Guralp Systems CMG-DCM build <10,000 User Manual
Page 167
Operator's Guide
Scroll down to the “IP aliasing” table and enter all of these
addresses in CIDR format, one per line, into the table. CIDR
format requires that the number of “network bits” be entered
after the IP address, separated by a slash (eg 10.99.0.1/24).
Unless you have more than 256 clients, you should use 24
network bits. When the table is full, press the submit button
to add extra entries if necessary.
3. Return to the GSTM server configuration page. For each
combination of client and service/port that you wish to
access, fill in a row of the table:
•
“Listen address” should contain the address of the
client on the private subnet that you have just
allocated.
•
“Listen service/port” should contain the service name
or port number of the service to which you wish to
connect. For example, to access a web server at a
client, you would enter http or 80.
•
“Target client” should contain the username entered
when configuring the GSTM client on the target CMG-
EAM.
•
“Target service/port” should contain the same number
as the second column: “Listen service/port”.
When the table is full, press the submit button to add extra
entries if necessary.
Remote machines wishing to access services on clients via the GSTM
server then need only configure a route to the appropriate new
address. Default port numbers can then be used in applications such
as browsers and Scream!, reducing the amount of configuration
required.
Another strategy would use a single address and port-number mapping
to achieve the same goals. This is equally effective but requires that
remote machines wishing to access services on clients via the GSTM
server use non-standard ports for those services. Many people find
address mapping with direct port correspondence, as described above,
easier to work with.
November 2010
167