Set up the VPN connection
To access the Garnatxa cluster from locations outside the University of Valencia domain, you must first establish a VPN connection with our server. Below, we explain how to do this depending on the operating system platform you use.
Attention
Alternatively, and only if you have a user account with the University of Valencia, you can configure the connection to the University of Valencia VPN server. You must use this file (omit the step 0 below) and the credentials user@uv.es or user@alumni.uv.es, along with the password you use to access your UV email.
Mac OS
Step 0. Download on your computer the configuration file that will be used to establish the VPN connection.
Download this file.
Step 1. Download on your computer the OpenVPN client and install it on your computer.
Figure 1a. Download the installer (OpenVPN client).
Figure 1b. Install OpenVPN on your computer.
Step 2. Open the installed application.
Figure 2. The OpenVPN application should be located in the finder explorer on your Mac (tab applications).
Step 3. Click on the file tab and select the file that you downloaded in Step 0.
Figure 3a. Select the file tab in the Import File window then click on the Browse button.
Figure 3b. Browse in the explorer window and open the file that you downloaded in the Step 0.
Step 4. Insert your user and password then click on connect.
Attention
You must to type the credentials (user and password) that you received via email when Get an Account
Figure 4. The window shows some information about the VPN connection that you have to accept.
Step 5. If everything went fine a window shows the message connected.
Figure 5. If the connection was successfully then a green label will appear to indicate that you are connected .
Step 6. Every time you want to connect to Garnatxa you will have previously connect the VPN. To do this click on the OpenVPN icon and select the I2SysBio VPN network.
Figure 6. The OpenVPN icon will be showed in the upper bar. You can click on it to connect / disconnect from the VPN.
Windows
Step 0. Download on your computer the configuration file that will be used to establish the VPN connection.
Download this file.
Step 1. Download on your computer the file. and install it on your computer.
Figure 1. Download and install on your computer the OpenVPN application.
Note
If a message like the figure 3 appear then omit it and continue in Step 2.
Figure 2. Continue with the next step.
Step 2. Right-click on the OpenVPN then select import file from the contextual menu. Browse and select the file that you downloaded in the Step 0.
Figure 3. Right-click on the OpenVPN icon.
Figure 4. Click on import file.
Figure 5. Choose the previously downloaded file in Step 1.
Step 3. Right-click on the OpenVPN icon and select **i2sysbio** > Connect
Figure 6. Select the installed VPN and click to connect.
step 4. Enter your credentials (user and password).
Attention
You must to type the credentials (user and password) that you received via email when Get an Account
Figure 7. Enter the user name and password.
step 5. Every time to want to connect to Garnatxa you will have to establish a VPN connection. Right-click on the OpenVPN icon and click to i2sysbio (see step 4).
Figure 8. Enable your VPN before to connect to Garnatxa.
Figure 9. Enter your credentials.
Figure 10. If everything went fine the OpenVPN icon will become in green and a popup message appears showing that the connection was successfully.
Ubuntu
Step 0. Download on your computer the configuration file that will be used to establish the VPN connection.
Download this file.
Step 1. Right-click on the network icon (upper bar) and then click on the settings option.
Figure 1. Open the network settings.
Step 2. Create a new VPN clicking on the + button..
Figure 2. Create a new VPN.
Step 3. Load the configuration file selecting the import from file option.
Figure 3. Select import from file.
Step 4. Browse and select the file that you downloaded in the Step 0.
Figure 4. Load the configuration file downloaded in the step 0.
Step 5. Enter your credentials (user and password).
Figure 5. Enter the user name and password and push the Add button.
Attention
You must to type the credentials (user and password) that you received via email when Get an Account
Step 6. Connect to the new VPN network. Right-click on the network icon (upper bar) and click VPN connect option.
Figure 6. You will have to do this every time you want to connect to Garnatxa.
Step 7. If everything went fine you can check if the new UV or I2SysBio VPN is active. Right-click on the network-icon and check the status.
Figure 7. If you are connected then a UV or I2SysBio label should be showed.
Generic UNIX systems
On UNIX systems you can follow the below instructions to establish a VPN connection by console.
