As many guys working in IT, I have my own lab. I usually prefer to use my own lab as the degree of freedom I can experience cannot be compared with a corporate lab. It often happens that some specific configurations (one for all, my vCloud Director environment) are better looking in my own lab than any other place, and so I also use my lab to show those technologies to partners and customers. This is easy when I’m at home, but I may be in an hotel room, in a conference room at the customer’s site, or another different place, and in many of these situations it may happen (and it happened enough times to justify this little project) that the connections to my lab are blocked by a firewall or another device. I have two ways to connect to my lab: an RDP to a jumpbox machine, published on a different port that the usual TCP/3389, and an ipsec vpn concentrator. In one case, none of them was possible at a customer, so we ended up with a colleague of mine tethering from his phone. I decided it was time to develop a better solution that was able to work in almost any situation. And my solution involves the always amazing SSH.
Un post veloce veloce, per ricordarselo in futuro: esxcfg-firewall -q sshServer Se sil sistema vi da picche, ricordatevi di effettuare login come root, o di invocare su ( su – ).
Come molti di voi avranno scoperto dopo aver installato ESXi, non è possibile accedere da remoto a questa versione tramite una connession ssh. Dal momento però che alcune operazioni risultano comode tramite questo strumento, così come la lossiblità di caricare/scaricare files dal server via scp (una su tutte il backup delle virtual machines tramite remote […]