...
The problem is that whenever I get connected to a remote computer using my VPN as router, after a while, sometimes short, sometimes long, sometimes immediately, the connection gets lost and I've to reconnect to the remote computer...
Without much activity the connection drop.
on the client side you could try to
If it works you can set your ServerAliveInternal to whatever works (2 5 10 100 ?) in /etc/ssh/ssh_config
Basically it creates traffic to keep your session alive.
On the server side you could check or modify the ClientAliveInterval
just as the title says.
thanks.
#General Rule Sets
/sbin/ipfw add 0300 check-state
/sbin/ipfw add 0301 deny tcp from any to any in established
/sbin/ipfw add 0302 pass tcp from any to any out setup keep-state
/sbin/ipfw add 0303 pass udp from any to any out
#SSH FTP
/sbin/ipfw add 0400... (11 Replies)
I'm investigating an issue where rsync's to an AIX server will sometimes fail. I suspect the problem might be due to the number of simultaneous SSH connections being made to the host dropping the rsync attempts. I'd like to view the number of open ssh connections. The who command will list logged... (1 Reply)
Hello,
What is the best way to disallow new ssh connections for the duration of my session ?
I want to evade read/write collisions. Things work like that - one session put files on server, other copies these files and then deletes them. So in order to evade collision:
- I check if there are... (1 Reply)
We have RSA SecureID softtoken key generator on my Windows machine.
It generates new keys every 1 minute.
Any HPUX server (be it ServerD or ServerP) requires my ID and the randomly generated RSA SecureID softtoken key from my Windows to login.
I login to ServerD.
Then I run a script... (0 Replies)
Hello All,
I want to test how much parallel ssh connections can be done on a server.
I am thinking of reading username and hostname from a file and then using a loop (may be for) to do ssh on different host.
Could anyone suggest me how can i write the script for the above.
Thank you in... (0 Replies)
Guys,
Can I use an open RDP port to gain ssh access to my Linux server running the other side of our firewall?
I work from home on the odd occasion, we only have RDP port 3389 available once logged into the VPN. I would rather ssh into my workstation without the need for a desktop display.
... (3 Replies)
Hi,
Sorry if this question has been asked before, however, I have tried looking in the forum (and google in general) and I haven't found an answer, so I thought I'd ask here.
I am trying to use a GUI application in Solaris 10. Normally I connect with a VPN then SSH and use Xming to... (2 Replies)
Hello Forum,
I'm using a bit of code from a script I found that allows me to capture the status code of connecting via SSH to remote servers:
ssh -qno StrictHostKeyChecking=no -o ConnectTimeout=1 user@$InputIP 'ls -l /home/user >/dev/null 2>&1' > /dev/null 2>&1
status="$(echo $?)"
echo... (4 Replies)
Discussion started by: greavette
4 Replies
LEARN ABOUT DEBIAN
gnunet-vpn
GNUNET-VPN(1) General Commands Manual GNUNET-VPN(1)NAME
gnunet-vpn - manually setup a GNUnet VPN tunnel
SYNOPSIS
gnunet-vpn [options]
DESCRIPTION
gnunet-vpn can be used to manually setup a VPN tunnel via the GNUnet network. There are two main types of tunnels. Tunnels to an exit
node which routes the traffic to the global Internet, and tunnels to a node that runs a service only within GNUnet. Depending on the type
of tunnel, gnunet-vpn takes different options. The "-i" option is required for tunnels to an exit node, whereas the "-p" and "-s" options
in conjunction with either "-u" or "-t" are required for tunnels to services. For exit tunnels, both UDP and TCP traffic will be redi-
rected. For service tunnels, either UDP ("-u") or TCP ("-t") traffic will be redirected.
The tool will display the IP address for this end of the tunnel. The address can be displayed as soon as it has been allocated, or only
after ("-a") the tunnel has been created.
OPTIONS -4, --ipv4
Desired IP address on this end of the tunnel should be an IPv4 address.
-6, --ipv6
Desired IP address on this end of the tunnel should be an IPv6 address.
-a, --after-connect
Display IP address only after the tunnel is fully connected.
-c FILENAME, --config=FILENAME
Use the configuration file FILENAME.
-d SEC, --duration SEC
The mapping should be established for SEC seconds. Default is 5 minutes.
-h, --help
Print short help on options.
-i IP, --ip IP
Tunnel should be to an exit node and connect to the given IPv4 or IPv6 IP address. Note that you can specify an IPv6 address as the
target here, even in combination with "-4" (4to6) and similarly you can specify an IPv4 address in combination with "-6" (6to4).
-L LOGLEVEL, --loglevel=LOGLEVEL
Use LOGLEVEL for logging. Valid values are DEBUG, INFO, WARNING and ERROR.
-p PEERID, --peer=PEERID
Name of the peer offering the service to connect to. Cannot be used in conjunction with "-i", requires "-s".
-s NAME, --service=NAME
Name of the service running on the target peer. Cannot be used in conjunction with "-i", requires "-p".
-t, --tcp
Service runs TCP. Either "-t" or "-u" must be specified when using "-s".
-u, --udp
Service runs UDP. Either "-t" or "-u" must be specified when using "-s".
-V, --verbose
Be verbose.
-v, --version
Print GNUnet version number.
BUGS
Report bugs by using Mantis <https://gnunet.org/bugs/> or by sending electronic mail to <gnunet-developers@gnu.org>
SEE ALSO gnunet-setup(1)GNUnet 25 Feb 2012 GNUNET-VPN(1)