The first task to accomplish is to boot the Network Security Toolkit (NST) system.
If one has downloaded and burned a ISO image to a CD, one can boot the Live CD version of the NST as follows:
Insert the CD into a Intel based system.
Turn on (or reboot) the system.
Enter a new system password when prompted.
Wait for the login prompt.
Log into the system as root
using the
password you specified at boot time.
If one has downloaded and extracted the NST Virtual Machine, one should be able to boot the NST within a virtual machine in the following manner:
Review the README
file (at a
minimum you'll need to find the initial password).
Double click on the appropriate .vmx icon to boot the NST virtual machine.
Log into the system as root
.
Right Click on the blue desktop to pull up the
menu. Select Desktop Applications
and
choose one of the available terminals.
Regardless of which boot method you choose, if you've
followed the steps above, you should now find yourself at a
command prompt. Run the command "ifconfig eth0"
and look for the IP address next to the
"inet addr:
" label. If things go well, you
should see something resembling:
The IP address for our test run (shown
above) is "192.168.0.42
" (yours will most
likely be different). We will use this address in a web browser
(such as Internet Explorer or Firefox) to connect to the NST by
specifying a URL of
"https://192.168.0.42/
".
A common mistake is to specify "http
"
instead of "https
" at the start of the
URL. If your web browser fails to connect,
make sure you specified
"https://192.168.0.42/
" and not
"http://192.168.0.42/
". The NST only
accepts encrypted connections from external machines.