Remote Operation of Light Source Beamlines with (Free)NX Zhijian Yin, Peter Siddons, NSLS, BNL Controls at NSLS Facility Beamlines What Is NX, FreeNX Cybersecurity.

Slides:



Advertisements
Similar presentations
Connecting to GMT machine via Windows 7. Windows PuTTy GMT on Mac server int-038.geosci.usyd.edu.au To use GMT, you will connect to a Mac server via PuTTy.
Advertisements

SSH SSH is “Secure SHell” Secure, compressed, widely supported, fast Allows both users to get jobs done, and also allows system administrators to sleep.
SSH Operation and Techniques - © William Stearns 1 SSH Operation and Techniques The Swiss Army Knife of encryption tools…
Linux, it's not Windows A short introduction to the sub-department's computer systems Gareth Thomas.
Introduction To The Course Network Architecture Hervey Allen Chris Evans Phil Regnauld September 3 - 4, 2009 Santiago, Chile.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Accessing ulgbc5 from Windows systems Two stage process: –Connecting to the system via secure shell (ssh) login –Getting a graphical connection that supports.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
FreeNX. NoMachine NX is a Remote Access solution based on a comprising set of enterprise class open source technologies. Thanks to the outstanding compression,
1 SEEM3460 Tutorial Access to Unix Workstations in SE.
Module 9 - Networking. 1.Network Concepts and Commands 2.Network Files 3.Network Services 4.Configure a network device 5.Network File-System (NFS & CIFS)
© 2005,2006 NeoAccel Inc. Training Access Modes. © 2005,2006 NeoAccel Inc. Agenda 2. Access Terminals 6. Quick Access Terminal Client 3. SSL VPN-Plus.
Remote access and file transfer Getting files on and off Bio-Linux.
Firewalls, Perimeter Protection, and VPNs - SANS © SSH Operation The Swiss Army Knife of encryption tools…
Ssh: secure shell. overview Purpose Protocol specifics Configuration Security considerations Other uses.
A crash course in njit’s Afs
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
Telnet/SSH: Connecting to Hosts Internet Technology1.
© 2005,2006 NeoAccel Inc. Partners Presentation SSL VPN-Plus 2.0 Quick Start Guide.
Computation for Physics 計算物理概論 Introduction to Linux.
Computer Setup for EDA Tools Murali Dharan January 8, 2014 ELEC 7770 Spring 2014 Advanced VLSI Design 1/08/
Virtual Private Networking with OpenVPN Wim Kerkhoff Fraser Valley Linux Users Group April 15, 2004.
N ETWORKED & D ISTRIBUTED COMPUTING S YSTEMS L AB Programming Assignments EE323 Computer Networks.
Lab How to Use WANem Last Update Copyright 2011 Kenneth M. Chipps Ph.D. 1.
Page 1 NAT & VPN Lecture 8 Hassan Shuja 05/02/2006.
Network Security SSH Tunneling David Funk Matt McLaughlin Systems Administrators Computer Systems Support COE, University of Iowa.
Secure Shell for Computer Science Nick Czebiniak Sung-Ho Maeung.
VNC Greg Fankhanel Jessica Nunn Jennifer Romero. What is it? Stands for Virtual Network Computing It is remote control software which allows you to view.
Beamline Controls with EPICS at NSLS Zhijian Yin NSLS, BNL EPICS Collaboration Meeting, SSRF, March 2008.
AE6382 Secure Shell Usually referred to as ssh, the name refers to both a program and a protocol. The program ssh is one of the most useful networking.
Network Security: Lab#3 Transport-Level Security Tools J. H. Wang May 12, 2011.
CSC 382: Computer SecuritySlide #1 Firewalls. CSC 382: Computer SecuritySlide #2 Single Host Firewall Simplest type of firewall—one host acts as a gateway.
CPSC 233 Run graphical Java programs remotely on Mac and Windows.
Module 8: Managing Terminal Services. Overview Use and manage Terminal Services RemoteApp programs Use and manage Terminal Services Gateway Optimize and.
SSH Operation The Swiss Army Knife of encryption tools…
The Intranet.
Terminal Services Technical Overview Olav Tvedt TVEDT.info Microsoft Speaker Community
General rules 1. Rule: 2. Rule: 3. Rule: 10. Rule: Ask questions ……………………. 11. Rule: I do not know your skill. If I tell you things you know, please stop.
Phil Hurvitz Securing UNIX Servers with the Secure.
XWN740 X-Windows Configuring and Using Remote Access (Chapter 13: Pages )‏
Unix Machine In Computer Science for Teaching Cliff Zou Spring 2015.
Using the Weizmann Cluster Nov Overview Weizmann Cluster Connection Basics Getting a Desktop View Working on cluster machines GPU For many more.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Unix Servers Used in This Class  Two Unix servers set up in CS department will be used for some programming projects  Machine name: eustis.eecs.ucf.edu.
Getting Connected CPSC 1010 August 21, Connecting to the SOC Servers Why would we need to connect Work with files Transfer files from your local.
PINE. What is PINE? PINE is a light weight yet very powerful open source console based client developed by the University of Washington. It has.
File Transfer Protocol (FTP) CIS 130. File Transfer Protocol (FTP) Copy files from one internet host (server) to your account on another host –Need domain.
Cryogenics Group Jonathan Creel December 1, 2010 Remote Access Review.
R. Krempaska, October, 2013 Wir schaffen Wissen – heute für morgen Controls Security at PSI Current Status R. Krempaska, A. Bertrand, C. Higgs, R. Kapeller,
LO2 Understand the key components used in networking.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
PuTTY Introduction to Web Programming Kirkwood Continuing Education by Fred McClurg © Copyright 2016, All Rights Reserved ssh client.
WARCS (Wide Area Remote Control for SPring-8)‏ A. Yamashita and Y.Furukawa SPring-8, Japan Control System Cyber-Security Workshop (CS)2/HEP Oct
When you cannot be there Remote access and collaboration Raul Suarez Dec 2009.
Norwalk LUG May Meeting
Getting Connected to NGS while on the Road…
Ssh: secure shell.
Port Forwarding and Shell Login Essentials
WSU Linux Users Group By Haven Hash
XWN740 X-Windows Configuring and Using Remote Access
A few points to mention There are two Olympus machines!
Using the Virtual Private Network (VPN) on an iPad 2
Telnet/SSH Connecting to Hosts Internet Technology.
INSTALLING AND SETTING UP APACHE2 IN A LINUX ENVIRONMENT
SSH SSH is “Secure SHell” Secure, compressed, widely supported, fast
Getting Connected to NGS while on the Road…
Ubuntu MYSQL Database Server
Presentation transcript:

