brctl show brif Display information about the bridge interface brif The manpage

Brctl show brif display information about the bridge

This preview shows page 112 - 116 out of 170 pages.

brctl show brif Display information about the bridge interface brif The manpage man teamd.conf lists many examples of team configurations and runners. The manpage man nmcli-examples contains, among others, examples of teaming and bridging configuration. Linux Quick Reference Guide 6 th ed., Aug 2018 © Daniele Raffo
Image of page 112
110/167 TCP Wrapper TCP Wrapper /etc/hosts.allow /etc/hosts.deny Host access control files used by the TCP Wrapper system. Each file contains zero or more daemon : client lines. The first matching line is considered. Access is granted when a daemon : client pair matches an entry in /etc/hosts.allow . Otherwise, access is denied when a daemon : client pair matches an entry in /etc/hosts.deny . Otherwise, access is granted. /etc/hosts.allow and /etc/hosts.deny lines syntax ALL: ALL All services to all hosts ALL: .example.edu All services to all hosts of the example.edu domain ALL: .example.edu EXCEPT host1.example.edu All services to all hosts of example.edu, except host1 in.fingerd: .example.com Finger service to all hosts of example.com in.tftpd: LOCAL TFTP to hosts of the local domain only sshd: 10.0.0.3 10.0.0.4 10.1.1.0/24 SSH to the hosts and network specified sshd: 10.0.1.0/24 SSH to 10.0.1.0/24 sshd: 10.0.1. SSH to 10.0.1.0/24 sshd: 10.0.1.0/255.255.255.0 SSH to 10.0.1.0/24 in.tftpd: ALL: spawn (/safe_dir/safe_finger \ -l @%h | /bin/mail -s %d-%h root) & Send a finger probe to hosts attempting TFTP and notify root user via email portmap: ALL: (echo Illegal RPC request \ from %h | /bin/mail root) & When a client attempts a RPC request via the portmapper (NFS access), echo a message to the terminal and notify root user via email Linux Quick Reference Guide 6 th ed., Aug 2018 © Daniele Raffo
Image of page 113
111/167 Routing Routing Output of command route -en Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 192.168.3.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0 0.0.0.0 192.168.3.1 0.0.0.0 UG 0 0 0 eth0 Destination network or host destination network or host 0.0.0.0 default route Gateway host gateway 0.0.0.0 * no gateway needed, network is directly connected - rejected route Genmask network mask network mask to apply for the destination network 255.255.255.255 destination host 0.0.0.0 default route Flags U route is up G use gateway H target is host ! rejected route D dynamically installed by daemon M modified from routing daemon R reinstate route for dynamic routing ip route route -en route -F netstat -rn Display IP routing table ip route show cache route -C Display kernel routing cache ip route add default via 10.1.1.254 route add default gw 10.1.1.254 Add a default gateway ip route add 10.2.0.1 dev eth0 ip route add 10.2.0.1 via 10.2.0.254 route add -host 10.2.0.1 gw 10.2.0.254 Add a route for a host ip route add 10.2.0.0/16 via 10.2.0.254 route add -net 10.2.0.0 netmask 255.255.0.0 gw 10.2.0.254 Add a route for a network ip route delete 10.2.0.1 dev eth0 route del -host 10.2.0.1 gw 10.2.0.254 Delete a route for a host ip route flush all Delete the routing table for all interfaces Linux Quick Reference Guide 6 th ed., Aug 2018 © Daniele Raffo
Image of page 114
112/167 iptables iptables The Netfilter framework provides firewalling capabilities in Linux.
Image of page 115
Image of page 116

You've reached the end of your free preview.

Want to read all 170 pages?

  • Spring '17
  • vipada
  • ........., Disk partitioning, Daniele Raffo

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes