VPN and GNU/Linux at the University of South Wales
|
|
- Teresa Daniels
- 6 years ago
- Views:
Transcription
1 VPN and GNU/Linux at the University of South Wales These notes are designed to help staff and research students at the University of South Wales connect to their desktop machines using GNU/Linux. You will of course have had to register your username as using vpn with LCSS. The information here is just a consolidation of information held on other publically accessible web servers. Advantages The advantages with this approach are: performance. there is no modification to the kernel, and no proprietry binary modules need to be installed. inpractice both of these advantages mean that the operating system is less likely to crash. ituses thevpnc package which only does one thing and one thing well - namely it creates the vnc connection. using the following steps you should be able to route remote desktop packets to your desktop, any local browsing activity will go to the wider Internet via the ISP rather than via the University. Only DNS queries referencing.glam.ac.uk go to the University nameserver. This improves performance considerably as all packets traversing the vpn tunnel must be encrypted and decrypted. no need to run virtualisation to get the benefits above. Many Windows or Mac users perhaps use VMWare or an equivalent to get the above benefits, that solution does the job however it is really rather like using a sledgehammer to crack a nut. This solution uses much less code to solve the same problem allowing your desktop to run much faster. Disadvantages this solution is not supported by LCSS and you have to follow the instructions below. the instructions only apply to Debian GNU/Linux or Ubuntu - although most of these instructions would probably, with a little modification, work on other GNU/Linux distributions. I think that with even more changes they would also work under MacOS and FreeBSD systems. With a full moon and the realignment of the seven sisters of Pleiades into a regular heptagon they could be adapted to run under cygwin. there is no double click to install all of this.. vpnc Download a copy ofvpnc from here massar/vpnc/ vpnc tar.gz and extract it. You can do this from the command line (open a gnome-terminal) as follows: $ wget massar/vpnc/vpnc tar.gz $ tar zxf vpnc tar.gz now install thelibcrypt11 andlibgpg-error-dev libraries
2 -2- $ sudo apt-get install libgcrypt11-dev libgpg-error-dev (redhat users can install these by) $ sudo yum install libgcrypt-devel libgpg-error-devel now webuild and install the software: $ cd vpnc $ make $ sudo make install download a copy ofthe Windows XP UoG vpn package, extract the pcf file convert and install it into the vpnc directory. $ cd.. $ wget $ mkdir xp-vpn $ cd xp-vpn $ unzip../uogvpn exe $ cd../vpnc $./pcf2vpnc../xp-vpn/uog-vpn.pcf uog.conf $ sudo cp uog.pcf /etc/vpnc/uog.conf at this point you should be able to create a vpn tunnel with the University but it won t bemuch use yet.. Anyhow itwould be a good idea to test what has been installed. To dothis you can: $ sudo vpnc uog VPNC started in background (pid: 15343)... $ sudo route j1vpn3030g-e2.n merlin.example UGH 0 0 0eth * U 0 0 0tun0 default * U 0 0 0tun0 $ sudo vpnc-disconnect Terminating vpnc daemon (pid: 15343) Notice that the tun0 device has come to life and it is set as the default route. The tun0 device will encrypt all packets securely and send them to the University vpn server which in turn decrypts and passes them onto the local network. Now install dnsmasq which will resolve our dns queries and decide which queries need to go along the slow tunnel to work and which ones can be more efficiently sent directly unencrypted to our ISP. The dnsmasq package has a pleasant side effect of caching dns requests, vastly improving the browsing experience. $ sudo apt-get install dnsmasq
3 -3- edit/etc/dnsmasq.conf, and search for the three lines which are: Add other name servers here, with domain specs if they are for non-public domains. server=/localnet/ then add the following line Add other name servers here, with domain specs if they are for non-public domains. server=/localnet/ server=/glam.ac.uk/ this says any dns query matching.glam.ac.uk will be resolved by the University nameserver ( ) also alter the last line of these three Ifyou don t want dnsmasq to poll /etc/resolv.conf or other resolv files for changes and re-read them then uncomment this. no-poll to Ifyou don t want dnsmasq to poll /etc/resolv.conf or other resolv files for changes and re-read them then uncomment this. no-poll Now copy and paste this script into a file called vpn. Essentially all packets which are destined to the University go slowly over thetun0 device and all other go quickly unencrypted to our ISP. You should check (and maybe modify the line following "YOUR desktop net id"). Currently the script will redirect any traffic to the tun0 device. Your desktop net id might be different - to check run /usr/sbin/ifconfig on your desktop and note the network address.
