Using bastion.service.rug.nl to connect to your PC at work
|
|
|
- Chloe Quinn
- 9 years ago
- Views:
Transcription
1 Using bastion.service.rug.nl to connect to your PC at work This document consists of three parts: 1. Connecting to your PC at work through the Bastion-host using SSH. Which step do you take to connect your pc at work making use of a ssh key-pair. 2. Bastion How-To using WinSCP in Windows How do you use WinSCP to connect to your pc at work and transfer files between your work pc and the one at home 3. Using your bastion key-pair with Putty How to convert your bastion ssh key-pair with PuTTYgen so you can use it with PuTTY.
2 I. Connecting to your PC at work through the Bastion-host using SSH. You first have to generate the keys from a PC inside the RuG network. In this manual we've used 'p123456' as an example, this should be replaced with your personal p-number. 1. Generating your key-pair On your Linux PC at work, type the following to connect to the Bastion-host for the first time: $ ssh -p 2222 [email protected] You will be prompted to enter your password, do so! In the background a home directory and a SSH key-pair are generated for you on the Bastion-host. When it's done you'll receive a prompt on the Bastion-host, "p123456@bastion:~$". To prevent abuse of your private key, you can add a pass-phrase to it. We haven't put a passphrase on your private key by default. Use the following command on the Bastion-host to create a pass-phrase on your private key: $ ssh-keygen -p 2. Copy key-pair to your workstation The keys we've just generated can be found in the directory, "/home/p123456/.ssh/". You should see a file 'id_dsa' and 'id_dsa.pub' there. To make sure we can connect from the Bastion-host to your pc at work again, we have to copy the public key(id_dsa.pub) to your workstation.!make a backup of any keys already in your ~/.ssh, or use another directory, because this command will overwrite them! To download a copy, do the following on the Bastion-host (replace 'PC-Work.fac.rug.nl' with your personal PC name or IP-address): $ scp ~/.ssh/id_dsa* [email protected]:/home/p123456/.ssh/ We've also copied the personal key with this command, so you can copy that to an usb-drive to take home later on. 3. Testing your key-pair Now to test that it actually works type the following on the Bastion-host prompt (again... replace 'p123456' and 'PC-Work.fac.rug.nl' with your personal info): $ ssh [email protected] The authenticity of host 'PC-Work.fac.rug.nl' can't be established. DSA key fingerprint is a2:da:22:45:c3:f2:67:97:1b:86:12:a3:3e:c3:4a:d9. Are you sure you want to continue connecting (yes/no)? yes Warning: Permanently added 'PC-Work.fac.rug.nl' (DSA) to the list of known hosts. Since this is the first time we're connecting the identity hasn't been verified yet, so enter 'yes' when the question appears if you want to continue connecting. Now the Bastion-host identity is verified on your 'PC-Work' and the question won't appear again. You should receive your own (PC-Work) prompt now, "[email protected]:~$". This is it, now your connected to your own PC through the Bastion-host.
3 4. Taking your key home The only thing which remains now is to copy your personal key(id_dsa), which we copied to '/home/p123456/.ssh/' in step 2, to a usb-drive and take it home. Depending on your operating system and software at home you'll have to copy the key to different locations. We can't explain this properly, because there are too many different operating systems and programs for making a SSH connection. But we can always try to help, if you ask us.
4 II. Bastion How-To using WinSCP in Windows Part 1 On the following link, download the 'Installation package' for "WinSCP" and install it: Start "WinSCP". Under 'Host name:' enter: bastion.service.rug.nl Under 'Port number:' enter: 2222 Under 'User name:' and 'Password:' enter your personal p<number> and password. Now click on 'Login'. You ll receive a warning message: Answer by clicking 'Yes'.
5 You are now in your home directory on the Bastion host. In the directory '.ssh' (on the right side), you ll find the key-pair that was just generated for you. There are two files there named, 'id_dsa' and 'id_dsa.pub'. Copy these two files to your local hard drive, e.g. in a new SSH directory in your 'My Documents'.