Step 0. Download on your computer the configuration file that will be used to establish the VPN connection.
Download this file.
Step 1. Open a Terminal (press ctrl + alt + T button) and install the OpenVPN client. You will need administrator permissions to do it, use command sudo
DEBIAN
$ [USERNAME@master ~]$ sudo apt get install openvpn
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
The following packages were automatically installed and are no longer required:
chromium-codecs-ffmpeg-extra gstreamer1.0-vaapi i965-va-driver
intel-media-va-driver libaacs0 libaom3 libass9 libavcodec58 libavformat58
libavutil56 libbdplus0 libblas3 libbluray2 libbs2b0 libchromaprint1
libcodec2-1.0 libdav1d5 libflite1 libgme0 libgsm1
libgstreamer-plugins-bad1.0-0 libigdgmm12 liblilv-0-0 libmfx1 libmysofa1
libnorm1 libopenmpt0 libpgm-5.3-0 libpostproc55 librabbitmq4 librubberband2
libserd-0-0 libshine3 libsnappy1v5 libsord-0-0 libsratom-0-0
libsrt1.4-gnutls libssh-gcrypt-4 libswresample3 libswscale5 libudfread0
libva-drm2 libva-wayland2 libva-x11-2 libva2 libvdpau1 libvidstab1.1
libx265-199 libxvidcore4 libzimg2 libzmq5 libzvbi-common libzvbi0
mesa-va-drivers mesa-vdpau-drivers pocketsphinx-en-us systemd-hwe-hwdb
va-driver-all vdpau-driver-all
Use 'sudo apt autoremove' to remove them.
Suggested packages:
resolvconf openvpn-systemd-resolved easy-rsa
The following NEW packages will be installed:
openvpn
0 upgraded, 1 newly installed, 0 to remove and 146 not upgraded.
Need to get 611 kB of archives.
After this operation, 1.663 kB of additional disk space will be used.
Get:1 http://es.archive.ubuntu.com/ubuntu jammy/main amd64 openvpn amd64 2.5.5-1ubuntu3 [611 kB]
Fetched 611 kB in 1s (755 kB/s)
Preconfiguring packages ...
Selecting previously unselected package openvpn.
(Reading database ... 201903 files and directories currently installed.)
Preparing to unpack .../openvpn_2.5.5-1ubuntu3_amd64.deb ...
Unpacking openvpn (2.5.5-1ubuntu3) ...
Setting up openvpn (2.5.5-1ubuntu3) ...
Processing triggers for man-db (2.10.2-1) ...
RED HAT Install the epel repository:
$ [USERNAME@master ~]$ sudo dnf -y install epel-release
Last metadata expiration check: 1:23:53 ago on Wed 05 Oct 2022 02:49:46 PM CEST.
Dependencies resolved.
===================================================================================================================================
Package Architecture Version Repository Size
===================================================================================================================================
Installing:
epel-release noarch 8-17.el8 extras 24 k
Transaction Summary
===================================================================================================================================
Install 1 Package
Total download size: 24 k
Installed size: 34 k
Downloading Packages:
epel-release-8-17.el8.noarch.rpm 3.9 MB/s | 24 kB 00:00
-----------------------------------------------------------------------------------------------------------------------------------
Total 105 kB/s | 24 kB 00:00
Running transaction check
Transaction check succeeded.
Running transaction test
Transaction test succeeded.
Running transaction
Preparing : 1/1
Installing : epel-release-8-17.el8.noarch 1/1
Running scriptlet: epel-release-8-17.el8.noarch 1/1
Many EPEL packages require the CodeReady Builder (CRB) repository.
It is recommended that you run /usr/bin/crb enable to enable the CRB repository.
Verifying : epel-release-8-17.el8.noarch 1/1
Installed:
epel-release-8-17.el8.noarch
Complete!
Install the open VPN package:
$ [USERNAME@master ~]$ sudo dnf -y install openvpn
Last metadata expiration check: 1:22:37 ago on Wed 05 Oct 2022 02:49:49 PM CEST.
Dependencies resolved.