4 -4-!/bin/bash export PATH=/sbin:/usr/local/sbin:$PATH echo "Starting vpn..." vpnc uog default route goes to ISP route add default gw add route for.glam.ac.uk nameserver (remember that dnsmasq only uses this for.glam.ac.uk requests) route add -net netmask dev tun0 add route onto network: mcgreg, floppsie and moppsy route add -net netmask dev tun0 and add route to desktop subnet you might need to alter the following line to match YOUR desktop net id route add -net netmask dev tun0 finally print route info route echo "Press enter to stop vpn" read ans vpnc-disconnect sleep 2 route Now make this script executable via: $ chmod 700 vpn $ cp vpn /usr/local/sbin to invoke the vpn script type: $ sudo /usr/local/sbin/vpn you should see the following:
5 -5- Starting vpn... VPNC started in background (pid: 15972)... j1vpn3030g-e2.n merlin.example UGH 0 0 0eth * U 0 0 0tun * U 0 0 0tun * U 0 0 0tun * U 0 0 0tun0 default merlin.example UG 0 0 0eth1 default * U 0 0 0tun0 Press enter to stop vpn You can now connect to mcgreg.comp.glam.ac.uk using ssh, or to your Windows desktop via the GNU/Linux rdesktop client. To test that different routes are taken try using traceroute: $ traceroute traceroute to ( ), 30 hops max, 52 byte packets 1merlin.example.org ( ) ms ms ms 2sgrs-lns-01-lo0.onetel.net.uk ( ) ms ms ms ˆC $ traceroute mcgreg.comp.glam.ac.uk traceroute to mcgreg.comp.glam.ac.uk ( ), 30 hops max, 52 byte packets 1j1vpn3030g-e2.net.glam.ac.uk ( ) ms ms ms ˆC It is interesting to see that the encrypted route is nearly twice as slow asthe unencrypted route. When you wish to disconnect the vpn tunnel press the <enter> key in the gnome-terminal window. You should see the following messages: Terminating vpnc daemon (pid: 15972) default merlin.example UG 0 0 0eth1
GNU/Linux: An Essential Guide for Students Undertaking BLOSSOM
Copyright: The development of this document is funded by Higher Education of Academy. Permission is granted to copy, distribute and /or modify this document under a license compliant with the Creative
More informationComputer Systems and Architecture
Computer Systems and Architecture Introduction to UNIX Stephen Pauwels University of Antwerp October 2, 2015 Outline What is Unix? Getting started Streams Exercises UNIX Operating system Servers, desktops,
More informationCOMPUTER NETWORKING LAB EXERCISES (TP) 4
Name 1: Name 2: Group number: COMPUTER NETWORKING LAB EXERCISES (TP) 4 IPV6 December 14, 2009 Abstract In this TP you will revisit some of the basic networking tools that were introduced in TP1, only this
More informationEndian Proxy / Firewall
Endian Proxy / Firewall Created October 27, 2006 by Bruce A. Westbrook Revisions: Introduction This document describes the step by step process of installing and configuring the Endian Firewall, Community
More informationComputer Systems and Architecture
Computer Systems and Architecture Stephen Pauwels Computer Systems Academic Year 2018-2019 Overview of the Semester UNIX Introductie Regular Expressions Scripting Data Representation Integers, Fixed point,
More information3 Connection, Shell Serial Connection over Console Port SSH Connection Internet Connection... 5
Contents 1 Description 2 2 Supported Devices 3 3 Connection, Shell 4 3.1 Serial Connection over Console Port...................... 4 3.2 SSH Connection................................. 4 3.3 Internet Connection...............................
More informationLinux Essentials Objectives Topics:
Linux Essentials Linux Essentials is a professional development certificate program that covers basic knowledge for those working and studying Open Source and various distributions of Linux. Exam Objectives
More informationUsing TU Eindhoven s VPN with Ubuntu
Using TU Eindhoven's VPN with Ubuntu 14.04 or 16.04 TU Eindhoven s Virtual Private Networking (VPN) service can be used on Linux computers. This document describes how to do it using Ubuntu 14.04 or 16.04
More informationHow to Use This Lab Manual
3 Contents How to Use This Lab Manual........................................ 5 Lab 1: Setting Up the Student System.................................. 7 Lab 2: Installing Fedora............................................
