOM

GNU/Linux: An Essential Guide for Students Undertaking BLOSSOM Copyright: The development of this document is funded by Higher Education of Academy. Permission is granted to copy, distribute and /or modify this document under a license compliant with the Creative

More information

Computer Systems and Architecture

Computer Systems and Architecture Computer Systems and Architecture Introduction to UNIX Stephen Pauwels University of Antwerp October 2, 2015 Outline What is Unix? Getting started Streams Exercises UNIX Operating system Servers, desktops,

More information

COMPUTER NETWORKING LAB EXERCISES (TP) 4

COMPUTER NETWORKING LAB EXERCISES (TP) 4 Name 1: Name 2: Group number: COMPUTER NETWORKING LAB EXERCISES (TP) 4 IPV6 December 14, 2009 Abstract In this TP you will revisit some of the basic networking tools that were introduced in TP1, only this

More information

Endian Proxy / Firewall

Endian Proxy / Firewall Endian Proxy / Firewall Created October 27, 2006 by Bruce A. Westbrook Revisions: Introduction This document describes the step by step process of installing and configuring the Endian Firewall, Community

More information

Computer Systems and Architecture

Computer Systems and Architecture Computer Systems and Architecture Stephen Pauwels Computer Systems Academic Year 2018-2019 Overview of the Semester UNIX Introductie Regular Expressions Scripting Data Representation Integers, Fixed point,

More information

3 Connection, Shell Serial Connection over Console Port SSH Connection Internet Connection... 5

3 Connection, Shell Serial Connection over Console Port SSH Connection Internet Connection... 5 Contents 1 Description 2 2 Supported Devices 3 3 Connection, Shell 4 3.1 Serial Connection over Console Port...................... 4 3.2 SSH Connection................................. 4 3.3 Internet Connection...............................

More information

Linux Essentials Objectives Topics:

Linux Essentials Objectives Topics: Linux Essentials Linux Essentials is a professional development certificate program that covers basic knowledge for those working and studying Open Source and various distributions of Linux. Exam Objectives

More information

Using TU Eindhoven s VPN with Ubuntu

Using TU Eindhoven s VPN with Ubuntu Using TU Eindhoven's VPN with Ubuntu 14.04 or 16.04 TU Eindhoven s Virtual Private Networking (VPN) service can be used on Linux computers. This document describes how to do it using Ubuntu 14.04 or 16.04

More information

How to Use This Lab Manual

How to Use This Lab Manual 3 Contents How to Use This Lab Manual........................................ 5 Lab 1: Setting Up the Student System.................................. 7 Lab 2: Installing Fedora............................................

More information

VPN-against-Firewall Lab: Bypassing Firewalls using VPN

VPN-against-Firewall Lab: Bypassing Firewalls using VPN SEED Labs 1 VPN-against-Firewall Lab: Bypassing Firewalls using VPN Copyright c 2016 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science Foundation

More information

My problem was not understanding that each tunnel had to be on it's own network. I took subnet as; I could assign each tunnel to an address like

My problem was not understanding that each tunnel had to be on it's own network. I took subnet as; I could assign each tunnel to an address like {Network & Hardware layout} First I'll describe my network setup and platform. We have 9 private networks on the 192.168.x.x network, connected via a core router and 1 Mandrake Linux 9.2 server with 2

More information

Laboratory 2 Dynamic routing using RIP. Iptables. Part1. Dynamic Routing

Laboratory 2 Dynamic routing using RIP. Iptables. Part1. Dynamic Routing Introduction Laboratory 2 Dynamic routing using RIP. Iptables. Part1. Dynamic Routing Static routing has the advantage that it is simple, requires no computing power in router for determining routes (this

More information

Wireless Network Access at Swinburne Using FreeBSD 5.3

Wireless Network Access at Swinburne Using FreeBSD 5.3 802.11 Wireless Network Access at Swinburne Using FreeBSD 5.3 CAIA Technical Report 041221A Jason But December 21st, 2004 Introduction FreeBSD is a UNIX oriented operating system which is also the default

