I believe the Next Generation Computing is Software Defined Infrastructure on top of the robust physical infrastructure. You can ask me anything about enterprise infrastructure (virtualization, compute, storage, network) and we can discuss it deeply on this blog. Don't hesitate to contact me.
Showing posts with label unix. Show all posts
Showing posts with label unix. Show all posts
Sunday, March 11, 2012
How to create and send disk image over ssh
dd bs=4m if=/dev/ad0 | ssh accontrol@192.168.4.185 'cat > image.dd'
Saturday, March 14, 2009
On demand VNC server with GDM
Each user can login (via ssh) to *nix server and start vncserver. Then he can login to X11 desktop via VNC viewer with defined vnc password. But it's far far away from nice solution. Much better solution is to setup vncserver as xinetd service.
First of all you have to define new service in particular port. Add line bellow into /etc/services
First of all you have to define new service in particular port. Add line bellow into /etc/services
vnc1024 5901/tcp # VNC & GDMnow create service description for xinetd. Go to directory /etc/xinetd.d
cd /etc/xinetd.dand create file vnc1024
service vnc1024Move to runlevel 3
{
disable = no
socket_type = stream
protocol = tcp
wait = no
user = nobody
server = /usr/bin/Xvnc
server_args = -inetd -query localhost -geometry 1024x800 -depth 16 -once -fp unix/:7100 -securitytypes=none
}
init 3Restart xinetd
/etc/init.d/xinetdMove back to runlevel 5
init 5And that's it. Now try connect via VNCviewer to port 6901
Tuesday, February 17, 2009
Configuration Point-to-Point OpenVPN link
I like OpenVPN because it's simple and it does what you need - VPN.
Let's assume that we have two un*x like servers with OpenVPN software and regular OS user openvpn in group openvpn. One server has IP address 192.168.4.10 and second 192.168.4.100.
In server 192.168.4.10 use following configuration file (openvpn.conf):
remote 192.168.4.100
ifconfig 10.0.0.1 10.0.0.2
dev tun0
port 5001
proto udp
secret /usr/local/etc/openvpn/secret.key
ping 10
comp-lzo
verb 5
mute 10
user openvpn
group openvpn
In server 192.168.4.100 use following configuration file (openvpn.conf):
remote 192.168.4.10
ifconfig 10.0.0.2 10.0.0.1
dev tun0
port 5001
proto udp
secret /usr/local/etc/openvpn/secret.key
ping 10
comp-lzo
verb 5
mute 10
user openvpn
group openvpn
In one of this two servers create secret.key by issuing following command:
openvpn --genkey --secret /usr/local/etc/openvpn/secret.key
Finaly:
Somehow (for example scp) copy secret key to second server into correct location and run openvpn daemons on both servers. On servers new network interface appears (tap) with IP addresses (10.0.0.1 and 10.0.0.2) and you can ping these 10.0.0.1-2 IP addresses over secure VPN link.
Here we go.
Let's assume that we have two un*x like servers with OpenVPN software and regular OS user openvpn in group openvpn. One server has IP address 192.168.4.10 and second 192.168.4.100.
In server 192.168.4.10 use following configuration file (openvpn.conf):
remote 192.168.4.100
ifconfig 10.0.0.1 10.0.0.2
dev tun0
port 5001
proto udp
secret /usr/local/etc/openvpn/secret.key
ping 10
comp-lzo
verb 5
mute 10
user openvpn
group openvpn
In server 192.168.4.100 use following configuration file (openvpn.conf):
remote 192.168.4.10
ifconfig 10.0.0.2 10.0.0.1
dev tun0
port 5001
proto udp
secret /usr/local/etc/openvpn/secret.key
ping 10
comp-lzo
verb 5
mute 10
user openvpn
group openvpn
In one of this two servers create secret.key by issuing following command:
openvpn --genkey --secret /usr/local/etc/openvpn/secret.key
Finaly:
Somehow (for example scp) copy secret key to second server into correct location and run openvpn daemons on both servers. On servers new network interface appears (tap) with IP addresses (10.0.0.1 and 10.0.0.2) and you can ping these 10.0.0.1-2 IP addresses over secure VPN link.
Here we go.
Subscribe to:
Posts (Atom)