6 Part 2 Next you'll need another program, PuTTYgen, to make the private key readable by Windows applications. You can download it here: Start "PuTTYgen". Click the 'Load' button. Next to 'Files of type:' select 'All Files (*.*)'. Now browse to where you saved your key-pair, select 'id_dsa' and click 'Open'. You ll receive conformation when it s done.
7 Now to make your private key safer(in case you lose the memory stick on which you've copied it) you can enter a passphrase here, but it isn't mandatory. Click the 'Save private key' button and save the key where you like, e.g. in a new SSH directory in your 'My Documents'.
8 Part 3 This last step is to connect to your PC at work. Start "WinSCP" again. Under 'Host name:' enter: <Hostname.domain or IP-number of your PC at work> Under 'Port number:' enter: 22 Under 'User name:' and 'Password:' enter your personal p<number> and password. Under 'Private key file:' enter the path to where you ve just saved the new private key file with "PuTTYgen". When you click on 'Login' now, you ll connect through the Bastion host, to your PC at work.
9 III. Using your bastion key-pair with Putty To use public key authentication, the first step is to generate a pair of private and public keys on the Linux side. I would assume that you login as a user called "p123456" and your machine is called PC-Work.fac.rug.nl (replace 'p123456' and 'PC-Work.fac.rug.nl' with your personal info) 1. Login Linux as user "p123456". You could do it at the Linux console or via telnet. 2. Execute `ssh-keygen` to generate a version 2 public and private key pair into directory /home/user/.ssh. The passphrase is optional (but preferred). P123456@ PC-Work.fac.rug.nl:~$ ssh-keygen -t rsa Generating public/private rsa key pair. Enter file in which to save the key (/home/p123456/.ssh/id_rsa): /home/p123456/.ssh/id_rsa already exists. Overwrite (y/n)? y Enter passphrase (empty for no passphrase): Enter same passphrase again: Your identification has been saved in /home/p123456/.ssh/id_rsa. Your public key has been saved in /home/p123456/.ssh/id_rsa.pub. The key fingerprint is: ec:f4:3f:b5:fe:2f:de:22:6c:42:8c:38:ad:6c:5e:96 P123456@server 3.Execute `cd /home/p123456/.ssh` 4. You should see 2 files: id_rsa and id_rsa.pub. Now execute the following command: cp id_rsa.pub authorized_keys 5. Copy /home/p123456/.ssh/id_rsa from Linux to Windows. Converting the OpenSSH private key to Putty format Next, we head to the Windows side. In step 4, you created two key files (id_rsa and id_rsa.pub). Putty cannot directly open OpenSSH keys. We need to convert id_rsa to id_rsa.ppk using a program called puttygen.exe. 6. At the Windows side, download puttygen.exe from Putty website: 7. Execute puttygen.exe 8. Click File->Load Private Key, load the file "id_rsa" from Step 5. Enter the passphrase if you used it in step 2.
10 9. Now the key has been loaded as in the figure above. Hit the button "Save private key". The converted key would be saved as "id_rsa.ppk". Logging in Openssh using id_rsa.ppk Download putty.exe from Putty website. It's time to really login OpenSSH using putty.exe on Windows side. The steps here would be a little bit more complicated. 10. Invoke putty.exe Click "Session" in the sidebar.
11 Enter ip address of your server (e.g., ) Click "SSH" in the Protocol option Choose "SSH" under "Connection" in the sidebar In "Preferred SSH protocol version", select "2 only" click "Auth" under "SSH" Hit the Browse button, select the file "id_rsa.ppk" from Step hit "Session" again in step 10.1
12 Enter a name (e.g. "p session") in the textbox directly under "Saved Sessions" Hit the "Save" button. The name "p session" would appear in the listbox of "Saved Sessions" Double-click "p session". Now you would be presented with a login screen for OpenSSH Enter the linux user name "p123456" Enter the passphrase if you specified it in step 2. Login as: p Authenticating with public key "importedopenssh-key" Passphrase for key "imported- openssh-key": Last login: Wed May 31 12:35: from p123456@server:~$ 11. You have successfully logged into your Linux server via OpenSSH.