More informationVPN-against-Firewall Lab: Bypassing Firewalls using VPN
SEED Labs 1 VPN-against-Firewall Lab: Bypassing Firewalls using VPN Copyright c 2016 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science Foundation
More informationMy problem was not understanding that each tunnel had to be on it's own network. I took subnet as; I could assign each tunnel to an address like
{Network & Hardware layout} First I'll describe my network setup and platform. We have 9 private networks on the 192.168.x.x network, connected via a core router and 1 Mandrake Linux 9.2 server with 2
More informationLaboratory 2 Dynamic routing using RIP. Iptables. Part1. Dynamic Routing
Introduction Laboratory 2 Dynamic routing using RIP. Iptables. Part1. Dynamic Routing Static routing has the advantage that it is simple, requires no computing power in router for determining routes (this
More informationWireless Network Access at Swinburne Using FreeBSD 5.3
802.11 Wireless Network Access at Swinburne Using FreeBSD 5.3 CAIA Technical Report 041221A Jason But December 21st, 2004 Introduction FreeBSD is a UNIX oriented operating system which is also the default
More informationGetting Familiar with the C-BGP Simulator
Getting Familiar with the C-BGP Simulator Anuj Sehgal, Jürgen Schönwälder School of Engineering and Science Jacobs University Bremen, Germany {s.anuj, j.schoenwaelder}@jacobs-university.de October 24,
More informationSirindhorn International Institute of Technology Thammasat University
Name.............................. ID............... Section...... Seat No...... Sirindhorn International Institute of Technology Thammasat University Course Title: IT Security Instructor: Steven Gordon
More informationRelay Proxy User Guide
Relay Proxy User Guide DBL Technology Company Limited www.dbltek.com sales@dbltek.com support@dbltek.com 2016/5/30 Relay Proxy Relay Proxy is a server software developed by DBL Technology. Its main purposed
More informationRemote GUI access to a Linux computer using Tightvnc
Remote GUI access to a Linux computer using Tightvnc The command line is a great way to manage a remote Linux computer if you don't mind typing in commands, but sometimes you need to be able to view a
More informationSophos Connect. help
help Contents About... 1 Installing...1 Uninstalling... 1 Connections...3 Import connection... 3 Connect...4 Connection options...7 Events...9 Troubleshooting events... 10 General troubleshooting... 13
More informationUnit- 5. Linux Systems
Unit- 5 Linux System- Basic Concepts; System Administration-Requirements for Linux System Administrator, Setting up a LINUX Multifunction Server, Domain Name System, Setting Up Local Network Services;
More informationGeneious Floating License Manager Version Biomatters Ltd
Geneious Floating License Manager Version 2.1.2 Biomatters Ltd April 10, 2018 2 Introduction A Geneious Floating License is provided by a server to clients that can request a license over a network. The
More informationGeneious Floating License Manager Version Biomatters Ltd
Geneious Floating License Manager Version 2.1.2 Biomatters Ltd August 31, 2016 2 Introduction A Geneious Floating License is provided by a server to clients that can request a license over a network. The
More informationCS197U: A Hands on Introduction to Unix
CS197U: A Hands on Introduction to Unix Lecture 4: My First Linux System Tian Guo University of Massachusetts Amherst CICS 1 Reminders Assignment 2 was due before class Assignment 3 will be posted soon
More informationInstallation Manual InfraManage.NET Installation Instructions for Ubuntu
Installation Manual InfraManage.NET Installation Instructions for Ubuntu Copyright 1996 2017 Timothy Ste. Marie Version 7.5.72SQL InfraManage.NET Installing InfraManage.NET Page 1 of 78 Table of Contents
More informationMolecular Forecaster Inc. Forecaster 1.2 Server Installation Guide
Molecular Forecaster Inc. Forecaster 1.2 Server Installation Guide 13 June 2014 CONTENTS Windows... 4 Linux... 4 Installation Procedures... 4 Windows Installation... 4 Linux portable Installation... 5
More informationLinux. An introduction. Aurélien Villani 01/2018
Linux An introduction Aurélien Villani 01/2018 Linux? 2 References Somewhere on the baie-lgf, are some Linux books. 3 Linux? A kernel... 1991: released by Linus Torvalds, for fun 1993: 100 developers working
More informationHow to Deploy Axon on VMware vcenter
How to Deploy Axon on VMware vcenter Copyright Informatica LLC 2017. Informatica, the Informatica logo, Intelligent Data Lake, Big Data Mangement, and Live Data Map are trademarks or registered trademarks
More informationRG-MACC_2.0 Installation Manual
RG-MACC_2.0 Installation Manual Ruijie Networks Co., Ltd all rights reserved 1 Copyright Clarify Copyright ownership belongs to Ruijie, shall not be reproduced, copied, or used in other ways without permission.