More information

Getting Familiar with the C-BGP Simulator

Getting Familiar with the C-BGP Simulator Getting Familiar with the C-BGP Simulator Anuj Sehgal, Jürgen Schönwälder School of Engineering and Science Jacobs University Bremen, Germany {s.anuj, j.schoenwaelder}@jacobs-university.de October 24,

More information

Sirindhorn International Institute of Technology Thammasat University

Sirindhorn International Institute of Technology Thammasat University Name.............................. ID............... Section...... Seat No...... Sirindhorn International Institute of Technology Thammasat University Course Title: IT Security Instructor: Steven Gordon

More information

Relay Proxy User Guide

Relay Proxy User Guide Relay Proxy User Guide DBL Technology Company Limited www.dbltek.com sales@dbltek.com support@dbltek.com 2016/5/30 Relay Proxy Relay Proxy is a server software developed by DBL Technology. Its main purposed

More information

Remote GUI access to a Linux computer using Tightvnc

Remote GUI access to a Linux computer using Tightvnc Remote GUI access to a Linux computer using Tightvnc The command line is a great way to manage a remote Linux computer if you don't mind typing in commands, but sometimes you need to be able to view a

More information

Sophos Connect. help

Sophos Connect. help help Contents About... 1 Installing...1 Uninstalling... 1 Connections...3 Import connection... 3 Connect...4 Connection options...7 Events...9 Troubleshooting events... 10 General troubleshooting... 13

More information

Unit- 5. Linux Systems

Unit- 5. Linux Systems Unit- 5 Linux System- Basic Concepts; System Administration-Requirements for Linux System Administrator, Setting up a LINUX Multifunction Server, Domain Name System, Setting Up Local Network Services;

More information

Geneious Floating License Manager Version Biomatters Ltd

Geneious Floating License Manager Version Biomatters Ltd Geneious Floating License Manager Version 2.1.2 Biomatters Ltd April 10, 2018 2 Introduction A Geneious Floating License is provided by a server to clients that can request a license over a network. The

More information

Geneious Floating License Manager Version Biomatters Ltd

Geneious Floating License Manager Version Biomatters Ltd Geneious Floating License Manager Version 2.1.2 Biomatters Ltd August 31, 2016 2 Introduction A Geneious Floating License is provided by a server to clients that can request a license over a network. The

More information

CS197U: A Hands on Introduction to Unix

CS197U: A Hands on Introduction to Unix CS197U: A Hands on Introduction to Unix Lecture 4: My First Linux System Tian Guo University of Massachusetts Amherst CICS 1 Reminders Assignment 2 was due before class Assignment 3 will be posted soon

More information

Installation Manual InfraManage.NET Installation Instructions for Ubuntu

Installation Manual InfraManage.NET Installation Instructions for Ubuntu Installation Manual InfraManage.NET Installation Instructions for Ubuntu Copyright 1996 2017 Timothy Ste. Marie Version 7.5.72SQL InfraManage.NET Installing InfraManage.NET Page 1 of 78 Table of Contents

More information

Molecular Forecaster Inc. Forecaster 1.2 Server Installation Guide

Molecular Forecaster Inc. Forecaster 1.2 Server Installation Guide Molecular Forecaster Inc. Forecaster 1.2 Server Installation Guide 13 June 2014 CONTENTS Windows... 4 Linux... 4 Installation Procedures... 4 Windows Installation... 4 Linux portable Installation... 5

More information

Linux. An introduction. Aurélien Villani 01/2018

Linux. An introduction. Aurélien Villani 01/2018 Linux An introduction Aurélien Villani 01/2018 Linux? 2 References Somewhere on the baie-lgf, are some Linux books. 3 Linux? A kernel... 1991: released by Linus Torvalds, for fun 1993: 100 developers working

More information

How to Deploy Axon on VMware vcenter

How to Deploy Axon on VMware vcenter How to Deploy Axon on VMware vcenter Copyright Informatica LLC 2017. Informatica, the Informatica logo, Intelligent Data Lake, Big Data Mangement, and Live Data Map are trademarks or registered trademarks

More information

RG-MACC_2.0 Installation Manual

RG-MACC_2.0 Installation Manual RG-MACC_2.0 Installation Manual Ruijie Networks Co., Ltd all rights reserved 1 Copyright Clarify Copyright ownership belongs to Ruijie, shall not be reproduced, copied, or used in other ways without permission.