SSH with private/public key authentication
SSH with private/public key authentication In this exercise we ll show how you can eliminate passwords by using ssh key authentication. Choose the version of the exercises depending on what OS you are
Install and configure SSH server
Copyright IBM Corporation 2009 All rights reserved Install and configure SSH server What this exercise is about... 1 What you should be able to do... 1 Introduction... 1 Part 1: Install and configure freesshd
Configuring for SFTP March 2013
Configuring for SFTP March 2013 Overview You can upload files to and download files from Optimal Payments securely via SFTP. In order to be configured to upload and download files via SFTP, contact Technical
Secure Shell. The Protocol
Usually referred to as ssh The name is used for both the program and the protocol ssh is an extremely versatile network program data encryption and compression terminal access to remote host file transfer
A SHORT INTRODUCTION TO BITNAMI WITH CLOUD & HEAT. Version 1.12 2014-07-01
A SHORT INTRODUCTION TO BITNAMI WITH CLOUD & HEAT Version 1.12 2014-07-01 PAGE _ 2 TABLE OF CONTENTS 1. Introduction.... 3 2. Logging in to Cloud&Heat Dashboard... 4 2.1 Overview of Cloud&Heat Dashboard....
TS-800. Configuring SSH Client Software in UNIX and Windows Environments for Use with the SFTP Access Method in SAS 9.2, SAS 9.3, and SAS 9.
TS-800 Configuring SSH Client Software in UNIX and Windows Environments for Use with the SFTP Access Method in SAS 9.2, SAS 9.3, and SAS 9.4 dsas Table of Contents Overview... 1 Configuring OpenSSH Software
WinSCP PuTTY as an alternative to F-Secure July 11, 2006
WinSCP PuTTY as an alternative to F-Secure July 11, 2006 Brief Summary of this Document F-Secure SSH Client 5.4 Build 34 is currently the Berkeley Lab s standard SSH client. It consists of three integrated
Securing Windows Remote Desktop with CopSSH
Securing Windows Remote Desktop with CopSSH Presented by [email protected] If you enjoyed this article, please consider joining our Folding@Home team I like having the ability to remotely access
SSH. Introduction. SSH Private Key
SSH 1. Introduction 2. SSH Private Key 2.1. How can I download my private SSH key 2.2. How can I get my private SSH key in PPK format? 3. How to connect to my server 4. How can I access my server as the
Guide to the Configuration and Use of SFTP Clients for Uploading Digital Treatment Planning Data to IROC RI
Guide to the Configuration and Use of SFTP Clients for Uploading Digital Treatment Planning Data to IROC RI The Quality Assurance Review Center has tested several SFTP client programs for submitting digital
SSH, SCP, SFTP, Denyhosts. Süha TUNA Res. Assist.
SSH, SCP, SFTP, Denyhosts Süha TUNA Res. Assist. Outline 1. What is Secure Shell? 2. ssh (Install and Configuration) 3. scp 4. sftp 5. X11 Forwarding 6. Generating Key Pairs 7. Disabling root Access 8.
TELNET CLIENT 5.11 SSH SUPPORT
TELNET CLIENT 5.11 SSH SUPPORT This document provides information on the SSH support available in Telnet Client 5.11 This document describes how to install and configure SSH support in Wavelink Telnet
Securing Windows Remote Desktop with CopSSH
Securing Windows Remote Desktop with CopSSH Presented by [email protected] If you enjoyed this article, please consider joining our Folding@Home team I like having the ability to remotely access
Miami University RedHawk Cluster Connecting to the Cluster Using Windows
Miami University RedHawk Cluster Connecting to the Cluster Using Windows The RedHawk cluster is a general purpose research computing resource available to support the research community at Miami University.
SSH and Basic Commands
SSH and Basic Commands In this tutorial we'll introduce you to SSH - a tool that allows you to send remote commands to your Web server - and show you some simple UNIX commands to help you manage your website.
