SSH Access with tunnels
Task: login to computenode over controlnode
ssh -At omi@omistack ssh computenode01
The proxy located at your local machine tunnels the traffic to different machines. You can access e.g. using a web browser the network as this machine/end point.
You probably have to change the port from 9999 to any other port since multiple persons at the same time need to use their own port.
Task: access as the control node
ssh -ND 9999 omi@omistack
Task: access as computenode01, to access the IPMI interfaces in Subnet 10.1.0.x/24
ssh -L9999:localhost:9999 omi@omistack -t \ ssh -ND 9999 computenode01
Computenode01 has an x11 server, firefox and javaws installed in order to access the graphical remote ipmi console. X11-Forwarding must be done in two terminals.
First Terminal (creates tunnel)
ssh omi@omistack -L2200:computenode01:22
Second Terminal (access with x-forwarding)
ssh omi@localhost -XYC -p2200 firefox # navigate to 10.1.0.x, execute java-webstart launcher with /usr/bin/javaws
Task: access as sdncontrol node, to access OpenDaylight
- Create SOCKS5 Proxy Tunnel
ssh -L9999:localhost:9999 omi@omistack -t \ ssh -ND 9999 sdncontrol
- Open Firefox and enter local SOCKS 5 proxy (localhost 9999)
- Go to http://10.1.1.13:8080/ and enter admin:admin