Remote Access: Difference between revisions

From Lsdf
Jump to navigationJump to search
mNo edit summary
Line 14: Line 14:
ssh -L 2222:172.18.95.14:22 -l <USERID> scc-cn-r164-l.scc.kit.edu
ssh -L 2222:172.18.95.14:22 -l <USERID> scc-cn-r164-l.scc.kit.edu


Than use the NX client 3.5.0.x to connect to the system over the tunnel
Then use the NX client 3.5.0.x to connect to the system over the tunnel
NXclient - > configure --> host localhost port 2222
NXclient - > configure --> host localhost port 2222
The client package for Linux is available on the systems in the
The client package for Linux is available on the systems in the

Revision as of 22:57, 2 August 2015

Hardware resets

Use the ipmitool from any other system for example from the jumphost. Graphical access is not necessary.

        ipmitool -H HOST -U USERID -P PASSW0RD -I lanplus power cycle

where HOST is the hostname from the IMM interface from the IP numbers list. For example:

        ipmitool -H 172.18.95.111 -U USERID -P PASSW0RD -I lanplus power cycle

Graphical Interface

I think the NX client is the securest, performanced and best way to access a server from a remote site. We used it also on other customer sites. You must use a ssh tunnel between you and the jump host. (this is a tunnel to the mover4 (172.18.95.14) - change it to the host you want)

        ssh -L 2222:172.18.95.14:22 -l <USERID> scc-cn-r164-l.scc.kit.edu

Then use the NX client 3.5.0.x to connect to the system over the tunnel

        NXclient - > configure --> host localhost port 2222

The client package for Linux is available on the systems in the /root/Software/nx directory.

As userid you should use your own ID because of the suspended sessions an different configurations that someone want. Pls add a user by yourself. You can test the access with ssh

        ssh -p 2222 USERID@localhost

Secure Shell

Access to sshd running on port 22. Open from all hosts within KIT. From outside KIT use the "Jumphost" scc-cn-r164-l.scc.kit.edu with your KIT account. You have to be in the group "lsdf-admins".