CASHNet Secure File Transfer Instructions
CASHNet Secure File Transfer Instructions Copyright 2009, 2010 Higher One Payments, Inc. CASHNet, CASHNet Business Office, CASHNet Commerce Center, CASHNet SMARTPAY and all related logos and designs are
File transfer clients manual File Delivery Services
File transfer clients manual File Delivery Services Publisher Post CH Ltd Information Technology Webergutstrasse 12 CH-3030 Berne (Zollikofen) Contact Post CH Ltd Information Technology Webergutstrasse
Step One: Installing Rsnapshot and Configuring SSH Keys
Source: https://www.digitalocean.com/community/articles/how-to-installrsnapshot-on-ubuntu-12-04 What the Red Means The lines that the user needs to enter or customize will be in red in this tutorial! The
SSH! Keep it secret. Keep it safe
SSH! Keep it secret. Keep it safe Using Secure Shell to Help Manage Multiple Servers Don Prezioso Ashland University Why use SSH? Proliferation of servers Physical servers now Virtual / Hosted System management
ASX SFTP External User Guide
ASX SFTP External User Guide Table of Contents 1. SOLUTION OVERVIEW... 3 1.1. BUSINESS CONTINUITY SOLUTION... 3 1.2. USER MANUAL AUDIENCE... 3 2. REQUESTING SFTP ACCESS... 4 2.1. SFTP ACCOUNTS... 4 2.2.
File Transfer Examples. Running commands on other computers and transferring files between computers
Running commands on other computers and transferring files between computers 1 1 Remote Login Login to remote computer and run programs on that computer Once logged in to remote computer, everything you
Security Configuration Guide P/N 300-010-493 Rev A05
EMC VPLEX Security Configuration Guide P/N 300-010-493 Rev A05 June 7, 2011 This guide provides an overview of VPLEX security configuration settings, including secure deployment and usage settings needed
Market Data Platform Real Time. SNAPSHOT DATA Capital Market
TECHNICAL DOCUMENT Market Data Platform Real Time SNAPSHOT DATA Capital Market (STANDARD PRODUCT) Version 1.0 31 MAR 2015 DOTEX INTERNATIONAL LIMITED EXCHANGE PLAZA, PLOT NO. C/1, G BLOCK, BANDRA-KURLA
SSH The Secure Shell
June 26, 2007 UniForum Chicago SSH The Secure Shell Hemant Shah [email protected] Platform: Linux and Unix What is SSH? June 26, 2007 Copyright Hemant Shah 2 What is SSH? The Secure Shell It is a protocol
Using WinSCP to Transfer Data with Florida SHOTS
Using WinSCP to Transfer Data with Florida SHOTS Purpose: This document contains instructions for downloading, installing and using WinSCP, a free software download that enables the basic transfer of data
If you prefer to use your own SSH client, configure NG Admin with the path to the executable:
How to Configure SSH Each Barracuda NG Firewall system is routinely equipped with an SSH daemon listening on TCP port 22 on all administrative IP addresses (the primary box IP address and all other IP
How to FTP (How to upload files on a web-server)
How to FTP (How to upload files on a web-server) In order for a website to be visible to the world, it s files (text files,.html files, image files, etc.) have to be uploaded to a web server. A web server
Upgrading Redwood Engine Software. Version 2.0.x to 3.1.0
Upgrading Redwood Engine Software Version 2.0.x to 3.1.0 December 2013 APP NOTE Table of Contents 1 Introduction... 3 1.1 Backing Up the Redwood Engine Configuration, Statistics, and Log Files... 3 2 Checking
SSH access to databases at DIMDI
SSH access to databases at DIMDI From November 2013 we will be fulfilling the requirement of a large number of users for increased security during research activities. For this, we will be providing a
Remote Access to Unix Machines
Remote Access to Unix Machines Alvin R. Lebeck Department of Computer Science Department of Electrical and Computer Engineering Duke University Overview We are using OIT Linux machines for some homework
Back Up Linux And Windows Systems With BackupPC
By Falko Timme Published: 2007-01-25 14:33 Version 1.0 Author: Falko Timme Last edited 01/19/2007 This tutorial shows how you can back up Linux and Windows systems with BackupPC.