More information

ITEC451 Network Design & Analysis Laboratory Guide: Appendix

ITEC451 Network Design & Analysis Laboratory Guide: Appendix Linux Guide Accessing the command prompt Before you can access the command prompt, you must login to the system. The administrative user on Linux machines is named root. On most Linux distributions, you

More information

Laboratory Exercise: Session Data

Laboratory Exercise: Session Data Goals Laboratory Exercise: Session Data 1. To understand its basic components and architecture of a session based network monitoring system. 2. To be able to install and configure one such system, based

More information

Communication protocols and services

Communication protocols and services This chapter describes various protocols and that may be enabled on Modberry. SSH Connection SSH service is started up on boot and already preinstalled and configured. You may access your device through

More information

How much memory users uses in GNU / Linux and FreeBSD - Commands and Scripts to find user memory usage on Linux

How much memory users uses in GNU / Linux and FreeBSD - Commands and Scripts to find user memory usage on Linux How much memory users uses in GNU / Linux and FreeBSD - Commands and Scripts to find user memory usage on Linux Author : admin If you have to administrate a heterogenous network with Linux and FreeBSD

More information

TCP/IP Network Essentials

TCP/IP Network Essentials TCP/IP Network Essentials Linux System Administration and IP Services AfNOG 2012 Layers Complex problems can be solved using the common divide and conquer principle. In this case the internals of the Internet

More information

Basic Linux Commands Manual Pdf Examples And Syntax

Basic Linux Commands Manual Pdf Examples And Syntax Basic Linux Commands Manual Pdf Examples And Syntax each command. More information and free.pdf available at linux-training.be. GNU Free Documentation License, Version 1.3 or any later version. This is

More information

COMPUTER NETWORKING LAB EXERCISES (TP) 1 BASIC CONFIGURATION AND TOOLS FOR EVERYBODY:

COMPUTER NETWORKING LAB EXERCISES (TP) 1 BASIC CONFIGURATION AND TOOLS FOR EVERYBODY: Name 1: Name 2: Group number: COMPUTER NETWORKING LAB EXERCISES (TP) 1 BASIC CONFIGURATION AND TOOLS FOR EVERYBODY: PING(6), DIG, TRACEROUTE(6), NETSTAT September 24, 2012 Abstract In this TP you will

More information

Contents. Note: pay attention to where you are. Note: Plaintext version. Note: pay attention to where you are... 1 Note: Plaintext version...

Contents. Note: pay attention to where you are. Note: Plaintext version. Note: pay attention to where you are... 1 Note: Plaintext version... Contents Note: pay attention to where you are........................................... 1 Note: Plaintext version................................................... 1 Hello World of the Bash shell 2 Accessing

More information

Virtualization with colinux

Virtualization with colinux Using, installing, and configuring Cooperative Linux Level: Introductory M. Tim Jones (mtj@mtjones.com), Consultant Engineer, Emulex 31 Mar 2007 Virtualization with VmWare, Xen, and Kernel-based Virtual

More information

INTRODUCTION TO LINUX

INTRODUCTION TO LINUX INTRODUCTION TO LINUX REALLY SHORT HISTORY Before GNU/Linux there were DOS, MAC and UNIX. All systems were proprietary. The GNU project started in the early 80s by Richard Stallman Goal to make a free

More information

Android SDK under Linux

Android SDK under Linux Android SDK under Linux Jean-Francois Messier Android Outaouais jf@messier.ca Abstract This is a tutorial about installing the various components required to have an actual Android development station

More information

DNS. is a distributed database that is used by TCP/IP applications to map between hostnames and IP addresses. no single site knows all the information

DNS. is a distributed database that is used by TCP/IP applications to map between hostnames and IP addresses. no single site knows all the information DNS slide 1 is a distributed database that is used by TCP/IP applications to map between hostnames and IP addresses no single site knows all the information DNS name space is hierarchical DNS slide 2 unnamed

More information

Static and source based routing

Static and source based routing Static and source based routing Lab setup For this lab students have to work in teams of two. Two team of two students (that is overall four students) should form a group and perform lab tasks together.

