This page contains information on how to access CISE services securely over the Internet.
How to connect to a Linux machine over the Internet?
Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. SSH was designed as a replacement for Telnet and for unsecured remote shell protocols such as the Berkeley rlogin, rsh, and rexec protocols. SSH provides a secure channel over an unsecured network in a client-server architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH. (extract from Wikipedia)
SSH is the preferred protocol to connect to CISE Linux systems over the Internet.
In order to ‘ssh’ into a CISE system you need a SSH client. Different SSH clients are available for different platforms. We recommend to use the native ssh application on Mac and Linux systems, and PuTTY on Windows.
Please Note: Due to an increase in brute force attacks against the CISE network, many of our machines now run firewalls to prevent repetitive failed connections. If a machine stops responding to your ssh requests, please wait for a minute and try to connect again.
How to connect to a Windows machine over the Internet?
Remotely accessible CISE Windows Systems are available via Remote Desktop Protocol (RDP).
In order to 'rdp' into a CISE system you need a RDP client. The Windows native application Remote Desktop Connection is the recommended application for Windows users. Remmina is the preferred client on Ubuntu systems.
Please Note: Due to an ongoing attack against UF’s network, all RDP traffic from the Internet is being block by our external firewall. In order to use RDP remotely, you must be connected using UF VPN Service.
How to connect to UF VPN Services?
The Gatorlink VPN service provides secure remote access to the University of Florida network and makes it appear as if your computer were physically attached to the campus network. All instructions on how to use the service can be found on the UF IT Wiki.
Fingerprints for CISE public key pairs. (If they do not match, you may be going through a proxy or Man In The Middle attack.)
Bastion SSH servers
2048 SHA256:ILW75bn+zjckITHbz/8AMeeIajOkhc05x7SdN09KYpQ root@thunder (RSA) 256 SHA256:J2U1n0VC3gHxdo5vLraj02w7U5FRVipUi0jHWXsi23o root@thunder (ECDSA) 256 SHA256:rUOadj4nDlHqsraKt/hytLq7viHm07+PpOBft7oSak8 root@thunder (ED25519) 1024 SHA256:koHyYIiqxMMy81mjQ/ymr0MFtYaQ6cv4ccH2syviqNo root@thunder (DSA)
2048 SHA256:AhNSZorRSpRRx3H8PtPtvzWvcYYS0GKLErhECJK+7s4 root@storm (RSA) 256 SHA256:zKHNRtXw2wOUa8+lk/SqvfUfIYJLbO+JUcEfSCMKDPw root@storm (ECDSA) 256 SHA256:Cy1ySjnk2syIM0aN/JsG1X1BqpJa29Tsde18dJZOZok root@storm (ED25519) 1024 SHA256:06oUOxWlt453/0GC+kUJ26oJE+ybvCGogc1yDxq84AI root@storm (DSA)
2048 SHA256:IVAL6Ym233eYLeXmiX8VdwzS2bPjDYAnW19ktJBVlUw no comment (RSA) 256 SHA256:HACwFL5pCuIwTD/b2NJsdtGBuYo68Z+UbCwaVrkgu84 no comment (ECDSA) 256 SHA256:wTTjf2MY1BhVFFPd9xnQMeAPfFJJrqZLZzHYsitiKNY no comment (ED25519) (*) Reserved for faculty use only.
2048 SHA256:HmMGTAfbtNq2mIoXcGPMCxFNjZrcTpn/GcqtW3x5PJQ root@fac1 (RSA) 256 SHA256:CL9ypj5KaniTFMYXifnI/372gOQ24apMFT378HShlJM root@fac1 (ECDSA) 256 SHA256:SVAPDz4wsKEoEr+aTKXvrhsi9neDA+GcoeCxuT2VDV0 root@fac1 (ED25519)
2048 SHA256:XDG6wF9T7wc+IX8SrQQvtavI6XpZl322gwSL+XU0W2A root@fac2 (RSA) 256 SHA256:objlSGYTjdg/LiH+1VVizbjkTkc1Pc9FPK/ExXbnJWo root@fac2 (ECDSA) 256 SHA256:HTAdg8SSh3FlNYcQGfn3p9KURFAuIFaOJrmPUpdpT50 root@fac2 (ED25519)