Compare cert salaries and plan your next career move
MAC_Addy wrote: » Free Remote Desktop Access - IT Tool | Kaseya this is what I use to access my PC from home.
control wrote: » If I wanted to rule out connecting to an actual PC at the home end, and go straight to a a cisco access server/router, is it simple enough to do this?
MAC_Addy wrote: » You could do that, yes. Just offering a solution to access your lab from work. I had mine setup to go from my console server, to my home router. I used port forwarding to access it from work. Though, if you lose power at home your modem might come back up with a different IP. That's when I used Kaseya to remote in to my computer instead. I use this program to access my mum's computer when she's having problems.
pitviper wrote: » Port forwarding would work but a VPN capable firewall would be a much better option. If you’re going to be connecting from the same place (like work), or group of places which have static public IPs then setup an ACL and allow SSH connections only from those IPs. Then the next step is to get a switched PDU so that you can remotely turn your devices on and off at will
pitviper wrote: » Port forwarding would work but a VPN capable firewall would be a much better option. If you’re going to be connecting from the same place (like work), or group of places which have static public IPs then setup an ACL and allow SSH connections only from those IPs.Then the next step is to get a switched PDU so that you can remotely turn your devices on and off at will
JeanM wrote: » I'd love to know how to do this as well, any pointers?
JeanM wrote: » I see, something like APC PX-1000, any specific makes/models to look for that are affordable for labs?
LinuxRacr wrote: » Nice option Forsaken. For the price of the more expensive APC AP-7900's, this looks to be more bang for the buck at $295:
Forsaken_GA wrote: » I just put one of these in my lab for remote power control -Web Power Switch! - 15 Day Free Trial! - Ships Overnight - From $109! Quick and easy setup, though you do have to make some provision to be able to access it through a web browser remotely (I have three methods - VPN, SSH X Forwarding, or an NX session, the latter two being through the only box that's accessible via SSH from the outside world)
xXErebuS wrote: » I seen it some what mentioned but setup access over say port 64395 (some random port) and lock it down to IP's if you want; then port forward that to 22. If not you could potentially (very possible) have someone scan and try to brute force into it.
Corndork2 wrote: » Web Power Switches are nice low cost options. Western Telematic Inc. makes the WTI RSM line thats also really nice. Your 2600XM's will support VPN with the addition of an AIM module. You could pick up a PIX 501 on ebay for 10.00 with the proper license. I personally VPN to a Cisco 1841, then use a WTI RSM8R4 Previously, I just forwarded SSH ports to one of my unix servers. I'd log into it, then log into the other devices from the Unix box. The VPN method is obviously more secure, but frankly SSH is fine for a home lab. Make sure you have a decent username/password combo, as the random bots on the internet willl try to log into you from time to time. They do so now as well, but you dont see it in SOHO equipment logs. DO NOT use telnet
Compare salaries for top cybersecurity certifications. Free download for TechExams community.