More information

VPN-Cubed 2.x Cloud Only Lite Edition

VPN-Cubed 2.x Cloud Only Lite Edition VPN-Cubed 2.x Cloud Only Lite Edition v201107 1 Requirements You have an Amazon AWS account that CohesiveFT can use for enabling your access to the VPN-Cubed Manager AMIs. Ability to configure a client

More information

Part 3. ARP poisoning

Part 3. ARP poisoning Part 3 ARP poisoning Outline 1. ARP management in Linux 2. NETKIT LAB Setup 3. HTTP connecbon (from L2 to L7) 4. ARP poisoning ahack 5. AHacker configurabon and setup ARP management in Linux The ARP cache

More information

Post Ubuntu Install Exercises

Post Ubuntu Install Exercises Post Ubuntu Install Exercises PacNOG 3 June 18 Rarotonga, Cook Islands 1. Get used to using sudo 2. Create an ainst account 3. Learn how to install software 4. Install gcc and make 5. Learn how to control

More information

AimSniff. Jason Healy, Director of Networks and Systems

AimSniff. Jason Healy, Director of Networks and Systems AimSniff Jason Healy, Director of Networks and Systems Last Updated Mar 18, 2008 2 Contents 1 AimSniff 5 1.1 Introduction.............................. 5 1.2 Dependencies............................. 5

More information

LING 408/508: Computational Techniques for Linguists. Lecture 5

LING 408/508: Computational Techniques for Linguists. Lecture 5 LING 408/508: Computational Techniques for Linguists Lecture 5 Last Time Installing Ubuntu 18.04 LTS on top of VirtualBox Your Homework 2: did everyone succeed? Ubuntu VirtualBox Host OS: MacOS or Windows

More information

Domain Statistics Collector Tutorial

Domain Statistics Collector Tutorial Domain Statistics Collector Tutorial Duane Wessels DNS-OARC Advanced cctld Workshop September 16, 2008 ams-cctld-advanced 0 DNS-OARC What is DSC? A system for collecting, transferring, viewing, and storing

More information

Raspberry Pi as an Ad Blocking Access Point

Raspberry Pi as an Ad Blocking Access Point Raspberry Pi as an Ad Blocking Access Point Created by Justin Cooper Last updated on 2017-12-05 07:26:38 PM UTC Guide Contents Guide Contents Overview Preparation Install Software Improving Performance

More information

Ftp Get Command Line Linux Proxy Settings Via

Ftp Get Command Line Linux Proxy Settings Via Ftp Get Command Line Linux Proxy Settings Via How to change system proxy settings from the command line on Ubuntu desktop gsettings get _schema key_ If you want to change HTTPS/FTP proxy to manual as well,

More information

This guide assumes that you are setting up a masternode for the first time. You will need:

This guide assumes that you are setting up a masternode for the first time. You will need: KRT MN Guide Setting up a masternode requires a basic understanding of Linux and blockchain technology, as well as the ability to follow instructions closely. It also requires regular maintenance and careful

More information

The Rockefeller University I NFORMATION T ECHNOLOGY E DUCATION & T RAINING. VPN Configuration Guide for Unix/Linux

The Rockefeller University I NFORMATION T ECHNOLOGY E DUCATION & T RAINING. VPN Configuration Guide for Unix/Linux The Rockefeller University I NFORMATION T ECHNOLOGY E DUCATION & T RAINING VPN Configuration Guide for Unix/Linux Table of Contents VPN Configuration Guide for Unix/Linux... 1 Pulse Secure Client for Ubuntu

More information

Network Test and Monitoring Tools

Network Test and Monitoring Tools ajgillette.com Technical Note Network Test and Monitoring Tools Author: A.J.Gillette Date: December 6, 2012 Revision: 1.3 Table of Contents Network Test and Monitoring Tools...1 Introduction...3 Link Characterization...4

More information

Ubuntu Practice and Configuration Post Installation Exercises interlab at AIT Bangkok, Thailand

Ubuntu Practice and Configuration Post Installation Exercises interlab at AIT Bangkok, Thailand Ubuntu Practice and Configuration Post Installation Exercises interlab at AIT Bangkok, Thailand 1. Get used to using sudo 2. Create an inst account 3. Learn how to install software 4. Update /etc/apt/sources.list

