• 易迪拓培训,专注于微波、射频、天线设计工程师的培养
首页 > HFSS > HFSS help > Specifying the Remote Spawn Command as RSH or SSH (Linux)

HFSS15: Specifying the Remote Spawn Command as RSH or SSH (Linux)

录入:edatop.com     点击:

An important step in using a high performance cluster is setting up authentication across machines in such a way that the machines can be accessed without a password. By default HFSS and HFSS-IE use SSH authentication on Linux to spawn commands on the remote machines but also supports RSH. The selection of which to use is made on the HFSS Options: Solver Tab or the solver tab of the Tools/Options/HFSS-IE Options dialog.

SSH

You will need to set up passwordless access to use HFSS-IE on a Linux cluster with SSH or RSH. In general, for SSH, this is accomplished by

1. Verify that you have working SSH servers and clients on your machines.

2. Verify that the server will accept passwordless logins. You may need to edit the /etc/ssh/ssh_d file to allow RSAAuthentication and PubkeyAuthentication.

3. Generating keys on the client system using the ssh-keygen program. Do not use a passphrase so that you can access the machine without a password.

4. Copy the public key generated in step 1 from the ~/.ssh directory to the server. The easiest way to transfer the keys is to use the ssh-copy-id program. Alternately, you can use any file transfer utility. If the server already has a list of existing keys for other clients add the new public key to the list.

5. Test the connection. Login to the client machine using the username that you used to create the identity keys. Open a new shell terminal and attempt to open an SSH login session. For example type: ssh 192.168.0.4 (where the IP address is the address of the machine you are attempting to connect to). The server should allow you to login without requesting a password.

See the documentation for your machines and network for detailed instructions.

RSH

If you choose to use RSH you will need to make sure RSH is installed on all the machines and set the machines up so that you are not prompted for a password. There are different ways to set up password-less RSH so be sure to see the documentation for your machines and network for detailed instructions.

Machine access using RSH without a password is often set up by editing the /etc/hosts.equiv file and adding entries for the hosts you would like to use without a password. This file lists hosts and users that are granted "trusted" access to the system.

If you look at the /etc/hosts.equiv file you should have something similar to the following:

Contents of the /etc/hosts.equiv file:

job1.n1.com

job2.n1.com

job3.n1.com

The machines job1, job2 and job3 can connect without a password. You may also need to verify that the files /etc/hosts.allow and /etc/hosts.deny are empty. See your local documentation for detailed instructions and troubleshooting suggestions.

HFSS 学习培训课程套装,专家讲解,视频教学,帮助您全面系统地学习掌握HFSS

上一篇:Splitting Objects
下一篇:(Square Root) Command

HFSS视频培训课程推荐详情>>
HFSS教程推荐

  网站地图