Changes

Jump to: navigation, search

OPS235 Lab 7 - CentOS7

48 bytes added, 08:01, 5 May 2015
no edit summary
=== Part 1: Enabling the sshd service. ===
# Use your '''c7host ''' machine to complete this section
# OpenSSH should have been installed by default. Lets confirm this by issuing the command:<br /> <b><code><span style="color:#3366CC;font-size:1.2em;">rpm -qa | grep ssh</span></code></b><
# You should see a number of packages installed including <code>openssh-clients</code> and <code>openssh-server</code>
You can also use ssh to tunnel window and bitmap information. Allowing us to login to a remote desktop host and run a Xwindows application such as <code>gedit</code> or <code>firefox</code> and the application will run on the remote host but be displayed on the local host.
# For this section, you will be using your '''centos1 ''' and '''centos2 ''' VMs.
# From centos2 '''ssh'' to '''centos1''' using the following command:<br /><b><code><span style="color:#3366CC;font-size:1.2em;">ssh -X -C user@centos1</span></code></b> &nbsp; (Where 'user' is your learn account on centos1)<br>(The '''-X''' option enables the forwarding of X window information, and the '''-C''' option enables compression for better performance).<br><br>
# Once connected run the '''gedit''' application. (Gnome Text Editor)
=== Investigation 6: How do you use ssh to tunnel other traffic. ===
{{Admon/note [[Tunnel.png| Use your centos2 and centos1 VMs thumb| Complete this investigation on your centos2 and centos1 VMs.}} {{Admon/note right| 485px| You can also use an ssh connection to '''tunnel other types of traffic'''. There could be different reasons for doing this. For example tunneling traffic for an unencrypted application/protocol through ssh can '''increase the security of that application''' (i.e. deceive potential hackers). Alternatively you could use it to circumvent a firewall that is blocking traffic you wish to use but allows ssh traffic to pass through.}}]]# For this section, you will still be using your '''centos1''' and '''centos2''' VMs.
# You will be working with the 2nd scenario of bypassing a firewall that blocks http traffic.
# In this investigation centos1 will be your http server and centos2 will be your client.
13,420
edits

Navigation menu