Skip to content

TopologyInteraction

dswd edited this page Feb 17, 2014 · 4 revisions

#Interacting with the Topology

There are several ways to interact with virtual machines in a topology.

VM Console (VNC)

The default way of interacting with virtual machines is the VM console. The console is displayed using the VNC protocol and allows the user to see the screen output and control the virtual machine using mouse and keyboard. The console can be opened in the editor in the right-click-menu of the respective device. Different viewers for the VNC protocol are offered and the user can also use an external VNC viewer if he wishes.

This method allows users to control graphical applications and to control devices without using an Internet connection. This is especially handy if the device must not have an Internet connection or if the device fails to bring up its network properly.

Via VNC, there is no login prompt in all default templates. There only is a VNC password, that the VNC viewers of ToMaTo automatically send to the device.

Pros:

  • No network connection needed
  • Operating system independent
  • Works even when boot fails
  • No login prompt

Cons:

  • Hard to automize
  • No file transfers possible

Over the Network (SSH) via the Internet

Devices that are conected to an Internet external network can be controlled via SSH. For security reasons the SSH server is disabled on all default templates and must be enabled using the command ssh-enable. Users are required to use a strong password when exposing SSH servers to the Internet.

To reduce the usage of public IPs, users are urged to use IPv6 addresses to control their devices when possible or limit address usage to one gateway device in their topology.

Pros:

  • Easy to use and automize
  • Allows file transfers

Cons:

  • Needs internet access
  • Works only on Linux
  • Security issues

Over the Network (SSH) via VPN

Similar to the control over the Internet it is also possible to control devices using remote VPN access. This method is more complicated but has some advantages in respect to security and public addresses.

Pros:

  • Allows file transfers
  • Can be automized

Cons:

  • Complicated setup

Executable Archives

It is possible to execute commands using executable archives. This is an advanced method of controling devices.

Pros:

  • Allows file transfers
  • Easy to automize

Cons:

  • Not interactive