User Tools

Site Tools


institute_lorentz:institutelorentz_remoteaccess

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Last revisionBoth sides next revision
institute_lorentz:institutelorentz_remoteaccess [2022/05/31 09:12] – [SSH access/tunnelling behind firewalls] lenocilinstitute_lorentz:institutelorentz_remoteaccess [2022/05/31 09:32] – [SSH access/tunnelling behind firewalls] lenocil
Line 135: Line 135:
 When the connection is initiated you will be able to double-check the SSL certificate details, especially the ''CN'' entry (see above) which must correspond to our server ''access.lorentz.leidenuniv.nl''. Then upon a successful authentication, you will be let in and be able to use the command line as usual. When the connection is initiated you will be able to double-check the SSL certificate details, especially the ''CN'' entry (see above) which must correspond to our server ''access.lorentz.leidenuniv.nl''. Then upon a successful authentication, you will be let in and be able to use the command line as usual.
  
-Similarly it is possible to initiate an SSL-wrapped SSH SOCKS proxy connection useful to protect your browser sessions from eavesdroppers  as in the example below provided you set up your SSH client config as described above+Similarly it is possible to initiate an SSL-wrapped SSH SOCKS proxy connection useful to protect your browser sessions from eavesdroppers  as in the example below. Provided you set up your SSH client config as described above, type
  
 <code bash> <code bash>
institute_lorentz/institutelorentz_remoteaccess.txt · Last modified: 2022/11/29 12:27 by lenocil