Documentation

Links

Help

ISG

 

CGD/IS Help Files

02.09.02 - Remote Connections:Perimeter Host

CGD resources are contained within a security perimeter. In order to access those resources remotely, users have two means of traversing the perimeter: VPN or Perimeter Host. For detailed information on using the VPN, see the following:
Remote Connections:VPN

Perimeter Host Connections

CGD has two perimeter hosts available for remote login:

    goldhill.cgd.ucar.edu
    moffatt.cgd.ucar.edu

Logging into these hosts requires an SSH client and a yubikey or cryptocard. Apple Macintosh and Linux systems typically have an SSH client built in, on MS Windows you can use Putty.

If you already have a terminal client on your system, starting an SSH session is as easy as:
ssh username@goldhill.cgd.ucar.edu

Keep in mind, if you are logged into a remote system under a different username than your CGD username, your attempts at logging in will be rejected, thus it's usually safest to use the username@system notation.

If you do mess up your username or password three times in a row, you will be locked out. At that point you will need to contact the system staff to have your connection re-enabled.

If you plan on popping back an X-session, include the following:
ssh -X -Y username@goldhill.cgd.ucar.edu

Once logged in to goldhill or moffatt, you can SSH to other systems inside the perimeter, you can mount /project directories, or read your email using alpine or mutt.

Click below for more exhaustive documenation on using putty.
Remote Connections:Putty

For a list of all CGD/IS documentation, see:

    Table of Conents
    Index