<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="3.10.0">Jekyll</generator><link href="https://trigal.github.io/feed.xml" rel="self" type="application/atom+xml" /><link href="https://trigal.github.io/" rel="alternate" type="text/html" /><updated>2026-04-07T06:04:51+00:00</updated><id>https://trigal.github.io/feed.xml</id><title type="html">Augusto Luis Ballardini - Academic Page</title><subtitle>PhD</subtitle><author><name>Augusto Luis Ballardini</name><email>augusto [dot] ballardini [at] uah [dot] es</email><uri>https://www.uah.es/es/estudios/profesor/Augusto-Luis-Ballardini/</uri></author><entry><title type="html">SSH Tunneling</title><link href="https://trigal.github.io/posts/2025/11/port-forwarding/" rel="alternate" type="text/html" title="SSH Tunneling" /><published>2025-11-11T00:00:00+00:00</published><updated>2025-11-11T00:00:00+00:00</updated><id>https://trigal.github.io/posts/2025/11/blog-post-6</id><content type="html" xml:base="https://trigal.github.io/posts/2025/11/port-forwarding/"><![CDATA[<p>It seems that the VPN software we use at my university, a version of Forticlient, has some issues with route creation. Every time I set up Forticlient, all traffic gets redirected to the VPN gateway.</p>

<p>The problem is that some university machines are unknown to that gateway, so whenever I connect to the VPN, I lose access to certain systems. This also happens, for example, with the Anydesk network.</p>

<p>I ended up using the following lines of code to fix the routing. In this setup:</p>
<ul>
  <li><code class="language-plaintext highlighter-rouge">192.168.16.10</code> is the Forticlient VPN server,</li>
  <li><code class="language-plaintext highlighter-rouge">84.17.62.0</code> is the Anydesk network (you’ll need to identify this yourself before modifying routes),</li>
  <li><code class="language-plaintext highlighter-rouge">192.168.151.27</code> is the IP of my DGX system.</li>
</ul>

<div class="language-plaintext highlighter-rouge"><div class="highlight"><pre class="highlight"><code># deletes the default forticlient route "ALL GOES TO FORTICLIENT"
sudo route del -net 0.0.0.0 netmask 0.0.0.0 gw 192.168.16.10 dev ppp0 metric 0

# routes 84.17.62.0 which is the network of anydesk to the wired interface directly
sudo route add -net 84.17.62.0 netmask 255.255.255.0 metric 0 dev enx1ce192ff37f8 gw 192.168.67.254

# add a route to the dgx ip address through the forticlient interface (ppp0)
sudo route add -net 192.168.151.27 netmask 255.255.255.255 metric 0 dev ppp0 gw 192.168.16.10
</code></pre></div></div>

<p>Hope that’s helpful :-)</p>

<p>Augusto</p>]]></content><author><name>Augusto Luis Ballardini</name><email>augusto [dot] ballardini [at] uah [dot] es</email><uri>https://www.uah.es/es/estudios/profesor/Augusto-Luis-Ballardini/</uri></author><category term="routing" /><category term="anydesk" /><category term="forticlient" /><summary type="html"><![CDATA[It seems that the VPN software we use at my university, a version of Forticlient, has some issues with route creation. Every time I set up Forticlient, all traffic gets redirected to the VPN gateway.]]></summary></entry><entry><title type="html">Intersection Dataset</title><link href="https://trigal.github.io/posts/2021/07/intersectiondataset/" rel="alternate" type="text/html" title="Intersection Dataset" /><published>2021-07-15T00:00:00+00:00</published><updated>2021-07-15T00:00:00+00:00</updated><id>https://trigal.github.io/posts/2021/07/blog-post-5</id><content type="html" xml:base="https://trigal.github.io/posts/2021/07/intersectiondataset/"><![CDATA[<p>Together with the colleagues of the INVETT group of Universidad de Alcalá, I am preparing a new multi-season dataset focused on the intersection detection issue. More details will be provided in <a href="http://invett.es/intersectiondataset">the official website of the group</a>.</p>

