Changes

Jump to: navigation, search

OPS235 Lab 7 - CentOS7

5 bytes added, 13:08, 25 June 2015
no edit summary
[[Image:Tunnel.png|thumb|right|600px|You can also use an ssh connection to '''tunnel other types of traffic'''. There could be different reasons for doing this. For example tunneling traffic for an unencrypted application/protocol through ssh can '''increase the security of that application''' (i.e. deceive potential hackers).<br><br>Alternatively you could use it to '''circumvent a firewall that is blocking traffic''' you wish to use but allows ssh traffic to pass through.]]
# For this section, you will still be using your '''centos1''' and '''centos2''' VMs.
# You We will be working with the 2nd scenario of bypassing a firewall that blocks http traffic.# In this investigation , '''centos1 ''' will be your '''http server ''' and '''centos2 ''' will be your <u>client</u>.# On the HTTP server , make sure that the Apache web server is installed by typing the command:<br /><b><code><span style="color:#3366CC;font-size:1.2em;">rpm -q httpd</span></code></b># If it is installed check the configuration of the service to see if it is automatically started at any runlevels run-levels by using the <codeb>chkconfig h</codeb> command.
# If it has not been started automatically start the service using the '''service''' command.
# Confirm that httpd is listening to TCP/80 using the '''netstat''' command.
# Once the tunnel is established use '''netstat''' to verify the port 20808 is listening on '''centos2'''
# Now using the browser on '''centos2''' connect to '''http://localhost:20808'''
#You should see the '''index.html ''' page on '''centos1'''.
# Close the ssh connection and verify that the port 20808 is no longer listening.
13,420
edits

Navigation menu