Using SFTP on the z/os Platform
Using SFTP on the z/os Platform Thursday, December 10 th 2009 Steve Goetze Kirk Wolf http://dovetail.com [email protected] Copyright 2009, Dovetailed Technologies Slide 1 Dovetailed Technologies Our operating
Homework #7 Amazon Elastic Compute Cloud Web Services
Homework #7 Amazon Elastic Compute Cloud Web Services This semester we are allowing all students to explore cloud computing as offered by Amazon s Web Services. Using the instructions below one can establish
Source Code Management for Continuous Integration and Deployment. Version 1.0 DO NOT DISTRIBUTE
Source Code Management for Continuous Integration and Deployment Version 1.0 Copyright 2013, 2014 Amazon Web Services, Inc. and its affiliates. All rights reserved. This work may not be reproduced or redistributed,
Nessus Training Session 2 - Scanning and Reporting
Nessus Training Session 2 - Scanning and Reporting Prepared by Ramsey Dow for NWACC Contents Configuring Ubuntu for Authenticated Scanning Configuring Windows for Authenticated Scanning
Joint Venture Hospital Laboratories. Secure File Transfer Protocol (SFTP) Secure Socket Shell (SSH) User s Guide for plmweb.jvhl.
Joint Venture Hospital Laboratories Secure File Transfer Protocol (SFTP) Secure Socket Shell (SSH) User s Guide for plmweb.jvhl.org For Secure File Transfers via the Internet Version 2.0 November 2015
Adobe Marketing Cloud Using FTP and sftp with the Adobe Marketing Cloud
Adobe Marketing Cloud Using FTP and sftp with the Adobe Marketing Cloud Contents File Transfer Protocol...3 Setting Up and Using FTP Accounts Hosted by Adobe...3 SAINT...3 Data Sources...4 Data Connectors...5
IBM WebSphere Application Server Version 7.0
IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the
Lab 8.3.3b Configuring a Remote Router Using SSH
Lab 8.3.3b Configuring a Remote Router Using SSH Objectives Use SDM to configure a router to accept SSH connections. Configure SSH client software on a PC. Establish a connection to a Cisco ISR using SSH
Guide to the Configuration and Use of SFTP Clients for Uploading Digital Treatment Planning Data to ITC
Guide to the Configuration and Use of SFTP Clients for Uploading Digital Treatment Planning Data to ITC The ITC has tested several SFTP client programs for submitting digital data to the ITC. These include
Cloud Server powered by Mac OS X. Getting Started Guide. Cloud Server. powered by Mac OS X. AKJZNAzsqknsxxkjnsjx Getting Started Guide Page 1
Getting Started Guide Cloud Server powered by Mac OS X Getting Started Guide Page 1 Getting Started Guide: Cloud Server powered by Mac OS X Version 1.0 (02.16.10) Copyright 2010 GoDaddy.com Software, Inc.
SSH Key Exchange: Windows client to Unix/Linux server
SSH Key Exchange: Windows client to Unix/Linux server Table of contents 1 Audience... 2 2 Purpose...2 3 Prerequisites...2 4 SSH Key exchange: Windows client & Unix/Linux Server...3 4.1 Outline of steps
EventTracker Windows syslog User Guide
EventTracker Windows syslog User Guide Publication Date: September 16, 2011 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Introduction This document is prepared to help user(s)
HOW TO CREATE A SLICE IN GENI?