===================================================================================================================================
Package Architecture Version Repository Size
===================================================================================================================================
Installing:
openvpn x86_64 2.4.12-1.el8 epel 545 k
Installing dependencies:
pkcs11-helper x86_64 1.22-7.el8 epel 64 k
Transaction Summary
===================================================================================================================================
Install 2 Packages
Total download size: 609 k
Installed size: 1.4 M
Is this ok [y/N]: y
Downloading Packages:
(1/2): pkcs11-helper-1.22-7.el8.x86_64.rpm 2.1 MB/s | 64 kB 00:00
(2/2): openvpn-2.4.12-1.el8.x86_64.rpm 11 MB/s | 545 kB 00:00
-----------------------------------------------------------------------------------------------------------------------------------
Total 1.2 MB/s | 609 kB 00:00
Running transaction check
Transaction check succeeded.
Running transaction test
Transaction test succeeded.
Running transaction
Preparing : 1/1
Installing : pkcs11-helper-1.22-7.el8.x86_64 1/2
Running scriptlet: openvpn-2.4.12-1.el8.x86_64 2/2
Installing : openvpn-2.4.12-1.el8.x86_64 2/2
Running scriptlet: openvpn-2.4.12-1.el8.x86_64 2/2
Verifying : openvpn-2.4.12-1.el8.x86_64 1/2
Verifying : pkcs11-helper-1.22-7.el8.x86_64 2/2
Installed:
openvpn-2.4.12-1.el8.x86_64 pkcs11-helper-1.22-7.el8.x86_64
Complete!
Step 2. Execute the command below. First, you will be asked for “[sudo] password for” you must enter your user password associated to your computer (this is required to execute the command sudo). Then you will be asked for:
Enter Auth Username : Use the user name that was commented in the step 0.
Enter Auth Password : Use the password commented in the step 0.
If all goes fine the execution should finish with the line Initialization Sequence Completed.
Attention
Don’t close this terminal. You have to keep opened this terminal while a connection with Garnatxa is active. Every time you want to connect with Garnatxa you should repeat this step.
$ [USERNAME@master ~]$ sudo openvpn ./i2sysbio.ovpn
[sudo] password for userlocal:
2022-10-05 14:52:07 Unrecognized option or missing or extra parameter(s) in ./i2sysbio.ovpn:21: block-outside-dns (2.5.5)
2022-10-05 14:52:07 OpenVPN 2.5.5 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Mar 22 2022
2022-10-05 14:52:07 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10
Enter Auth Username: user_i2sysbio
Enter Auth Password: ***************
2022-10-05 14:52:17 OPTIONS IMPORT: route-related options modified
2022-10-05 14:52:17 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
2022-10-05 14:52:17 OPTIONS IMPORT: peer-id set
2022-10-05 14:52:17 OPTIONS IMPORT: adjusting link_mtu to 1624
2022-10-05 14:52:17 OPTIONS IMPORT: data channel crypto options modified
2022-10-05 14:52:17 Outgoing Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
2022-10-05 14:52:17 Incoming Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
2022-10-05 14:52:17 net_route_v4_best_gw query: dst 0.0.0.0
2022-10-05 14:52:17 net_route_v4_best_gw result: via 10.0.2.2 dev enp0s3
2022-10-05 14:52:17 ROUTE_GATEWAY 10.0.0.0/255.255.255.0 IFACE=enp0s3 HWADDR=08:00:27:f1:f8:aa
2022-10-05 14:52:17 TUN/TAP device tun0 opened
2022-10-05 14:52:17 net_iface_mtu_set: mtu 1500 for tun0
2022-10-05 14:52:17 net_iface_up: set tun0 up
2022-10-05 14:52:17 net_addr_v4_add: 172.16../24 dev tun0
2022-10-05 14:52:17 net_route_v4_add: ../32 via 10.0.2.2 dev [NULL] table 0 metric -1
2022-10-05 14:52:17 net_route_v4_add: 0.0.0.0/1 via 172.16.1.1 dev [NULL] table 0 metric -1
2022-10-05 14:52:17 net_route_v4_add: 128.0.0.0/1 via 172.16.1.1 dev [NULL] table 0 metric -1
2022-10-05 14:52:17 Initialization Sequence Completed