More information

NAV Coin NavTech Server Installation and setup instructions

NAV Coin NavTech Server Installation and setup instructions NAV Coin NavTech Server Installation and setup instructions NavTech disconnects sender and receiver Unique double-blockchain Technology V4.0.5 October 2017 2 Index General information... 5 NavTech... 5

More information

Linux+ Guide to Linux Certification, Third Edition. Chapter 12 Network Configuration

Linux+ Guide to Linux Certification, Third Edition. Chapter 12 Network Configuration Linux+ Guide to Linux Certification, Third Edition Chapter 12 Network Configuration Objectives Describe the purpose and types of networks, protocols, and media access methods Explain the basic configuration

More information

CS370 Operating Systems

CS370 Operating Systems CS370 Operating Systems Colorado State University Yashwant K Malaiya Fall 2016 Lecture 5 Slides based on Text by Silberschatz, Galvin, Gagne Various sources 1 1 User Operating System Interface - CLI CLI

More information

Linux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades Q2

Linux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades Q2 Linux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades 2017-2018 Q2 Facultat d Informàtica de Barcelona This first lab session is focused on getting experience in working

More information

Loadbalancer.org Virtual Appliance quick start guide v6.3

Loadbalancer.org Virtual Appliance quick start guide v6.3 Loadbalancer.org Virtual Appliance quick start guide v6.3 What are your objectives?...2 What is the difference between a one-arm and a two-arm configuration?...2 What are the different load balancing methods

More information

R- installation and adminstration under Linux for dummie

R- installation and adminstration under Linux for dummie R- installation and adminstration under Linux for dummies University of British Columbia Nov 8, 2012 Outline 1. Basic introduction of Linux Why Linux (department servers)? Some terminology Tools for windows

More information

Install some base packages. I recommend following this guide as root on a new VPS or using sudo su, it will make running setup just a touch easier.

Install some base packages. I recommend following this guide as root on a new VPS or using sudo su, it will make running setup just a touch easier. Nagios 4 on Ubuntu 16 Install some base packages. I recommend following this guide as root on a new VPS or using sudo su, it will make running setup just a touch easier. apt-get install php-gd build-essential

More information

How to install and configure the Hexago Gateway6 Client on Mac OS X. Version 0v3. Author: Tony Hill, IPv6Now Pty Ltd

How to install and configure the Hexago Gateway6 Client on Mac OS X. Version 0v3. Author: Tony Hill, IPv6Now Pty Ltd How to install and configure the Hexago Gateway6 Client on Mac OS X Version 0v3 Author: Tony Hill, IPv6Now Pty Ltd Copyright 2008 IPv6 Now Pty Ltd All rights reserved. This document may be republished

More information

mlvpn Documentation Release HEAD-4fdae2f-dirty Laurent COUSTET

mlvpn Documentation Release HEAD-4fdae2f-dirty Laurent COUSTET mlvpn Documentation Release HEAD-4fdae2f-dirty Laurent COUSTET November 09, 2015 Contents 1 User guide 3 1.1 What is mlvpn.............................................. 3 1.2 Getting started in mlvpn.........................................

More information

CDX REPORT TEAM #8 JACOB CHAPMAN SNEHESH THALAPANENI DEVISHA SRIVASTAVA

CDX REPORT TEAM #8 JACOB CHAPMAN SNEHESH THALAPANENI DEVISHA SRIVASTAVA CDX REPORT TEAM #8 JACOB CHAPMAN SNEHESH THALAPANENI DEVISHA SRIVASTAVA SANJAY ALEX KALLA HOSTING We installed Open VPN daemon, which can be used to securely link two or more private networks using an

More information

Initial setting up of VPN Java version.

Initial setting up of VPN Java version. VPN Linux 64 bit To access work documents from home you will need to create a VPN connection. This will allow you to securely connect to Exeter University network from other location such as your home.

More information

Introduction. What is Linux? What is the difference between a client and a server?