More informationITEC451 Network Design & Analysis Laboratory Guide: Appendix
Linux Guide Accessing the command prompt Before you can access the command prompt, you must login to the system. The administrative user on Linux machines is named root. On most Linux distributions, you
More informationLaboratory Exercise: Session Data
Goals Laboratory Exercise: Session Data 1. To understand its basic components and architecture of a session based network monitoring system. 2. To be able to install and configure one such system, based
More informationCommunication protocols and services
This chapter describes various protocols and that may be enabled on Modberry. SSH Connection SSH service is started up on boot and already preinstalled and configured. You may access your device through
More informationHow much memory users uses in GNU / Linux and FreeBSD - Commands and Scripts to find user memory usage on Linux
How much memory users uses in GNU / Linux and FreeBSD - Commands and Scripts to find user memory usage on Linux Author : admin If you have to administrate a heterogenous network with Linux and FreeBSD
More informationTCP/IP Network Essentials
TCP/IP Network Essentials Linux System Administration and IP Services AfNOG 2012 Layers Complex problems can be solved using the common divide and conquer principle. In this case the internals of the Internet
More informationBasic Linux Commands Manual Pdf Examples And Syntax
Basic Linux Commands Manual Pdf Examples And Syntax each command. More information and free.pdf available at linux-training.be. GNU Free Documentation License, Version 1.3 or any later version. This is
More informationCOMPUTER NETWORKING LAB EXERCISES (TP) 1 BASIC CONFIGURATION AND TOOLS FOR EVERYBODY:
Name 1: Name 2: Group number: COMPUTER NETWORKING LAB EXERCISES (TP) 1 BASIC CONFIGURATION AND TOOLS FOR EVERYBODY: PING(6), DIG, TRACEROUTE(6), NETSTAT September 24, 2012 Abstract In this TP you will
More informationContents. Note: pay attention to where you are. Note: Plaintext version. Note: pay attention to where you are... 1 Note: Plaintext version...
Contents Note: pay attention to where you are........................................... 1 Note: Plaintext version................................................... 1 Hello World of the Bash shell 2 Accessing
More informationVirtualization with colinux
Using, installing, and configuring Cooperative Linux Level: Introductory M. Tim Jones (mtj@mtjones.com), Consultant Engineer, Emulex 31 Mar 2007 Virtualization with VmWare, Xen, and Kernel-based Virtual
More informationINTRODUCTION TO LINUX
INTRODUCTION TO LINUX REALLY SHORT HISTORY Before GNU/Linux there were DOS, MAC and UNIX. All systems were proprietary. The GNU project started in the early 80s by Richard Stallman Goal to make a free
More informationAndroid SDK under Linux
Android SDK under Linux Jean-Francois Messier Android Outaouais jf@messier.ca Abstract This is a tutorial about installing the various components required to have an actual Android development station
More informationDNS. is a distributed database that is used by TCP/IP applications to map between hostnames and IP addresses. no single site knows all the information
DNS slide 1 is a distributed database that is used by TCP/IP applications to map between hostnames and IP addresses no single site knows all the information DNS name space is hierarchical DNS slide 2 unnamed
More informationStatic and source based routing
Static and source based routing Lab setup For this lab students have to work in teams of two. Two team of two students (that is overall four students) should form a group and perform lab tasks together.
