Changes

Jump to: navigation, search

OPS235 Lab 7 - CentOS7

2 bytes added, 08:37, 5 April 2016
Part 1: How do you use ssh to tunnel other traffic.
# On your '''centos1''' VM (i.e. the http server), confirm everything is working locally by using a browser to connect to '''http://localhost'''
# Set the default firewall configuration on centos1 to '''REJECT''' incoming requests to http (TCP/80)
# NOTE: '''centos1''': if '''http://localhost''' stops working locally, add the following iptables rule to centos1, as root <br /><b><code><span style="color:#3366CC;font-size:1.2em;">iptables -I INPUT -i lo -j ACCEPT</span></code></b> # Confirm On '''centos2''' confirm that you can't connect by using firefox on centos to connect to centos1 '''http://centos1/'''
# On '''centos2''' confirm that the httpd service is stopped so it cannot interfere with your observations.
# The next step is to establish a <u>tunnel</u>. When you establish a tunnel you make an ssh connection to a remote host and open a new port on the local host. That local host port is then connected to a port on the remote host through the established tunnel. When you send requests to the local port it is forwarded through the tunnel to the remote port.
198
edits

Navigation menu