InfoSys How To: Remote Access
- How do I get Remote Access to the CFMRI servers?
- How to X11 for Mac?
- how to X11 for Linux?
- How to X11 for Windows?
- How do I Secure my Workstation?
How do I get Remote Access to the CFMRI servers?
Dynamic IP
- Open a Browser to http://vpn.ucsd.edu
- Login using your AD account and make sure you select "split" or "allthruucsd" as the Group.
- Follow the instructions on the VPN site
Static IP:
- Email fmri-support@ucsd.edu with your IP address to be added to the access control list.
Mac OS X has X11 preinstalled
- Open the X11 program.
- Open a terminal
- In a terminal type ‘ssh –X [your user name]@fmriserver.ucsd.edu’
X11 support is built-in to the operating system.
- Open a terminal
- In a terminal type ‘ssh –Y [your user name]@fmriserver.ucsd.edu’
- If the above line doesn't work use -X instead of -Y
Use xming from http://sourceforge.net/projects/xming for free and putty
You also may use Xshell by NetSarang which is free for Educational use and for home use, instead of putty.
- Run Xming (note when installing Xming: if you get a prompt to allow xming in your firewall, select deny)
- Open putty by double-clicking it. It will bring up the interface.
- First, setup the connection info in Host Name field and select SSH (SSH is using port 22).
- In Connection Category, find the Connection tree. In SSH, expand it and you will see the Tunnels window. Click "Enable X11 forwarding". It is setting the default to X display at "localhost:0".
- Return to Session and save this session with a name you like. You should use the Host Name to make it easy to remember where you are connecting to.
How do I Secure my Workstation?
MAC:-
If you enabled ssh remote login on your workstation, please do the
following:
- tcp wrapper is installed by default
To enable:
create the following files
/etc/hosts.allow
sshd: 137.110.192. (for the VPN)
sshd: 132.239.132. (for our local subnet)
/etc/hosts.deny
ALL: ALL
- Disable protocol version 1 from the /etc/sshd_config
edit the line
Protocol 2, 1
to:
Protocol 2
- tcp wrapper is installed by default
- Your user account is recommended not to be an admin account, have a
separate admin account.
- We used to open post 6000-6010 for X forward, please remove that if
it exists in the MAC OS X build in firewall.
Use the
ssh -Y <loginname>@servername.ucsd.edu
When using the xhost command, make sure to just open the traffic for a certain IP, ex:
xhost + <IP address>
A link from network security that has more information for MACs:
http://computing.geology.ucdavis.edu/security/CyberSafety-MacQuickClick.php