07-11-2001
Virtual private networking is a generic term that describes how to take use public networks as private ones. This normally means tunneling your IP traffic in one of the many tunneling techniques.
Most of the tunneling techniques use cryptographic techniques to insure the privacy and security of the connection.
8 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Hello,
I would like to know if there is a command or any configuration file to find and differentiate the Virtual IP Addresses (of the Cluster Resource Group) and the IP Address of the Cluster Node. I observe that the ifconfig -a command returns all the IP addresses configured on the ... (1 Reply)
Discussion started by: vineetd
1 Replies
2. UNIX for Dummies Questions & Answers
Hi Folks,
I want to check all the virtual hostname's/IP's of a host/ip. Currently we are using HP-UX and open SuSe. Please tell me the command to list out all virtual names of a particular host.
many thanks in advance. (2 Replies)
Discussion started by: sai21
2 Replies
3. Solaris
Do we have any Virtual Data Center software as we have Virtual Machine?
I want to practice everything of Solaris practically but i don't have resources like data center which includes Servers, Data storages, switches, and other things. (2 Replies)
Discussion started by: karman0931
2 Replies
4. UNIX for Dummies Questions & Answers
Not really a newbie, but I have a strange problem and I'm not sure how to further troubleshoot it.
I have to log out of a virtual terminal by typing exit, then exit again as in:
woodnt@toshiba-laptop ~ $ exit
logout
woodnt@toshiba-laptop ~ $ exit
logout
I DON'T have to do this when I'm... (1 Reply)
Discussion started by: Narnie
1 Replies
5. IP Networking
Hi, I am running scientific linux guest on ubuntu host.
The problem is that the guest machine doesn't have any ip except from the loopback.
I want that the guest OS will be in the same local network of the host and not part of internal network that virtualbox create.
In other words I... (1 Reply)
Discussion started by: programAngel
1 Replies
6. Solaris
Trying to set or modify the randomly set hostID of a Solaris 10 virtual/guest machine that I installed on a Windows-XP host machine (using Virtual Box 4.1.12).
I was able to set/modify the hostname of the Solaris 10 virtual/guest machine during installation as well as via the Virtual Box... (4 Replies)
Discussion started by: Matt_VB
4 Replies
7. Red Hat
My RHEL virtual Machine Does not have Virtual Machine Manager Desktop Tool
Hi,
I don't seem to have the Virtual Machine Manager Desktop tool set up on my RHEL6 Machine. The Linux machine runs off VMWare player and I'm not sure whether it is a VMWare software issue or a problem with the RHEL6... (2 Replies)
Discussion started by: accipiter1
2 Replies
8. UNIX for Beginners Questions & Answers
Hi All,
Is there any way I can prioritize my VMs when there is resource crunch in host machine so that some VMs will be allocated more vcpu, more memory than other VMs in kvm/qemu hypervisor based virtual machines?
Lets say in my cloud environment my Ubuntu 16 compute hosts are running some... (0 Replies)
Discussion started by: SanjayK
0 Replies
LEARN ABOUT DEBIAN
corosync-keygen
COROSYNC-KEYGEN(8) System Manager's Manual COROSYNC-KEYGEN(8)
NAME
corosync-keygen - Generate an authentication key for Corosync.
SYNOPSIS
corosync-keygen
DESCRIPTION
If you want to configure corosync to use cryptographic techniques to ensure authenticity
and privacy of the messages, you will need to generate a private key.
corosync-keygen creates this key and writes it to /etc/corosync/authkey.
This private key must be copied to every processor in the cluster. If the
private key isn't the same for every node, those nodes with nonmatching private
keys will not be able to join the same configuration.
Copy the key to some security transportable storage or use ssh to transmit the
key from node to node. Then install the key with the command:
unix#: install -D --group=0 --owner=0 --mode=0400 /path_to_authkey/authkey /etc/corosync/authkey
If a message "Invalid digest" appears from the corosync executive, the keys
are not consistent between processors.
Note: corosync-keygen will ask for user input to assist in generating entropy.
EXAMPLES
Generate the key.
$ corosync-keygen
Corosync Cluster Engine Authentication key generator.
Gathering 1024 bits for key from /dev/random.
Press keys on your keyboard to generate entropy.
SEE ALSO
corosync_overview(8), corosync.conf(5),
AUTHOR
Angus Salkeld
2010-05-30 COROSYNC-KEYGEN(8)