======Remote Observing====== **10/30/2020**\\ Currently our remote observing still requires a user at the telescope. However, we are working on developing monitoring tools and making it easier to reach the remote observing goal. =====Using An SSH Tunnel===== The simplest way of accessing the telescope and observing websites is to use an SSH tunnel. All you need to do this is knowledge of the rts2obs password and/or your own ssh key. First, add some hosts to your ~/.ssh/config file. My private ssh key on my MacBook Air is stored in "/Users/pnd/.ssh/rts2obs" so edit that to suit your own key: # + # rts2obs # - Host rts2obs Hostname kuiper.as.arizona.edu User rts2obs IdentityFile /Users/pnd/.ssh/rts2obs # + # rts2artn # - Host rts2artn Hostname 10.30.1.24 User rts2obs ForwardAgent yes ProxyCommand ssh -X -Y rts2obs nc %h %p 2> /dev/null IdentityFile /Users/pnd/.ssh/rts2obs # + # rts2pi # - Host rts2pi Hostname 10.30.1.25 User pi ForwardAgent yes ProxyCommand ssh -X -Y rts2obs nc %h %p 2> /dev/null IdentityFile /Users/pnd/.ssh/rts2obs To check that this has worked, you should now be able to login to both those machines using the shorthand hostnames. Note that this might prompt for a password until you install your public key in the authorized_keys file on the remote machine: % ssh -XY rts2obs rts2obs@gerard:~$ exit % ssh -XY rts2pi pi@raspberrypi:~ $ exit Add the following commands to a ~/.alias file: alias rts2pi_tunnel="ssh -CL 5000:localhost:5000 rts2pi" alias rts2artn_tunnel="ssh -CL 8080:localhost:80 rts2artn" alias xrts2pi_tunnel="xterm -e ssh -CL 5000:localhost:5000 rts2pi &" alias xrts2artn_tunnel="xterm -e ssh -CL 8080:localhost:80 rts2artn &" When ready to remote eavesdrop, source the file: % source ~/.alias Now, either run the simple tunnel in a regular terminal or use the terminal start: % xrts2pi_tunnel % xrts2artn_tunnel NB: you *must* wait until the tunnel is complete and you are logged into the remote machine. Then--voila!--point your local browser to: http://localhost/5000 http://localhost/8080/dashboard http://localhost/8080/js9 http://localhost/8080/ =====Smart VPN===== Compatible with Draytek Router. Available for MacOS, Windows, and mobile. \\ [[https://www.draytek.com/products/smart-vpn-client/|Download Here]] ====Setup VPN==== Create a new profile. {{ :public:artn:smart-vpn.png?nolink&600 |}} Type: SSL VPN Profile: Kuiper Server: kuiper.as.arizona.edu Port: 443 Username: ARTN RTS2 Observing Account Username Select ''Authentication Settings'' to enter the password. Password: ARTN RTS2 Observing Account Password Select ''Advanced''\\ Select ''More Routes''\\ Add a new route 10.30.0.0/16 **Exit Advanced and then click ''Connect''** You are now on the Kuiper network. You will be able to open up a terminal on your computer and ping bigartn ''10.30.1.24''. Websites only available on the network are viewable on your own web browser. There is no need of SOCKS tunneling or opening up Firefox as an X window. ===Windows Fix=== A user ran into the issue of installing Smart VPN with windows. They followed this page to correct the issue. * [[https://helpdesk.amlltd.co.uk/portal/kb/articles/fw-still-no-access-to-nas-drive|No PPP control Protocols Configured - FIX]] =====Useful Links===== **These links are only valid when on the network logging into the VPN described above.** Our web presence is currently being updated and this will change soon. * [[http://10.30.1.23:5000|Quicklook Weather]]\\ * [[http://10.30.1.25:5000|Quicklook Telemetry]]\\ * [[http://10.30.1.24:1080|ARTN RTS2 Webpage (Authentication Required)]]