Changes

Jump to: navigation, search

OPS235 Lab 7 - CentOS7

No change in size, 09:39, 5 April 2016
Part 1: How do you use ssh to tunnel other traffic.
# Set the default firewall configuration on centos1 to '''REJECT''' incoming requests to http (TCP/80)
# NOTE: '''centos1''': if '''http://localhost''' stops working locally, add the following iptables rule to centos1, as root <br /><b><code><span style="color:#3366CC;font-size:1.2em;">iptables -I INPUT -i lo -j ACCEPT</span></code></b>
# On '''centos2''' confirm that the httpd service is stopped so it cannot interfere with your observations.
# On '''centos2''' confirm that you can't connect by using firefox to centos1 '''http://centos1/'''
# On '''centos2''' confirm that the httpd service is stopped so it cannot interfere with your observations.
# The next step is to establish a <u>tunnel</u>. When you establish a tunnel you make an ssh connection to a remote host and open a new port on the local host. That local host port is then connected to a port on the remote host through the established tunnel. When you send requests to the local port it is forwarded through the tunnel to the remote port.
# In a terminal in your '''centos2''' VM, '''make certain you are NOT logged in as root!'''
198
edits

Navigation menu