Remote Operation of Light Source Beamlines with (Free)NX Zhijian Yin, Peter Siddons, NSLS, BNL Controls at NSLS Facility Beamlines What Is NX, FreeNX Cybersecurity Requirements at BNL Remote Operation with NX, ssh Tunneling Live Demo Concluding Remarks

Controls at NSLS facility Beamlines: Light Source Beamlines

Controls at NSLS facility Beamlines: A Typical Beamline Layout

Controls at NSLS Facility Beamlines: Typical Network Configurations EPICS based, VME IOC for motor/scaler/ADC etc. Linux workstation, running EPICS clients Dual NIC cards: eth0: to internet eth1: private network for instrumentation VME EPICS IOC eth0: BNL network x eth1: x

What is NX, freeNX X is a network protocol, X remote display, “ssh -XC” can be used for remote monitoring/operation Issues:  too much round trip traffic, network latency  long distance, unresponsive To achieve fast response the NX way:  Efficient compression  Proxy server and cache-files to reduce round trip x-traffic

What is NX, freeNX: Continued Products at Nomachine.com: Servers – Personal server (2 connections) free - Business server $$$ Client – closed source, but freely downloadable Windows, Linux, Mac NoMachine.com provides support Nomachine.com GPLed the core library FreeNX: based on the core library, a suite of shell scripts to make a GPLed NX server. Clients is in the works. FreeNX server works with NoMachine clients

What is NX, freeNX: Procedures Setup freeNX server, download packages (rpm, deb, etc.) Download NX clients from NoMachine.com Configure NX client

What is NX, freeNX: Remote Desktop Screen

Cybersecurity Requirements at BNL: Perimeter Defense

Cybersecurity Requirements at BNL: Ways for Remote Access Employees: VPN, ssh gateway Users: ssh gateway only Outside of BNL:  ssh to ssh gateway (linux server)  ssh from ssh gateway to the beamline machine

Remote Operations With NX: Through Ssh Gateway: Ssh Tunneling Ssh tunneling Procedures:  Unix: ssh -L localport:remotehost:ssh_port#  Windows: Putty, similar configuration Now to ssh to the remote host can be achieved by ssh localhost -p localport -l username With ssh tunneling, configure nxclient to use localhost

Remote Operations with NX: Putting It Together First set up ssh tunnel:  Example: ssh -L 3322:lsx21pc.nsls.bnl.gov:22 (leave the terminal open)  Windows: configure Putty or other ssh clients Next configure NoMachine Client, to use host “localhost” and port 3322

Remote Operations with NX: Putting together Create ssh tunnel: remote host port 22 map to localhost: 3322 through ssh gateway, ssh -L 3322:lsx21pc.nsls.bnl.gov:22 Leave the terminal open Configure NoMachine NX client localhost port 3322

Remote Operations with NX: Live Demo Remote login to my office, or a beamline Checking with webcam locally connected (private network) Move some motors, check scalers Run some other applications

Concluding Remarks Secure (all traffic through ssh) Fast response Generic solution: Configure, no programming Open source server, free downloadable multi-platform clients (Windows, Mac, Linux) Almost all x-windows programs run fine Problems:  application specific fonts: set up font servers  use blank screensaver (to reduce resource usage) Linux hosts: straight forward Other Unix flavors: setup a Linux server, as a “stepping stone”

Acknowledgement Developers at Nomachine.com FreeNX package developers/maintainers BNL colleagues for testing and feedback