This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision Next revision | Previous revision | ||
|
public:artn:remote_observing [2020/05/19 23:23] davner [bigartn] |
public:artn:remote_observing [2025/02/19 11:24] (current) prue_hammond [Setup VPN] |
||
|---|---|---|---|
| Line 1: | Line 1: | ||
| ======Remote Observing====== | ======Remote Observing====== | ||
| - | **05/19/2020**\\ | + | **10/30/2020**\\ |
| Currently our remote observing still requires a user at the telescope. However, we are working on developing monitoring tools and making it easier to reach the remote observing goal. | Currently our remote observing still requires a user at the telescope. However, we are working on developing monitoring tools and making it easier to reach the remote observing goal. | ||
| + | =====Using An SSH Tunnel===== | ||
| + | The simplest way of accessing the telescope and observing websites is to use an SSH tunnel. All you | ||
| + | need to do this is knowledge of the rts2obs password and/or your own ssh key. First, add some hosts | ||
| + | to your ~/ | ||
| + | so edit that to suit your own key: | ||
| + | # + | ||
| + | # rts2obs | ||
| + | # - | ||
| + | Host rts2obs | ||
| + | Hostname kuiper.as.arizona.edu | ||
| + | User rts2obs | ||
| + | IdentityFile / | ||
| + | # + | ||
| + | # rts2artn | ||
| + | # - | ||
| + | Host rts2artn | ||
| + | Hostname 10.30.1.24 | ||
| + | User rts2obs | ||
| + | ForwardAgent yes | ||
| + | ProxyCommand ssh -X -Y rts2obs nc %h %p 2> /dev/null | ||
| + | IdentityFile / | ||
| + | # + | ||
| + | # rts2pi | ||
| + | # - | ||
| + | Host rts2pi | ||
| + | Hostname 10.30.1.25 | ||
| + | User pi | ||
| + | ForwardAgent yes | ||
| + | ProxyCommand ssh -X -Y rts2obs nc %h %p 2> /dev/null | ||
| + | IdentityFile / | ||
| + | |||
| + | To check that this has worked, you should now be able to login to both those machines using the shorthand | ||
| + | hostnames. Note that this might prompt for a password until you install your public key in the authorized_keys file on the remote machine: | ||
| + | |||
| + | % ssh -XY rts2obs | ||
| + | rts2obs@gerard: | ||
| + | % ssh -XY rts2pi | ||
| + | pi@raspberrypi: | ||
| + | |||
| + | Add the following commands to a ~/.alias file: | ||
| + | |||
| + | alias rts2pi_tunnel=" | ||
| + | alias rts2artn_tunnel=" | ||
| + | alias xrts2pi_tunnel=" | ||
| + | alias xrts2artn_tunnel=" | ||
| + | |||
| + | When ready to remote eavesdrop, source the file: | ||
| + | |||
| + | % source ~/.alias | ||
| + | | ||
| + | Now, either run the simple tunnel in a regular terminal or use the terminal start: | ||
| + | |||
| + | % xrts2pi_tunnel | ||
| + | % xrts2artn_tunnel | ||
| + | |||
| + | NB: you *must* wait until the tunnel is complete and you are logged into the remote machine. | ||
| + | |||
| + | Then--voila!--point your local browser to: | ||
| + | |||
| + | http:// | ||
| + | http:// | ||
| + | http:// | ||
| + | http:// | ||
| + | |||
| + | | ||
| =====Smart VPN===== | =====Smart VPN===== | ||
| Compatible with Draytek Router. | Compatible with Draytek Router. | ||
| Line 37: | Line 102: | ||
| * [[https:// | * [[https:// | ||
| + | |||
| + | ===Remote Dome Open Only=== | ||
| + | To open: | ||
| + | * echo BIG61 UPPERDOME 123 COMMAND DOMESLIT OPEN FORCE | nc bigudome 5750 | ||
| + | |||
| + | It can take a few seconds to start so give it a minute. | ||
| + | |||
| + | To close: | ||
| + | *echo BIG61 UPPERDOME 123 COMMAND DOMESLIT CLOSE FORCE | nc bigudome 5750 | ||
| Line 44: | Line 118: | ||
| Our web presence is currently being updated and this will change soon. | Our web presence is currently being updated and this will change soon. | ||
| - | * [[http:// | + | * [[http:// |
| - | * [[http:// | + | * [[http:// |
| * [[http:// | * [[http:// | ||