More informationVPN-Cubed 2.x Cloud Only Lite Edition
VPN-Cubed 2.x Cloud Only Lite Edition v201107 1 Requirements You have an Amazon AWS account that CohesiveFT can use for enabling your access to the VPN-Cubed Manager AMIs. Ability to configure a client
More informationPart 3. ARP poisoning
Part 3 ARP poisoning Outline 1. ARP management in Linux 2. NETKIT LAB Setup 3. HTTP connecbon (from L2 to L7) 4. ARP poisoning ahack 5. AHacker configurabon and setup ARP management in Linux The ARP cache
More informationPost Ubuntu Install Exercises
Post Ubuntu Install Exercises PacNOG 3 June 18 Rarotonga, Cook Islands 1. Get used to using sudo 2. Create an ainst account 3. Learn how to install software 4. Install gcc and make 5. Learn how to control
More informationAimSniff. Jason Healy, Director of Networks and Systems
AimSniff Jason Healy, Director of Networks and Systems Last Updated Mar 18, 2008 2 Contents 1 AimSniff 5 1.1 Introduction.............................. 5 1.2 Dependencies............................. 5
More informationLING 408/508: Computational Techniques for Linguists. Lecture 5
LING 408/508: Computational Techniques for Linguists Lecture 5 Last Time Installing Ubuntu 18.04 LTS on top of VirtualBox Your Homework 2: did everyone succeed? Ubuntu VirtualBox Host OS: MacOS or Windows
More informationDomain Statistics Collector Tutorial
Domain Statistics Collector Tutorial Duane Wessels DNS-OARC Advanced cctld Workshop September 16, 2008 ams-cctld-advanced 0 DNS-OARC What is DSC? A system for collecting, transferring, viewing, and storing
More informationRaspberry Pi as an Ad Blocking Access Point
Raspberry Pi as an Ad Blocking Access Point Created by Justin Cooper Last updated on 2017-12-05 07:26:38 PM UTC Guide Contents Guide Contents Overview Preparation Install Software Improving Performance
More informationFtp Get Command Line Linux Proxy Settings Via
Ftp Get Command Line Linux Proxy Settings Via How to change system proxy settings from the command line on Ubuntu desktop gsettings get _schema key_ If you want to change HTTPS/FTP proxy to manual as well,
More informationThis guide assumes that you are setting up a masternode for the first time. You will need:
KRT MN Guide Setting up a masternode requires a basic understanding of Linux and blockchain technology, as well as the ability to follow instructions closely. It also requires regular maintenance and careful
More informationThe Rockefeller University I NFORMATION T ECHNOLOGY E DUCATION & T RAINING. VPN Configuration Guide for Unix/Linux
The Rockefeller University I NFORMATION T ECHNOLOGY E DUCATION & T RAINING VPN Configuration Guide for Unix/Linux Table of Contents VPN Configuration Guide for Unix/Linux... 1 Pulse Secure Client for Ubuntu
More informationNetwork Test and Monitoring Tools
ajgillette.com Technical Note Network Test and Monitoring Tools Author: A.J.Gillette Date: December 6, 2012 Revision: 1.3 Table of Contents Network Test and Monitoring Tools...1 Introduction...3 Link Characterization...4
More informationUbuntu Practice and Configuration Post Installation Exercises interlab at AIT Bangkok, Thailand
Ubuntu Practice and Configuration Post Installation Exercises interlab at AIT Bangkok, Thailand 1. Get used to using sudo 2. Create an inst account 3. Learn how to install software 4. Update /etc/apt/sources.list
More informationNAV Coin NavTech Server Installation and setup instructions
NAV Coin NavTech Server Installation and setup instructions NavTech disconnects sender and receiver Unique double-blockchain Technology V4.0.5 October 2017 2 Index General information... 5 NavTech... 5
More informationLinux+ Guide to Linux Certification, Third Edition. Chapter 12 Network Configuration
Linux+ Guide to Linux Certification, Third Edition Chapter 12 Network Configuration Objectives Describe the purpose and types of networks, protocols, and media access methods Explain the basic configuration
More informationCS370 Operating Systems
CS370 Operating Systems Colorado State University Yashwant K Malaiya Fall 2016 Lecture 5 Slides based on Text by Silberschatz, Galvin, Gagne Various sources 1 1 User Operating System Interface - CLI CLI
More informationLinux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades Q2
Linux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades 2017-2018 Q2 Facultat d Informàtica de Barcelona This first lab session is focused on getting experience in working
More informationLoadbalancer.org Virtual Appliance quick start guide v6.3
Loadbalancer.org Virtual Appliance quick start guide v6.3 What are your objectives?...2 What is the difference between a one-arm and a two-arm configuration?...2 What are the different load balancing methods
More informationR- installation and adminstration under Linux for dummie
R- installation and adminstration under Linux for dummies University of British Columbia Nov 8, 2012 Outline 1. Basic introduction of Linux Why Linux (department servers)? Some terminology Tools for windows
More informationInstall some base packages. I recommend following this guide as root on a new VPS or using sudo su, it will make running setup just a touch easier.