<hr />]]></content><author><name>Augusto Luis Ballardini</name><email>augusto [dot] ballardini [at] uah [dot] es</email><uri>https://www.uah.es/es/estudios/profesor/Augusto-Luis-Ballardini/</uri></author><category term="intersection-detection" /><category term="dataset" /><category term="intelligent-transportation-system" /><summary type="html"><![CDATA[Together with the colleagues of the INVETT group of Universidad de Alcalá, I am preparing a new multi-season dataset focused on the intersection detection issue. More details will be provided in the official website of the group.]]></summary></entry><entry><title type="html">Paper Accepted! Model Guided Road Intersection Classification</title><link href="https://trigal.github.io/posts/2021/05/iv2021/" rel="alternate" type="text/html" title="Paper Accepted! Model Guided Road Intersection Classification" /><published>2021-04-23T00:00:00+00:00</published><updated>2021-04-23T00:00:00+00:00</updated><id>https://trigal.github.io/posts/2021/05/blog-post-4</id><content type="html" xml:base="https://trigal.github.io/posts/2021/05/iv2021/"><![CDATA[<p>It is our pleasure to inform you that the paper identified above, for which you are listed as one of the authors, has been accepted as a contributed paper to be presented at the 2021 32nd IEEE Intelligent Vehicles Symposium (IV) (IV 2021), July 11-15, 2021, in Nagoya University, Nagoya, Japan.</p>

<p>:-)</p>

<p><a href="https://arxiv.org/abs/2104.12417">You can find our preprint here</a></p>

<p>Title: Model Guided Road Intersection Classification</p>

<p>Abstract: Understanding complex scenarios from in-vehicle cameras is essential for safely operating autonomous driving systems in densely populated areas. Among these, intersection areas are one of the most critical as they concentrate a considerable number of traffic accidents and fatalities. Detecting and understanding the scene configuration of these usually crowded areas is then of extreme importance for both autonomous vehicles and modern ADAS aimed at preventing road crashes and increasing the safety of vulnerable road users. This work investigates inter-section classification from RGB images using well-consolidate neural network approaches along with a method to enhance the results based on the teacher/student training paradigm. An extensive experimental activity aimed at identifying the best input configuration and evaluating different network parameters on both the well-known KITTI dataset and the new KITTI-360 sequences shows that our method outperforms current state-of-the-art approaches on a per-frame basis and prove the effectiveness of the proposed learning scheme.</p>

<hr />]]></content><author><name>Augusto Luis Ballardini</name><email>augusto [dot] ballardini [at] uah [dot] es</email><uri>https://www.uah.es/es/estudios/profesor/Augusto-Luis-Ballardini/</uri></author><category term="ieee" /><category term="intelligent-transportation-system" /><category term="intellivent-vehicles-symposium" /><summary type="html"><![CDATA[It is our pleasure to inform you that the paper identified above, for which you are listed as one of the authors, has been accepted as a contributed paper to be presented at the 2021 32nd IEEE Intelligent Vehicles Symposium (IV) (IV 2021), July 11-15, 2021, in Nagoya University, Nagoya, Japan.]]></summary></entry><entry><title type="html">SSH Tunneling</title><link href="https://trigal.github.io/posts/2021/01/port-forwarding/" rel="alternate" type="text/html" title="SSH Tunneling" /><published>2021-01-31T00:00:00+00:00</published><updated>2021-01-31T00:00:00+00:00</updated><id>https://trigal.github.io/posts/2021/01/blog-post-3</id><content type="html" xml:base="https://trigal.github.io/posts/2021/01/port-forwarding/"><![CDATA[<p>From time to time, everyone has to deal with IT guys bizarre security habits. Among them, one of the most annoying are</p>

<ul>
  <li>the so-called “security by obscurity” or “security through obscurity” practice of change default service ports</li>
  <li>adding multiple layers of supposed security instead of rely on one secure protocol</li>
</ul>

<p>Regarding the first one, I will try to contact my old “Computer Security” professor of the M.Sc. course to give some more details. In the meanwhile, you can read the <a href="https://en.wikipedia.org/wiki/Security_through_obscurity">Wikipedia page</a> or just use a web serach engine.</p>

<!-- 
# For the second issue, mixed with the first one, suppose for example to have a system that runs in machine behind firewall that blocks every port except # the 22, but you have this system behind a VPN such that you don't have direct access to the final machine. Now, imagine that you need to access to that # machine to do your work, not just having fun, and due to the above IT "safety measures" you can not. What. Wait? You can't?! 
# 
# No way. As soon you a way to access to the final machine with ssh, you can do whatever you want and this is the reason for this little post. 
-->

<h2 id="port-forwarding">Port forwarding</h2>

<p>You can have a look of what a tunnel is in the official <a href="https://www.ssh.com/ssh/tunneling">ssh page</a>.</p>

<p>Suppose you have a REMOTE_MACHINE_A you want to login or use or whatever, but that machine is in a remote network you can not access. But, you have accesso to REMOTE_MACHINE_B behind a firewall with only the port XXX open. What you can do is setup a tunne through the servers, consisting in successive jumps that will allow you to enter to the REMOTE_MACHINE_A like a charm.</p>

<p>What you have to do are just two “local” tunnels.</p>

<p>On your machine, the one you are working, create a local tunnel to the machine where you have access. The ports at this moment are not important, let add use a “port shift” of 10000 (or 10100) method to denote that if we want to use port 22 of the final machine, now we’ll use 10022 or 10122.
Last thing, localhost is the same as 127.0.0.1 ;-).</p>

