Documentation

Links

Help

ISG

 

CGD/IS Help Files

02.09 - Remote Connections

CGD resources such as compute servers, storage, and printers reside within a security perimeter. Connecting to these resources from outside the perimeter, such as from home, the guest wireless, or from a non-CGD maintained system requires an additional step to traverse the perimeter.

Users have two options for making this preliminary connection: VPN or a CGD perimeter host.

  • VPN
    Connecting via VPN is like sitting at your desk at the Mesa. Once connected, you can open any CGD resource just as if you were sitting in your office. The downside is that it requires installing additional software on your system. For detailed instructions on downloading and installing the client, click below:
    Remote Connections:VPN
  • CGD Perimeter Host
    By first connecting to a CGD host that sits on the perimeter, you can then SSH from that host to other hosts within the perimeter. Not a lot of bells and whistles, but if all you need is a command line on a compute server, this will suffice. For more information, click below:
    Remote Connections:Perimeter Host

For a list of all CGD/IS documentation, see:

    Table of Contents
    Index