Nagios 4 on Ubuntu 16 Install some base packages. I recommend following this guide as root on a new VPS or using sudo su, it will make running setup just a touch easier. apt-get install php-gd build-essential
More informationHow to install and configure the Hexago Gateway6 Client on Mac OS X. Version 0v3. Author: Tony Hill, IPv6Now Pty Ltd
How to install and configure the Hexago Gateway6 Client on Mac OS X Version 0v3 Author: Tony Hill, IPv6Now Pty Ltd Copyright 2008 IPv6 Now Pty Ltd All rights reserved. This document may be republished
More informationmlvpn Documentation Release HEAD-4fdae2f-dirty Laurent COUSTET
mlvpn Documentation Release HEAD-4fdae2f-dirty Laurent COUSTET November 09, 2015 Contents 1 User guide 3 1.1 What is mlvpn.............................................. 3 1.2 Getting started in mlvpn.........................................
More informationCDX REPORT TEAM #8 JACOB CHAPMAN SNEHESH THALAPANENI DEVISHA SRIVASTAVA
CDX REPORT TEAM #8 JACOB CHAPMAN SNEHESH THALAPANENI DEVISHA SRIVASTAVA SANJAY ALEX KALLA HOSTING We installed Open VPN daemon, which can be used to securely link two or more private networks using an
More informationInitial setting up of VPN Java version.
VPN Linux 64 bit To access work documents from home you will need to create a VPN connection. This will allow you to securely connect to Exeter University network from other location such as your home.
More informationIntroduction. What is Linux? What is the difference between a client and a server?
Linux Kung Fu Introduction What is Linux? What is the difference between a client and a server? What is Linux? Linux generally refers to a group of Unix-like free and open-source operating system distributions
More informationFirewall Evasion Lab: Bypassing Firewalls using VPN
SEED Labs Firewall Evasion Lab 1 Firewall Evasion Lab: Bypassing Firewalls using Copyright 2018 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science
More informationCENG393 Computer Networks Labwork 1
CENG393 Computer Networks Labwork 1 Linux is the common name given to a large family of operating systems. All Linux-based operating systems are essentially a large set of computer software that are bound
More informationOpenVPN: Easy and Secure Setup Guide Steven Roddis
OpenVPN: Easy and Secure Setup Guide Steven Roddis 2010-01-06 Intended Audience: Everyone with basic computer knowledge: editing files, use of a SFTP client like FileZilla, transferring files, should be
More informationImplementing DVN. directpacket Product Guide
Implementing DVN directpacket Product Guide directpacket Research www.directpacket.com 2 1 DVN and the IPC Community The Secure Dedicated Versatile Network (DVN) Server is a hardened internet facing device
More informationUPSMON PRO Linux --- User Manual
UPSMON PRO Linux --- User Manual Version : 1.22 *Attention : root authority is necessary to execute at Linux here AA. UPSMON PRO Install 2 BB. UPSMON PRO Start 3 CC. UPSMON PRO Status 6 DD. UPSMON PRO
More informationGestióIP IPAM v3.0 IP address management software Installation Guide v0.4
GestióIP IPAM v3.0 IP address management software Installation Guide v0.4 www.gestioip.net GestióIP Copyright Marc Uebel 2014 Table of Contents 1 Introduction... 3 2 Requirements... 3 3 System preparation...