HOW TO CREATE A SLICE IN GENI? Ahmet Can Babaoglu Computer Science, North Carolina State University July, 2012 *Notice that all the steps are tested on Ubuntu 10.04 platform only. Step by step: How to
Tunnel VNC through SSH Tutorial Version 1
Tunnel VNC through SSH Tutorial Version 1 UltraVNC features a Data Stream Modification (DSM) plugin system which can provide an encrypted tunnel for the Virtual Network Computing (VNC) connection. This
Distributed convex Belief Propagation Amazon EC2 Tutorial
6/8/2011 Distributed convex Belief Propagation Amazon EC2 Tutorial Alexander G. Schwing, Tamir Hazan, Marc Pollefeys and Raquel Urtasun Distributed convex Belief Propagation Amazon EC2 Tutorial Introduction
Adafruit's Raspberry Pi Lesson 6. Using SSH
Adafruit's Raspberry Pi Lesson 6. Using SSH Created by Simon Monk Last updated on 2015-04-09 03:47:50 PM EDT Guide Contents Guide Contents Overview Enabling SSH Using SSH on a Mac or Linux SSH under Windows
RETRIEVING NMR DATA JB Stothers NMR Facility Materials Science Addition 0216 Department of Chemistry Western University
JB Stothers NMR Facility Materials Science Addition 0216 Department of Chemistry Western University 1 1. INTRODUCTION 1.1. About these Notes and Related Notes These notes describe how to retrieve NMR data
FUGU - SFTP FOR MACS- REFERENCE GUIDE
Information Technology FUGU - SFTP FOR MACS- REFERENCE GUIDE INTRODUCTION This document assumes that Fugu is already installed on your computer. If you don t have Fugu, CSUN faculty, staff and students
Installation. Wayne Nucleus Point-of-Sale (POS) System Secure FTP Back-Office Interface Version 1.02 R1. P/N 000-W2940174 Rev 05
Installation Wayne Nucleus Point-of-Sale (POS) System Secure FTP Back-Office Interface Version 1.02 R1 P/N 000-W2940174 Rev 05 DANGER READ THIS MANUAL BEFORE YOU BEGIN Dispensers have both electricity
Secure File Transfer Installation. Sender Recipient Attached FIles Pages Date. Development Internal/External None 11 6/23/08
Technical Note Secure File Transfer Installation Sender Recipient Attached FIles Pages Date Development Internal/External None 11 6/23/08 Overview This document explains how to install OpenSSH for Secure
FUJITSU Cloud IaaS Trusted Public S5 Connecting to a Virtual Machine (VM)
FUJITSU Cloud IaaS Trusted Public S5 Connecting to a Virtual Machine (VM) This guide describes the process for connecting to a IaaS Trusted Public S5 Virtual Machine Each Virtual System provides the ability
Secure access to the DESY network using SSH
1 November 29, 2007 Secure access to the DESY network using SSH UCO @ DESY November 29, 2007, Hamburg 2 Contents 1 General Information 4 1.1 How to reach UCO............................... 4 2 Introduction
Clearswift Information Governance
Clearswift Information Governance Implementing the CLEARSWIFT SECURE Encryption Portal on the CLEARSWIFT SECURE Email Gateway Version 1.10 02/09/13 Contents 1 Introduction... 3 2 How it Works... 4 3 Configuration
Handle Tool. User Manual
User Manual Corporation for National Research Initiatives Version 2 November 2015 Table of Contents 1. Start the Handle Tool... 3 2. Default Window... 3 3. Console... 5 4. Authentication... 6 5. Lookup...
How to upload large files to a JTAC Case
How to upload large files to a JTAC Case Summary: JTAC often requires data to be collected (such as configuration files, tracedump data, log files, etc) and sent in for review. If the files are larger
Overview. Remote access and file transfer. SSH clients by platform. Logging in remotely
Remote access and file transfer Overview Remote logins to Bio-Linux with ssh Running software from another machine Logging in from another machine Getting files on and off Bio-Linux Transferring files
Using Microsoft s CA Server with SonicWALL Devices
SonicOS Using Microsoft s CA Server with SonicWALL Devices Introduction You can use the Certificate Server that ships with Windows 2000/2003 Server to create certificates for SonicWALL devices, as well
Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway
Unifying Information Security Implementing TLS on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 3 2 Understanding TLS... 4 3 Clearswift s Application of TLS... 5 3.1 Opportunistic TLS...
