135 | | For gpousr21 the script would return : |
136 | | |
137 | | {{{ |
138 | | ================================================================================ |
139 | | Aggregate [https://myplc.stanford.edu:12346] has a PlanetLab sliver. |
140 | | of-planet1.stanford.edu's pl_boot_state is: |
141 | | boot |
142 | | Login using: |
143 | | xterm -e ssh -i ./ssh/geni_key pgenigpolabbbncom_gposlice21@bain.gpolab.bbn.com & |
144 | | |
145 | | ================================================================================ |
146 | | }}} |
147 | | |
148 | | '''Note''': If your hosts are in Georgia Tech you would need to use the |
149 | | connection through ops. |
150 | | |
151 | | To do that run |
152 | | {{{ |
153 | | xterm -e ssh -i ssh/geni_key -F ssh/config pgenigpolabbbncom_gposlice##@<hostname> & |
154 | | }}} |
155 | | |
156 | | For gpousr21 that would be : |
157 | | {{{ |
158 | | xterm -e ssh -i ssh/geni_key -F ssh/config pgenigpolabbbncom_gposlice21@bain & |
159 | | }}} |
160 | | |
162 | | == 2a. Login to VM@Utah == |
163 | | == 2b. Ping VM@Kentucky == |
164 | | == 2c. Enable IP forwarding at PC@Utah == |
165 | | |
| 136 | We will start testing our setup by sending IP traffic between our hosts. |
| 137 | |
| 138 | == 2a. Login to PCUT == |
| 139 | First login to the PCUT host. To do that go the Flack page and press the (i) button on the PCUT box. |
| 140 | On the screen that will come up press the 'SSH' button. |
| 141 | |
| 142 | == 2b. Ping VMUT == |
| 143 | After you login to the PCUT, try to ping VMUT. To figure out what is the IP address of VMUT, go back to Flack |
| 144 | and press on the (i) of the link between VMUT and PCUT. The information on that page should tell you what is the IP |
| 145 | of that node. Run : |
| 146 | {{{ |
| 147 | ping <VMUT_IP> |
| 148 | }}} |
| 149 | |
| 150 | An example output should look like : |
| 151 | {{{ |
| 152 | [[inki@pcut ~]$ ping 10.10.2.1 -c 5 |
| 153 | PING 10.10.2.1 (10.10.2.1) 56(84) bytes of data. |
| 154 | 64 bytes from 10.10.2.1: icmp_seq=1 ttl=64 time=1.95 ms |
| 155 | 64 bytes from 10.10.2.1: icmp_seq=2 ttl=64 time=2.27 ms |
| 156 | 64 bytes from 10.10.2.1: icmp_seq=3 ttl=64 time=2.04 ms |
| 157 | 64 bytes from 10.10.2.1: icmp_seq=4 ttl=64 time=1.95 ms |
| 158 | 64 bytes from 10.10.2.1: icmp_seq=5 ttl=64 time=1.72 ms |
| 159 | |
| 160 | --- 10.10.2.1 ping statistics --- |
| 161 | 5 packets transmitted, 5 received, 0% packet loss, time 4005ms |
| 162 | rtt min/avg/max/mdev = 1.728/1.992/2.278/0.179 ms |
| 163 | }}} |
| 164 | |
| 165 | From PCUT you should also be able to ping PCRemote. The IP of PCRemote is '''"10.10.4.2"'''. |
| 166 | {{{ |
| 167 | [inki@pcut ~]$ ping 10.10.4.2 -c 5 |
| 168 | PING 10.10.4.2 (10.10.4.2) 56(84) bytes of data. |
| 169 | 64 bytes from 10.10.4.2: icmp_seq=1 ttl=64 time=2.39 ms |
| 170 | 64 bytes from 10.10.4.2: icmp_seq=2 ttl=64 time=0.218 ms |
| 171 | 64 bytes from 10.10.4.2: icmp_seq=3 ttl=64 time=2.32 ms |
| 172 | 64 bytes from 10.10.4.2: icmp_seq=4 ttl=64 time=0.253 ms |
| 173 | 64 bytes from 10.10.4.2: icmp_seq=5 ttl=64 time=2.33 ms |
| 174 | |
| 175 | --- 10.10.4.2 ping statistics --- |
| 176 | 5 packets transmitted, 5 received, 0% packet loss, time 4004ms |
| 177 | rtt min/avg/max/mdev = 0.218/1.504/2.398/1.037 ms |
| 178 | }}} |
| 179 | |
| 180 | Now let's try and ping the PCRemote from VMUT. Login to VMUT and run: |
| 181 | {{{ |
| 182 | ping 10.10.4.2 -c 5 -w 5 |
| 183 | }}} |
| 184 | |
| 185 | The ping should timeout. The output should look like : |
| 186 | {{{ |
| 187 | [inki@VMUT ~]$ ping 10.10.4.2 -c 5 -w 5 |
| 188 | PING 10.10.4.2 (10.10.4.2) 56(84) bytes of data. |
| 189 | |
| 190 | --- 10.10.4.2 ping statistics --- |
| 191 | 6 packets transmitted, 0 received, 100% packet loss, time 4998ms |
| 192 | }}} |
| 193 | |
| 194 | == 2c. Enable IP forwarding at PCUT == |
| 195 | The ping fails because although PCRemote and VMUT are both connected |
| 196 | to PCUT, the PCUT is not configured to route packets. Check the IP routing |
| 197 | flag : |
| 198 | {{{ |
| 199 | [inki@pcut ~]$ cat /proc/sys/net/ipv4/ip_forward |
| 200 | 0 |
| 201 | }}} |
| 202 | |
| 203 | To enable IP forwarding run : |
| 204 | {{{ |
| 205 | echo "1" | sudo tee /proc/sys/net/ipv4/ip_forward |
| 206 | }}} |
| 207 | |
| 208 | Now try to ping again from VMUT. The output should look like : |
| 209 | {{{ |
| 210 | |
| 211 | }}} |