Introduction. What is Linux? What is the difference between a client and a server? Linux Kung Fu Introduction What is Linux? What is the difference between a client and a server? What is Linux? Linux generally refers to a group of Unix-like free and open-source operating system distributions

More information

Firewall Evasion Lab: Bypassing Firewalls using VPN

Firewall Evasion Lab: Bypassing Firewalls using VPN SEED Labs Firewall Evasion Lab 1 Firewall Evasion Lab: Bypassing Firewalls using Copyright 2018 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science

More information

CENG393 Computer Networks Labwork 1

CENG393 Computer Networks Labwork 1 CENG393 Computer Networks Labwork 1 Linux is the common name given to a large family of operating systems. All Linux-based operating systems are essentially a large set of computer software that are bound

More information

OpenVPN: Easy and Secure Setup Guide Steven Roddis

OpenVPN: Easy and Secure Setup Guide Steven Roddis OpenVPN: Easy and Secure Setup Guide Steven Roddis 2010-01-06 Intended Audience: Everyone with basic computer knowledge: editing files, use of a SFTP client like FileZilla, transferring files, should be

More information

Implementing DVN. directpacket Product Guide

Implementing DVN. directpacket Product Guide Implementing DVN directpacket Product Guide directpacket Research www.directpacket.com 2 1 DVN and the IPC Community The Secure Dedicated Versatile Network (DVN) Server is a hardened internet facing device

More information

UPSMON PRO Linux --- User Manual

UPSMON PRO Linux --- User Manual UPSMON PRO Linux --- User Manual Version : 1.22 *Attention : root authority is necessary to execute at Linux here AA. UPSMON PRO Install 2 BB. UPSMON PRO Start 3 CC. UPSMON PRO Status 6 DD. UPSMON PRO

More information

GestióIP IPAM v3.0 IP address management software Installation Guide v0.4

GestióIP IPAM v3.0 IP address management software Installation Guide v0.4 GestióIP IPAM v3.0 IP address management software Installation Guide v0.4 www.gestioip.net GestióIP Copyright Marc Uebel 2014 Table of Contents 1 Introduction... 3 2 Requirements... 3 3 System preparation...

More information

Ftp Command Line Manual Windows Example Port 22

Ftp Command Line Manual Windows Example Port 22 Ftp Command Line Manual Windows Example Port 22 Session, Logging, Console/scripting mode, Operations, Configuration enables passive ( =on ) or active ( =off ) transfer mode (FTP protocol only). winscp.exe

More information

DNS & DHCP CONFIGURATION

DNS & DHCP CONFIGURATION WELCOME DNS & DHCP CONFIGURATION Group Members Anmol Nazakat Ameena Fatima Shakeel ur Rehman Gulraiz Azam Irfan Ullah 1 2 3 4 5 BSIT-F14-E78 BSIT-F14-E100 BSIT-F14-E66 BSIT-F14-E69 BSIT-F14-E79 3 Today

More information

Centreon SSH Connector Documentation

Centreon SSH Connector Documentation Centreon SSH Connector Documentation Release 1.1.2 Centreon November 24, 2015 Contents i ii Centreon SSH Connector is a free software from Centreon available under the Apache Software License version

More information

Online Backup Client User Manual

Online Backup Client User Manual Online Backup Client User Manual Software version 3.21 For Linux distributions October 2010 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have

More information

Lab #9: Basic Linux Networking

Lab #9: Basic Linux Networking CTEC1767 Data Communications & Networking 2017 Lab #9: Basic Linux Networking Understanding Linux networks starts with understanding Linux network commands and the information they provide. We will use

More information

Lab 14 - Introduction to the PABLO Payload Autonomy Computer

Lab 14 - Introduction to the PABLO Payload Autonomy Computer Lab 14 - Introduction to the PABLO Payload Autonomy Computer 2.680 Unmanned Marine Vehicle Autonomy, Sensing and Communications Spring, 2018 Michael Benjamin, mikerb@mit.edu Paul Robinette, paulrobi@mit.edu

More information

How to watch FIFA World Cup 2018 on Linux

How to watch FIFA World Cup 2018 on Linux How to watch FIFA World Cup 2018 on Linux We have covered all platforms and Linux users can also enjoy FIFA live stream. Here s how to stay updated for FIFA World Cup 2018 PPTP Configuration Guide for

More information

Using RDP with Azure Linux Virtual Machines

Using RDP with Azure Linux Virtual Machines Using RDP with Azure Linux Virtual Machines 1. Create a Linux Virtual Machine with Azure portal Create SSH key pair 1. Install Ubuntu Bash shell by downloading and running bash.exe file as administrator.