More informationFtp Command Line Manual Windows Example Port 22
Ftp Command Line Manual Windows Example Port 22 Session, Logging, Console/scripting mode, Operations, Configuration enables passive ( =on ) or active ( =off ) transfer mode (FTP protocol only). winscp.exe
More informationDNS & DHCP CONFIGURATION
WELCOME DNS & DHCP CONFIGURATION Group Members Anmol Nazakat Ameena Fatima Shakeel ur Rehman Gulraiz Azam Irfan Ullah 1 2 3 4 5 BSIT-F14-E78 BSIT-F14-E100 BSIT-F14-E66 BSIT-F14-E69 BSIT-F14-E79 3 Today
More informationCentreon SSH Connector Documentation
Centreon SSH Connector Documentation Release 1.1.2 Centreon November 24, 2015 Contents i ii Centreon SSH Connector is a free software from Centreon available under the Apache Software License version
More informationOnline Backup Client User Manual
Online Backup Client User Manual Software version 3.21 For Linux distributions October 2010 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have
More informationLab #9: Basic Linux Networking
CTEC1767 Data Communications & Networking 2017 Lab #9: Basic Linux Networking Understanding Linux networks starts with understanding Linux network commands and the information they provide. We will use
More informationLab 14 - Introduction to the PABLO Payload Autonomy Computer
Lab 14 - Introduction to the PABLO Payload Autonomy Computer 2.680 Unmanned Marine Vehicle Autonomy, Sensing and Communications Spring, 2018 Michael Benjamin, mikerb@mit.edu Paul Robinette, paulrobi@mit.edu
More informationHow to watch FIFA World Cup 2018 on Linux
How to watch FIFA World Cup 2018 on Linux We have covered all platforms and Linux users can also enjoy FIFA live stream. Here s how to stay updated for FIFA World Cup 2018 PPTP Configuration Guide for
More informationUsing RDP with Azure Linux Virtual Machines
Using RDP with Azure Linux Virtual Machines 1. Create a Linux Virtual Machine with Azure portal Create SSH key pair 1. Install Ubuntu Bash shell by downloading and running bash.exe file as administrator.
More informationSonicWALL strongly recommends you follow these steps before installing Global VPN Client (GVC) 4.0.0:
GVC SonicWALL Global VPN Client 4.0.0 Contents Pre-installation Recommendations... 1 Platform Compatibility... 1 New Features... 2 Known Issues... 3 Resolved Known Issues... 4 Troubleshooting... 5 Pre-installation
More informationUnit 2: Manage Files Graphically with Nautilus Objective: Manage files graphically and access remote systems with Nautilus
Linux system administrator-i Unit 1: Get Started with the GNOME Graphical Desktop Objective: Get started with GNOME and edit text files with gedit Unit 2: Manage Files Graphically with Nautilus Objective:
More informationNetworking Notes. Common Internet Speeds. Online Speed Test myspeed.visualware.com
Networking Notes Common Internet Speeds Dial Up 56 kbs 1000kbs = 1 mbs (1 user capacity) DSL 1.5 mbs (1 channel 10 user capacity) T1 1.5 mbs (24 channel 500 user capacity) Scalable Ethernet (Adjustable
More informationCS CS Tutorial 2 2 Winter 2018
CS CS 230 - Tutorial 2 2 Winter 2018 Sections 1. Unix Basics and connecting to CS environment 2. MIPS Introduction & CS230 Interface 3. Connecting Remotely If you haven t set up a CS environment password,
More informationIT 341 Introduction to System Administration Project I Installing Ubuntu Server on a Virtual Machine
IT 341 Introduction to System Administration Project I Installing Ubuntu Server on a Virtual Machine Here we create a new virtual machine and install Ubuntu 16.04 LTS Server on it. In this instance, we
More informationSUNDE TM. User s Manual for H4 and earlier models
SUNDE TM User s Manual for H4 and earlier models 2012 Huiyuan Co., Ltd. All rights reserved. THANK YOU FOR PURCHASING SUNDE NETWORK TERMINAL. PLEASE READ THIS MANUAL CAREFULLY BEFORE USE. NOTE: All the
More informationThis tutorial will guide you how to setup and run your own minecraft server on a Linux CentOS 6 in no time.