<p>Create tunnel from port <code class="language-plaintext highlighter-rouge">localhost port 10022</code> to <code class="language-plaintext highlighter-rouge">REMOTE_MACHINE_B port 10122</code>. Use <code class="language-plaintext highlighter-rouge">USER@REMOTE_MACHINE_B</code> to access the remote machine. In this way, every local connection to port 10022 will be forwarded to port 10122 on the remote machine, automagically, encrypted.</p>
<div class="language-plaintext highlighter-rouge"><div class="highlight"><pre class="highlight"><code>1. ssh -L 10022:localhost:10122 USER@REMOTE_MACHINE_B
</code></pre></div></div>

<p>In this way, if you have a service listening to port 10122 on the REMOTE machine BUT that port is hidden with a firewall, now on your LOCAL machine machine you can log to the LOCAL machine on port 10022 without saying anything about the REMOTE machine, the tunnel will do the grunt work.</p>

<p>Iterating this procedure you can add more “jumps” too. Example: want to connect to the port 22 of REMOTE_MACHINE_A?</p>
<div class="language-plaintext highlighter-rouge"><div class="highlight"><pre class="highlight"><code>1. LOCAL MACHINE: ssh -L 10022:localhost:10122 USER@REMOTE_MACHINE_B
2. MACHINE-B:     ssh -L 10122:localhost:22 USER@REMOTE_MACHINE_A
</code></pre></div></div>

<p>then, access to the local machine BUT to the port we specified in the first tunnel and ssh will forward the request through REMOTE_MACHINE_B directly to REMOTE_MACHINE_A, even though for your ssh agent you’re connecting to the LOCAL port.</p>
<div class="language-plaintext highlighter-rouge"><div class="highlight"><pre class="highlight"><code>3. LOCAL MACHINE: ssh user@localhost -p 10022
</code></pre></div></div>

<p>that’s all folks.</p>

<hr />]]></content><author><name>Augusto Luis Ballardini</name><email>augusto [dot] ballardini [at] uah [dot] es</email><uri>https://www.uah.es/es/estudios/profesor/Augusto-Luis-Ballardini/</uri></author><category term="ssh" /><category term="tunnels" /><category term="port-forwarding" /><summary type="html"><![CDATA[From time to time, everyone has to deal with IT guys bizarre security habits. Among them, one of the most annoying are]]></summary></entry><entry><title type="html">Hello World (Blog Launch)</title><link href="https://trigal.github.io/posts/2020/07/HelloWorld/" rel="alternate" type="text/html" title="Hello World (Blog Launch)" /><published>2020-07-04T00:00:00+00:00</published><updated>2020-07-04T00:00:00+00:00</updated><id>https://trigal.github.io/posts/2020/07/blog-post-1</id><content type="html" xml:base="https://trigal.github.io/posts/2020/07/HelloWorld/"><![CDATA[<p>This is the first post inside this blog. I will try to update this blog with some infos from general research activity, not strictly connected to a specific topic, just tech curiosities, news comments etc.</p>

<hr />]]></content><author><name>Augusto Luis Ballardini</name><email>augusto [dot] ballardini [at] uah [dot] es</email><uri>https://www.uah.es/es/estudios/profesor/Augusto-Luis-Ballardini/</uri></author><category term="first post" /><category term="greetings" /><summary type="html"><![CDATA[This is the first post inside this blog. I will try to update this blog with some infos from general research activity, not strictly connected to a specific topic, just tech curiosities, news comments etc.]]></summary></entry><entry><title type="html">OpenCV projectpoints function</title><link href="https://trigal.github.io/posts/2020/07/projectpoints/" rel="alternate" type="text/html" title="OpenCV projectpoints function" /><published>2020-07-04T00:00:00+00:00</published><updated>2020-07-04T00:00:00+00:00</updated><id>https://trigal.github.io/posts/2020/07/blog-post-2</id><content type="html" xml:base="https://trigal.github.io/posts/2020/07/projectpoints/"><![CDATA[<p><img src="/images/opencv3d2dprojections/test9.gif" height="400" alt="final result" /></p>

<hr />]]></content><author><name>Augusto Luis Ballardini</name><email>augusto [dot] ballardini [at] uah [dot] es</email><uri>https://www.uah.es/es/estudios/profesor/Augusto-Luis-Ballardini/</uri></author><category term="opencv" /><category term="projectpoints" /><category term="3d to 2d" /><category term="lidar" /><category term="lidar to image" /><summary type="html"><![CDATA[]]></summary></entry></feed>