Jump to content

HOWTO: Remotely Access your Folding Systems - Part 4 Tunneling Madness

So you have remote systems Folding for you out on the Internet and want to monitor them remotely? Exposing the Web Control (TCP 7396) or Advanced Control (TCP 36330) ports can be problematic as neither protocol is encrypted and is thus susceptible to interception of your data.

 

A better solution is to use SSH Port-Forwarding or Tunneling.

 

The following example is for monitoring from a Windows System at home to a remote Linux system using the PuTTY SSH Client on the Windows system to create a encrypted SSH Tunnel between the Local Windows System and Remote Linux System and was inspired by this post here.

 

On the Windows system create a PuTTY Saved Session for the Remote Host:

PuTTY_Fwd.jpg.84de2e2534897c12f10947a41a18608a.jpg

Don't forget to click "Add"

 

Here we are forwarding the Web Control Port on the Linux System (7396) to the same port on the Windows System so we can run Web Control or the LAR Systems Client.

 

Run this PuTTY session.

 

Open https://client.foldingathome.org or https://127.0.0.1:7396

 

See the Results from the Linux System:

DarkResults.thumb.jpg.5ba5c2352354cb16e97d9a11fd3e5c05.jpg

 

NOTE: You can only do this for a single system as the LAR Systems Client used the https://client.foldingathome.org URL that re-directs to localhost:7396 (127.0.0.1:7396). You could redirect other systems to other ports on the Windows system but only the one using Port 7396 will be visible to the LAR Systems Client. Re-directed systems using alternate ports can only be accessed through a browser.

 

For example, here is another remote system we are re-redirecting to Local Port 7392 on the Windows System:

PuTTY_Fwd2.jpg.ad19c8566f7956b74d5a7716437bb2c8.jpg

 

But here the LAR Systems Client won't work as you can not change the Port for it but you can still access this system using the "native" address of the Windows system 127.0.0.1:7392:

WebResults2.thumb.jpg.15122aa14468175ebdd3632c88de0c8e.jpg

 

The same method can be used fo tunnel the Advanced Control port (TCP 36330) from a remote Linux Systems to local ports for use with the Advanced Control or HfM.net.

 

Part 1 - FAH Control

Part 2 - HfM.net

Part 3 - F@H Mobile Monitor

FaH BOINC HfM

Bifrost - 6 GPU Folding Rig  Linux Folding HOWTO Folding Remote Access Folding GPU Profiling ToU Scheduling UPS

Systems:

desktop: Lian-Li O11 Air Mini; Asus ProArt x670 WiFi; Ryzen 9 7950x; EVGA 240 CLC; 4 x 32GB DDR5-5600; 2 x Samsung 980 Pro 500GB PCIe3 NVMe; 2 x 8TB NAS; AMD FirePro W4100; MSI 4070 Ti Super Ventus 2; Corsair SF750

nas1: Fractal Node 804; SuperMicro X10sl7-f; Xeon e3-1231v3; 4 x 8GB DDR3-1666 ECC; 2 x 250GB Samsung EVO Pro SSD; 7 x 4TB Seagate NAS; Corsair HX650i

nas2: Synology DS-123j; 2 x 6TB WD Red Plus NAS

nas3: Synology DS-224+; 2 x 12TB Seagate NAS

dcn01: Fractal Meshify S2; Gigabyte Aorus ax570 Master; Ryzen 9 5900x; Noctua NH-D15; 4 x 16GB DDR4-3200; 512GB NVMe; 2 x Zotac AMP 4070ti; Corsair RM750Mx

dcn02: Fractal Meshify S2; Gigabyte ax570 Pro WiFi; Ryzen 9 3950x; Noctua NH-D15; 2 x 16GB DDR4-3200; 128GB NVMe; 2 x Zotac AMP 4070ti; Corsair RM750x

dcn03: Fractal Meshify C; Gigabyte Aorus z370 Gaming 5; i9-9900k; BeQuiet! PureRock 2 Black; 2 x 8GB DDR4-2400; 128GB SATA m.2; MSI 4070 Ti Super Gaming X; MSI 4070 Ti Super Ventus 2; Corsair TX650m

dcn05: Fractal Define S; Gigabyte Aorus b450m; Ryzen 7 2700; AMD Wraith; 2 x 8GB DDR 4-3200; 128GB SATA NVMe; Gigabyte Gaming RTX 4080 Super; Corsair TX750m

dcn06: Fractal Focus G Mini; Gigabyte Aorus b450m; Ryzen 7 2700; AMD Wraith; 2 x 8GB DDR 4-3200; 128GB SSD; Gigabyte Gaming RTX 4080 Super; Corsair CX650m

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×