| 1 | = Getting Access to EARS = |
| 2 | |
| 3 | Access to the EARS cluster is filtered by a bastion host. We figured the easiest way to provide secure access to users was to use SSH as a proxy from a bastion host. |
| 4 | |
| 5 | * First, create a SSH key pair and email the public key, as an attachment, to us. Also let us know what your preferred username is. |
| 6 | * Once you get word that your account has been created, please try to SSH to '''egate.deterlab.net''' The '''-D 1080''' will open a SOCKS proxy port on your local machine. |
| 7 | |
| 8 | {{{ |
| 9 | $ ssh jjh@egate.deterlab.net -D 1080 |
| 10 | Last login: Thu Jul 18 16:40:33 2013 from pod.isi.edu |
| 11 | FreeBSD 9.1-RELEASE-p3 (EGATE) #2: Fri Jun 7 17:48:53 PDT 2013 |
| 12 | |
| 13 | Welcome to FreeBSD! |
| 14 | |
| 15 | |
| 16 | Handy bash(1) prompt: PS1="\u@\h \w \!$ " |
| 17 | -- David Scheidt <dscheidt@tumbolia.com> |
| 18 | [jjh@egate ~]$ |
| 19 | }}} |
| 20 | |
| 21 | * You can now configure your browser to use the SOCKS port. We recommend using Firefox with the FoxyProxy Standard extension. |
| 22 | |
| 23 | * Once the FoxyProxy Standard plugin is installed, you can go to '''Tools -> FoxyProxy -> Options''' |
| 24 | |
| 25 | * Click the "Add New Proxy" button on the right. |
| 26 | |
| 27 | * Under the proxy Details tab, fill in 127.0.0.1 for the '''Host or IP Address''' field, select the '''SOCKS proxy?''' check box, and select '''SOCKS v5''' |
| 28 | |
| 29 | * Now click the '''URL Patterns''' button at the top. Add in the following pattern for EARS: |
| 30 | |
| 31 | * Now in the main window, make sure '''Select Mode:''' at the top is set to '''Use proxies based on their pre-defined patterns and priorities''' |
| 32 | |
| 33 | * Now you should be able to access the web interface of the EARS cluster. |