Solved

Offline Ubuntu Package Installation

Posted on 2013-01-03
5
831 Views
Last Modified: 2013-01-03
I have an Ubuntu server that has firewall ports open for inbound web traffic as well as internal network SSH, but not for outbound server updates/upgrades. Unfortunately, I am unable to get the ports opened I need because of tight security restrictions. I need to install a VM on the machine and obviously cannot just use the sudo apt-get install virtualbox-ose command being that it can't get access out. My question is, if I download the virtualbox package on a secondary machine and transfer via USB drive or SSH, where would I upload it on the offline server in order to have the apt-get command find it and properly install it? Do I need to create a local repository for that to work?
0
Comment
Question by:dale_abrams
5 Comments
 
LVL 1

Expert Comment

by:Shizzo
ID: 38741016
Normally with the linux package there will be a readme file that contains all the information in it to install the package on the machine. Apt-get will not work in this instance. http://www.virtualbox.org/manual/ch02.html#idp5512464
0
 
LVL 31

Accepted Solution

by:
farzanj earned 500 total points
ID: 38741201
If you can get a package (deb) file you can issue the following command

sudo dpkg -i package.deb

Open in new window


You can get the deb for your version of Ubuntu from the following site
https://www.virtualbox.org/wiki/Linux_Downloads
0
 
LVL 77

Expert Comment

by:arnold
ID: 38741265
Look at ssh tunneling/proxy.

Does this server have access to NFS shares

mkdir -p /mnt/repos
mount -t NFS 192.168.0.2:/location/of/downloads /mnt/repos
You can either point and/or aptitude or dpkg and other means to do it.
0
 
LVL 1

Author Closing Comment

by:dale_abrams
ID: 38741602
Thanks. This was quick and easy and worked perfectly!
0
 
LVL 31

Expert Comment

by:farzanj
ID: 38741622
You are most welcome :)
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

​Being a Managed Services Provider (MSP) has presented you  with challenges in the past— and by meeting those challenges you’ve reaped the rewards of success.  In 2014, challenges and rewards remain; but as the Internet and business environment evol…
Hello EE, Today we will learn how to send all your network traffic through Tor which is useful to get around censorship and being tracked all together to a certain degree. This article assumes you will be using Linux, have a minimal knowledge of …
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now