v4: How to create a BartPE Rescue CD for Macrium Reflect
So, you ve created your Linux based recovery CD, you push it in and boot up and it doesn t find your hard drives, network or both what s next? If the Linux Based Recovery CD option doesn t work for you
AWS Quick Start Guide. Launch a Linux Virtual Machine Version
AWS Quick Start Guide Launch a Linux Virtual Machine AWS Quick Start Guide: Launch a Linux Virtual Machine Copyright 2016 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's
Uploading and Downloading Files to the HIS Server. Application Requirements
Uploading and Downloading Files to the HIS Server Your PHLive environment and How To document screenshots may not always match due to the dynamic nature of HIS. If any modification to the system impacts
How to backup a remote MySQL server with ZRM over the Internet
How to backup a remote MySQL server with ZRM over the Internet White paper "As MySQL gains widespread adoption and moves more broadly into the enterprise, ZRM for MySQL addresses the growing need among
How to Tunnel Remote Desktop Through SSH on a Windows Computer
College of Engineering > Computing Resources > Computing Best Practices > W indows Remote Desktop How to Tunnel Remote Desktop Through SSH on a Windows Computer Why me and why now? CAE has been charged
Fugu 1.0. 10 April 2003. An Open-Source Mac OS X Frontend for OpenSSH's sftp client. The Edible Part of the Blowfish
Fugu 1.0 10 April 2003 An Open-Source Mac OS X Frontend for OpenSSH's sftp client The Edible Part of the Blowfish http://rsug.itd.umich.edu/software/fugu [email protected] 2003 The Regents of the University
Laboration 3 - Administration
Laboration 3 - Administration During this laboration we will learn how to install, configure and test servers that will allow you to have access remote machines, copy files between computers and file sharing.
axsguard Gatekeeper Command Line Interface How To v1.6
axsguard Gatekeeper Legal Notice VASCO Products VASCO data Security, Inc. and/or VASCO data Security International GmbH are referred to in this document as 'VASCO'. VASCO Products comprise Hardware, Software,
Automated Offsite Backup with rdiff-backup
Automated Offsite Backup with rdiff-backup Michael Greb 2003-10-21 Contents 1 Overview 2 1.1 Conventions Used........................................... 2 2 Setting up SSH 2 2.1 Generating SSH Keys........................................
LiteCommerce Advanced Security Module. Version 2.8
LiteCommerce Advanced Security Module Version 2.8 Reference Manual Revision date: Jul/03/2007 LiteCommerce Advanced Security Module Reference Manual I Table of Contents Introduction...1 Administrator...2
Secure File Transfer Protocol User Guide. Date Created: November 10, 2009 Date Updated: April 14, 2014 Version: 1.7
Secure File Transfer Protocol User Guide Date Created: November 10, 2009 Date Updated: April 14, 2014 Version: 1.7 Secure File Transfer Protocol User Guide Table of Contents 1 Overview... 1 1.1 Purpose
LoadMaster SSL Certificate Quickstart Guide
LoadMaster SSL Certificate Quickstart Guide for the LM-1500, LM-2460, LM-2860, LM-3620, SM-1020 This guide serves as a complement to the LoadMaster documentation, and is not a replacement for the full
Hadoop Basics with InfoSphere BigInsights
An IBM Proof of Technology Hadoop Basics with InfoSphere BigInsights Unit 4: Hadoop Administration An IBM Proof of Technology Catalog Number Copyright IBM Corporation, 2013 US Government Users Restricted
Introductory Note 711 & 811. Remote Access to Computer Science Linux Files Using Secure Shell Protocols
Cardiff University Cardiff School of Computer Science Prifysgol Caerdydd Ysgol Cyfrifiadureg Caerdydd Introductory Note 711 & 811 Remote Access to Computer Science Linux Files Using Secure Shell Protocols
WinSCP for Windows: Using SFTP to upload files to a server
WinSCP for Windows: Using SFTP to upload files to a server Quickstart guide Developed by: Academic Technology Services & User Support, CIT atc.cit.cornell.edu Last updated 9/9/08 WinSCP 4.1.6 Getting started
CloudCIX Bootcamp. The essential IaaS getting started guide. http://www.cix.ie
The essential IaaS getting started guide. http://www.cix.ie Revision Date: 17 th August 2015 Contents Acronyms... 2 Table of Figures... 3 1 Welcome... 4 2 Architecture... 5 3 Getting Started... 6 3.1 Login
SSH and FTP on Ubuntu 9.04. WNYLUG Neal Chapman 09/09/2009
SSH and FTP on Ubuntu 9.04 WNYLUG Neal Chapman 09/09/2009 SSH (Secure Shell) Secure Shell or SSH is a network protocol that allows data to be exchanged using a secure channel between two networked devices.