More information

SonicWALL strongly recommends you follow these steps before installing Global VPN Client (GVC) 4.0.0:

SonicWALL strongly recommends you follow these steps before installing Global VPN Client (GVC) 4.0.0: GVC SonicWALL Global VPN Client 4.0.0 Contents Pre-installation Recommendations... 1 Platform Compatibility... 1 New Features... 2 Known Issues... 3 Resolved Known Issues... 4 Troubleshooting... 5 Pre-installation

More information

Unit 2: Manage Files Graphically with Nautilus Objective: Manage files graphically and access remote systems with Nautilus

Unit 2: Manage Files Graphically with Nautilus Objective: Manage files graphically and access remote systems with Nautilus Linux system administrator-i Unit 1: Get Started with the GNOME Graphical Desktop Objective: Get started with GNOME and edit text files with gedit Unit 2: Manage Files Graphically with Nautilus Objective:

More information

Networking Notes. Common Internet Speeds. Online Speed Test myspeed.visualware.com

Networking Notes. Common Internet Speeds. Online Speed Test myspeed.visualware.com Networking Notes Common Internet Speeds Dial Up 56 kbs 1000kbs = 1 mbs (1 user capacity) DSL 1.5 mbs (1 channel 10 user capacity) T1 1.5 mbs (24 channel 500 user capacity) Scalable Ethernet (Adjustable

More information

CS CS Tutorial 2 2 Winter 2018

CS CS Tutorial 2 2 Winter 2018 CS CS 230 - Tutorial 2 2 Winter 2018 Sections 1. Unix Basics and connecting to CS environment 2. MIPS Introduction & CS230 Interface 3. Connecting Remotely If you haven t set up a CS environment password,

More information

IT 341 Introduction to System Administration Project I Installing Ubuntu Server on a Virtual Machine

IT 341 Introduction to System Administration Project I Installing Ubuntu Server on a Virtual Machine IT 341 Introduction to System Administration Project I Installing Ubuntu Server on a Virtual Machine Here we create a new virtual machine and install Ubuntu 16.04 LTS Server on it. In this instance, we

More information

SUNDE TM. User s Manual for H4 and earlier models

SUNDE TM. User s Manual for H4 and earlier models SUNDE TM User s Manual for H4 and earlier models 2012 Huiyuan Co., Ltd. All rights reserved. THANK YOU FOR PURCHASING SUNDE NETWORK TERMINAL. PLEASE READ THIS MANUAL CAREFULLY BEFORE USE. NOTE: All the

More information

This tutorial will guide you how to setup and run your own minecraft server on a Linux CentOS 6 in no time.

This tutorial will guide you how to setup and run your own minecraft server on a Linux CentOS 6 in no time. This tutorial will guide you how to setup and run your own minecraft server on a Linux CentOS 6 in no time. Running your own server lets you play together with your friends and family with your own set

More information

LAN Setup Reflection

LAN Setup Reflection LAN Setup Reflection After the LAN setup, ask yourself some questions: o Does your VM have the correct IP? o Are you able to ping some locations, internal and external? o Are you able to log into other

More information

The TinyHPC Cluster. Mukarram Ahmad. Abstract

The TinyHPC Cluster. Mukarram Ahmad. Abstract The TinyHPC Cluster Mukarram Ahmad Abstract TinyHPC is a beowulf class high performance computing cluster with a minor physical footprint yet significant computational capacity. The system is of the shared

More information

DNS CACHE POISONING LAB

DNS CACHE POISONING LAB University of Trento Network Security - Malware lab 2 th May 2016 DNS CACHE POISONING LAB GROUP #15: MATTEO FIORANZATO MATTEO MATTIVI ANDREA SIMONELLI MICHELA TESTOLINA DON T CLOSE OR MOVE ANY WINDOW Lab

More information

How to Install Forcepoint NGFW in Amazon AWS TECHNICAL DOCUMENT

How to Install Forcepoint NGFW in Amazon AWS TECHNICAL DOCUMENT How to Install Forcepoint NGFW in Amazon AWS TECHNICAL DOCUMENT Table of Contents TABLE OF CONTENTS... 1 TEST NETWORK DIAGRAM... 2 PREPARING YOUR VPC... 3 IP addressing... 3 Virtual Private Cloud (VPC)...

