PACC: Week II

Summary:

For the past week, I was studying about the types of networks and tried to solve problem with managing VMs appeared after using SSH(Secured Shell)

Here some short notes about those types:

1)Host-only only permits network operations with the Host OS. The network communication of this mode is limited between the host and the VMs on the same adapter. Those VMs cannot make a connection beyond the host; thus there is no internet access capability. They remain hidden behind the host.

2)NAT mode will mask all network activity as if it came from your Host OS, although the VM can access external resources. All VMs using the adapter form a private network with the host. They all have internet access capability, but they are not visible to others beyond the host as if they are sitting behind their own firewall with the host.

3)In Bridged mode the virtual machine (VM) acts as if a regular PC ran on the same physical network. You can go Internet and do whatever you want unless your software is hardware dependent. Bridged mode replicates another node on the physical network and your VM will receive it's own IP address if DHCP is enabled in the network.

Also here the link for comparison of the all types of networks in table http://vmfaq.com/entry/34/

Also in order to resolve problem with connection of clients and server node with VMs, I was looking for the software which might be helpful for that. Finally, I found this one

PuTTY It is client program for working with network protocols like SSH, Telnet, SCP, SFTP, for connection to COM port.

Description

Use an SSH (Secure Shell) client, to create a secure connection. It encrypts the entire connection--including the part where you type your password--so snoops can't listen in. This free utility doesn't just work for SSH connections. According to the vendor, PuTTY also works for the Telnet and Rlogin network protocols. These protocols are all used to run a remote session on a computer, over a network.

Some features of PuTTY are:

  • The storing of hosts and preferences for later use.

  • Control over the SSH encryption key and protocol version.

  • Control over port forwarding with SSH (local, remote or dynamic port forwarding), including built-in handling of X11 forwarding.

  • Support for local serial port connections.

  • Self-contained executable requires no installation.

Comments