Virtual Appliance Setup Guide
The Barracuda SSL VPN Vx Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda SSL VPN hardware appliance. It is designed for easy deployment
Creating an ESS instance on the Amazon Cloud
Creating an ESS instance on the Amazon Cloud Copyright 2014-2015, R. James Holton, All rights reserved (11/13/2015) Introduction The purpose of this guide is to provide guidance on creating an Expense
FILE TRANSFER PROTOCOL (FTP) SITE
FILE TRANSFER PROTOCOL (FTP) SITE Section 1 - SPIN System Overview As part of the digital plan submission process that Registries is currently implementing a File Transfer Protocol (FTP) site has been
IPMI Firmware Update (AMI) In WEB-GUI/DOS/WIN/Linux
IPMI Firmware Update (AMI) In WEB-GUI/DOS/WIN/Linux Firmware Updates in WEB-GUI: 1.1 Click < Update Firmware > under Maintenance 1.2 Click to enter the update mode. A warning message
2 Advanced Session... Properties 3 Session profile... wizard. 5 Application... preferences. 3 ASCII / Binary... Transfer
Contents I Table of Contents Foreword 0 Part I SecEx Overview 3 1 What is SecEx...? 3 2 Quick start... 4 Part II Configuring SecEx 5 1 Session Profiles... 5 2 Advanced Session... Properties 6 3 Session
STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS
Notes: STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS 1. The installation of the STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation
Keystone 600N5 SERVER and STAND-ALONE INSTALLATION INSTRUCTIONS
The following instructions are required for installation of Best Access System s Keystone 600N5 (KS600N) network key control software for the server side. Please see the system requirements on the Keystone
Setting up Kerberos, AFS, and Putty on Windows Vista/Windows 7
Setting up Kerberos, AFS, and Putty on Windows Vista/Windows 7 Note on 64-bit Windows systems: On 64-bit Windows systems you will need to install both 32-bit and 64-bit distributions of both Kerberos and
Windows Clients and GoPrint Print Queues
Windows Clients and GoPrint Print Queues Overview The following tasks demonstrate how to configure shared network printers on Windows client machines in a Windows Active Directory Domain and Workgroup
Configure Backup Server for Cisco Unified Communications Manager
Configure Backup Server for Cisco Unified Communications Manager Document ID: 110309 Contents Introduction Prerequisites Requirements Components Used Conventions Configure a Backup Server for Cisco Unified
Quick Connect. Overview. Client Instructions. LabTech
LabTech Quick Connect QUICK CONNECT 1 Overview... 1 Client Instructions... 1 Technician Instructions... 4 VNC... 5 RDP... 6 RAssist (Remote Assistance)... 8 IE (Internet Explorer browser)... 9 CMD... 10
QUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
Hadoop Installation MapReduce Examples Jake Karnes
Big Data Management Hadoop Installation MapReduce Examples Jake Karnes These slides are based on materials / slides from Cloudera.com Amazon.com Prof. P. Zadrozny's Slides Prerequistes You must have an
STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER
Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable
CafePilot has 3 components: the Client, Server and Service Request Monitor (or SRM for short).
Table of Contents Introduction...2 Downloads... 2 Zip Setups... 2 Configuration... 3 Server...3 Client... 5 Service Request Monitor...6 Licensing...7 Frequently Asked Questions... 10 Introduction CafePilot
PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations
PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations Instructor Version Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 FA0/1
GETTING STARTED WITH FLEXI-CLOUD
GETTING STARTED WITH FLEXI-CLOUD WELCOME TO FLEXI-CLOUD. Flexi-CLOUD is the "on-demand" licensing solution powered by MYRIAD-connect. This document explains how to install Flexi-CLOUD servers and how to