More information

Reference. Application

Reference. Application This document will show one way of configuring the Vyatta router as an Internet firewall/gateway and will demonstrate the configuration for use with a cable modem. Furthermore, the LAN interfaces are (optionally)

More information

CS 0449 Project 4: /dev/rps Due: Friday, December 8, 2017, at 11:59pm

CS 0449 Project 4: /dev/rps Due: Friday, December 8, 2017, at 11:59pm CS 0449 Project 4: /dev/rps Due: Friday, December 8, 2017, at 11:59pm Project Description Standard UNIX and Linux systems come with a few special files like /dev/zero, which returns nothing but zeros when

More information

Configuring a Standalone VCL Environment using VMware Server 2.0

Configuring a Standalone VCL Environment using VMware Server 2.0 Configuring a Standalone VCL Environment using VMware Server 2.0 DISCLAIMER! This document provides instuctions for configuring a standalone VCL environment running on a single computer which is able to

More information

Exercise 1: Basic Tools

Exercise 1: Basic Tools Exercise 1: Basic Tools This exercise is created so everybody can learn the basic tools we will use during this course. It is really more like a tutorial than an exercise and, you are not required to submit

More information

Contents. About. Script. IPv6_setup_Hurricane_Electric_Tunnel_Broker

Contents. About. Script. IPv6_setup_Hurricane_Electric_Tunnel_Broker Contents About 1 About 2 Script 3 Install Steps 4 OpenDNS Setting 5 Reducing Script Size 6 See Also This will... Set up HE's tunnel broker service. Automatically nds your wan ip at boot using whatismyip.com

More information

Reference. Application. Installation

Reference. Application. Installation This document will show one way of configuring the Vyatta router as an Internet firewall/gateway and will demonstrate the configuration of the Sangoma S518 ADSL interface card. Furthermore, the LAN interfaces

More information

Material for the Networking lab in EITF25 & EITF45

Material for the Networking lab in EITF25 & EITF45 Material for the Networking lab in EITF25 & EITF45 2016 Preparations In order to succeed with the lab, you must have understood some important parts of the course. Therefore, before you come to the lab

More information

Guide to your Plug Computer

Guide to your Plug Computer This document lives here: http://inst.eecs.berkeley.edu/~ee122/fa11/project3/guide-to-plug.pdf Guide to your Plug Computer UC Berkeley, EE 122, Fall 2011 Version 1 This document is a step-by-step guide

More information

Introduction to Linux. Woo-Yeong Jeong Computer Systems Laboratory Sungkyunkwan University

Introduction to Linux. Woo-Yeong Jeong Computer Systems Laboratory Sungkyunkwan University Introduction to Linux Woo-Yeong Jeong (wooyeong@csl.skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu What is Linux? A Unix-like operating system of a computer What is an

More information

This describes how to use DD-WRT to connect to a Cisco VPN Concentrator using vpnc without auto-reconnect and without connect on startup

This describes how to use DD-WRT to connect to a Cisco VPN Concentrator using vpnc without auto-reconnect and without connect on startup vpnc is supposed to work with: Cisco VPN concentrator 3000 Series Cisco IOS routers Cisco PIX / ASA Zecurity Appliances Juniper/Netscreen Contents 1 This describes how to use DD-WRT to connect to a Cisco

More information

ROUTING INTRODUCTION TO IP, IP ROUTING PROTOCOLS AND PROXY ARP

ROUTING INTRODUCTION TO IP, IP ROUTING PROTOCOLS AND PROXY ARP IP ROUTING INTRODUCTION TO IP, IP ROUTING PROTOCOLS AND PROXY ARP Peter R. Egli 1/37 Contents 1. IP Routing 2. Routing Protocols 3. Fragmentation in the IP Layer 4. Proxy ARP 5. Routing and IP forwarding

More information