This tutorial will guide you how to setup and run your own minecraft server on a Linux CentOS 6 in no time. Running your own server lets you play together with your friends and family with your own set
More informationLAN Setup Reflection
LAN Setup Reflection After the LAN setup, ask yourself some questions: o Does your VM have the correct IP? o Are you able to ping some locations, internal and external? o Are you able to log into other
More informationThe TinyHPC Cluster. Mukarram Ahmad. Abstract
The TinyHPC Cluster Mukarram Ahmad Abstract TinyHPC is a beowulf class high performance computing cluster with a minor physical footprint yet significant computational capacity. The system is of the shared
More informationDNS CACHE POISONING LAB
University of Trento Network Security - Malware lab 2 th May 2016 DNS CACHE POISONING LAB GROUP #15: MATTEO FIORANZATO MATTEO MATTIVI ANDREA SIMONELLI MICHELA TESTOLINA DON T CLOSE OR MOVE ANY WINDOW Lab
More informationHow to Install Forcepoint NGFW in Amazon AWS TECHNICAL DOCUMENT
How to Install Forcepoint NGFW in Amazon AWS TECHNICAL DOCUMENT Table of Contents TABLE OF CONTENTS... 1 TEST NETWORK DIAGRAM... 2 PREPARING YOUR VPC... 3 IP addressing... 3 Virtual Private Cloud (VPC)...
More informationReference. Application
This document will show one way of configuring the Vyatta router as an Internet firewall/gateway and will demonstrate the configuration for use with a cable modem. Furthermore, the LAN interfaces are (optionally)
More informationCS 0449 Project 4: /dev/rps Due: Friday, December 8, 2017, at 11:59pm
CS 0449 Project 4: /dev/rps Due: Friday, December 8, 2017, at 11:59pm Project Description Standard UNIX and Linux systems come with a few special files like /dev/zero, which returns nothing but zeros when
More informationConfiguring a Standalone VCL Environment using VMware Server 2.0
Configuring a Standalone VCL Environment using VMware Server 2.0 DISCLAIMER! This document provides instuctions for configuring a standalone VCL environment running on a single computer which is able to
More informationExercise 1: Basic Tools
Exercise 1: Basic Tools This exercise is created so everybody can learn the basic tools we will use during this course. It is really more like a tutorial than an exercise and, you are not required to submit
More informationContents. About. Script. IPv6_setup_Hurricane_Electric_Tunnel_Broker
Contents About 1 About 2 Script 3 Install Steps 4 OpenDNS Setting 5 Reducing Script Size 6 See Also This will... Set up HE's tunnel broker service. Automatically nds your wan ip at boot using whatismyip.com
More informationReference. Application. Installation
This document will show one way of configuring the Vyatta router as an Internet firewall/gateway and will demonstrate the configuration of the Sangoma S518 ADSL interface card. Furthermore, the LAN interfaces
More informationMaterial for the Networking lab in EITF25 & EITF45
Material for the Networking lab in EITF25 & EITF45 2016 Preparations In order to succeed with the lab, you must have understood some important parts of the course. Therefore, before you come to the lab
More informationGuide to your Plug Computer
This document lives here: http://inst.eecs.berkeley.edu/~ee122/fa11/project3/guide-to-plug.pdf Guide to your Plug Computer UC Berkeley, EE 122, Fall 2011 Version 1 This document is a step-by-step guide
More informationIntroduction to Linux. Woo-Yeong Jeong Computer Systems Laboratory Sungkyunkwan University
Introduction to Linux Woo-Yeong Jeong (wooyeong@csl.skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu What is Linux? A Unix-like operating system of a computer What is an
More informationThis describes how to use DD-WRT to connect to a Cisco VPN Concentrator using vpnc without auto-reconnect and without connect on startup
vpnc is supposed to work with: Cisco VPN concentrator 3000 Series Cisco IOS routers Cisco PIX / ASA Zecurity Appliances Juniper/Netscreen Contents 1 This describes how to use DD-WRT to connect to a Cisco
More informationROUTING INTRODUCTION TO IP, IP ROUTING PROTOCOLS AND PROXY ARP
IP ROUTING INTRODUCTION TO IP, IP ROUTING PROTOCOLS AND PROXY ARP Peter R. Egli 1/37 Contents 1. IP Routing 2. Routing Protocols 3. Fragmentation in the IP Layer 4. Proxy ARP 5. Routing and IP forwarding
More information