msgbartop
A chronological documentation test project, nothing serious, really!
msgbarbottom

26 Apr 2012 Manual download and install of VMware Tools in linux

This post describes how you can download and install the latest version of VMware Tools to a linux guest from a ESXi 5.0 host. You need SSH access rights to a VMware host to follow this guide.

  1. Allow SSH access to the VMware host you are about to access.
    • This can be done in the vSphere Client: Choose the VMware host you would like to access.
    • Go to the Configuration tab and select Security Profile under Software. Edit Services Properties and start the SSH daemon.
    • Verify that the firewall allows SSH traffic
  2. All the VMware Tools are located in the /vmimages/tools-isoimages/ folder on the host. Download the ISO-image with the tools you need
    • Issue this command from a machine that has access to the VMware host.
       sftp username@vmhost.tld:/vmimages/tools-isoimages/linux.iso

      Type in your password and the download will start

  3. Mount the ISO-file and copy the VMware Tools installer file to the desired VMware linux guest using SSH
    • # mount linux.iso /media/cdrom/ -t iso9660 -o loop
      # scp /media/cdrom/VMwareTools-8.6.5-652272.tar.gz username@vmguest.tld:
  4. Manual install of VMware Tools on a vmguest as a privileged user
    • # tar xfz VMwareTools-8.6.5-652272.tar.gz
      # cd vmware-tools-distrib
      # ./vmware-install.pl

      Follow the instructions and finish the installer. A reboot may be required to load the necessary kernel modules.

Your VMware Tools are now installed and should work as it would on a normal VMware Tools installation.

This procedure can also be used on other operating systems. This is a list of all the VMware Tools ISO-images available in the /vmimages/tools-isoimages/ folder on a ESXi 5.0 host

sftp> ls -l
-rwx------    1 root     root     12576768 Apr 13 09:17 darwin.iso
-rwx------    1 root     root          256 Apr 13 09:17 darwin.iso.sig
-rwx------    1 root     root     16021504 Apr 13 09:16 freebsd.iso
-rwx------    1 root     root          256 Apr 13 09:18 freebsd.iso.sig
-rwx------    1 root     root     65200128 Apr 13 09:15 linux.iso
-rwx------    1 root     root          256 Apr 13 09:17 linux.iso.sig
-rwx------    1 root     root         1738 Apr 13 09:17 linux_avr_manifest.txt
-rwx------    1 root     root       540672 Apr 13 09:17 netware.iso
-rwx------    1 root     root          256 Apr 13 09:16 netware.iso.sig
-rwx------    1 root     root     13006848 Apr 13 09:17 solaris.iso
-rwx------    1 root     root          256 Apr 13 09:16 solaris.iso.sig
-rwx------    1 root     root          451 Apr 13 09:17 tools-key.pub
-rwx------    1 root     root     13664256 Apr 13 09:18 winPre2k.iso
-rwx------    1 root     root          256 Apr 13 09:17 winPre2k.iso.sig
-rwx------    1 root     root           49 Apr 13 09:18 winPre2k_avr_manifest.txt
-rwx------    1 root     root     62128128 Apr 13 09:17 windows.iso
-rwx------    1 root     root          256 Apr 13 09:18 windows.iso.sig
-rwx------    1 root     root         1069 Apr 13 09:17 windows_avr_manifest.txt

Tags: , , , , ,

Posted by

03 Mar 2010 Enable or disable ping in Windows Server 2008 R2

I always forget where to change the ping setting in the Windows Server 2008 R2 Firewall.
To enable ping

Go to Start >> Administrative Tools >> Windows Firewall with Advanced Security >> Inbound Rules >> File and Printer Sharing (Echo Request – ICMPv4-IN) >> right click and select Enable Rule.

To disable the ping rule just select Disable Rule in the last step.
These steps does also work in Windows 7 to enable ping.

Tags: , ,

Posted by

05 Sep 2007 Port Knocking

What is Port Knocking?

Port knocking is a method by which you can dynamically open ports on your server to a single IP address. Port knocking allows you to transparently run a service on your server without exposing the services of that port to all IP addresses.

In practice, it is very similar to having a whitelist of IP addresses which are allowed to access your server. The advantage of this setup is that you can grant the machine you are using access to the ports on your server dynamically without having to reconfigure your firewall or access list.
(more…)

Tags: ,

Posted by

08 May 2007 SSH Dictionary Attack Prevention with iptables

It is ideal to slow down the SSH dictionary attack when the infested host started to brute force the SSH authentication. There are many scripts/user-land daemons that perform monitoring and blocking. I prefer to use something that has less demand in memory/CPU usage. IPTables module provides a kernel level solution with little overhead.
(more…)

Tags: , , ,

Posted by

18 Apr 2007 Open a range of ports with iptables

In RedHat/Fedora you can define firewall rules in the file /etc/sysconfig/iptables.
By adding this line you open ports in the range 5920-5960
-A RH-Firewall-1-INPUT -p tcp --destination-port 5920:5960 -j ACCEPT

Tags: , ,

Posted by