Sponsored Content
Full Discussion: Finding IP Addresses
Special Forums IP Networking Finding IP Addresses Post 2429 by golfs4us on Friday 11th of May 2001 05:04:59 PM
Old 05-11-2001
Is there anyway to tell what my NT IP is while logging into my UNIX box. I have users accessing our NT network and then telneting into our Unix Box. I would like to restrict access somehow. My who commands only returns the users name and pts device which changes.
 

10 More Discussions You Might Find Interesting

1. IP Networking

ip addresses

this might sound corny but i need help finding out about finding a persons ip address can u halp? and another question what the hell does ping mean??? thank u. (2 Replies)
Discussion started by: dragonslayer100
2 Replies

2. IP Networking

Ip Addresses

I'm not exactly sure what I can do with IPs... my friend won't tell me(don't ask me why, I figure it's cause he doesn't know either, hehe). I'm curious as to what theya re used for other than networking computers... if there IS any other purpose or use for them. That's all. --Evil_d00d (4 Replies)
Discussion started by: evil_d00d
4 Replies

3. Programming

memory addresses

where is addresses(what kind of memory) like this one "df605d50". I want to print address of locan variable: printf("&i - %p", &i); and I have &i - df605d50. (0 Replies)
Discussion started by: Paravozzz
0 Replies

4. Programming

memory addresses

you have three variables of type char, int and float in continous memory locations. How do you print the contents of each of these.??? Thanks in advance. (0 Replies)
Discussion started by: areef4u
0 Replies

5. Shell Programming and Scripting

finding duplicate files by size and finding pattern matching and its count

Hi, I have a challenging task,in which i have to find the duplicate files by its name and size,then i need to take anyone of the file.Then i need to open the file and find for more than one pattern and count of that pattern. Note:These are the samples of two files,but i can have more... (2 Replies)
Discussion started by: jerome Sukumar
2 Replies

6. Programming

LInear Addresses

Hi all, Even after reading many explanation the question still haunting me what's the difference between physical and linear addresses.Can we directly access physical addresses .If not then paging circuitry would have ensure contiguous physical addresses regardless of any linear addresses but this... (2 Replies)
Discussion started by: joshighanshyam
2 Replies

7. UNIX and Linux Applications

email addresses

Greetings to all. I have installed dadamail on my web site and it works extremely well. I have two questions: 1. I have modified dada to bounce bad emails, but only the first newsletter will use the modifications. If I create another list, it doesn't use the modification. What gives? 2. Are... (0 Replies)
Discussion started by: okbrowder
0 Replies

8. UNIX for Dummies Questions & Answers

Different ip addresses

Hello! I have logged in using Putty into another machine 'tele'. The ip address which i used to login to 'tele' is 192.168.1.3. Now while at 'tele' when i run "#ifconfig -a" i get the same ip address i.e, 192.168.1.3. But when i run "#arp tele" it gives the output: tele (10.143.128.8) ... (9 Replies)
Discussion started by: suhail.sadaqat
9 Replies

9. IP Networking

Virtual IP addresses

How would i create virtual interface in linux to configure more than one IP address for a physical interface? any help wll be appreciated. https://www.unix.com/images/misc/progress.gif (1 Reply)
Discussion started by: salil2012
1 Replies

10. Shell Programming and Scripting

ip range addresses

I am trying to find a script that will generate all the ip addresses in particular range. Example: start: 41.0.0.0 end ip 41.1.1.2 32.32.35.3 to 32.32.36.0 Please help. Thanks (9 Replies)
Discussion started by: kkkk
9 Replies
NODE.PERMS(5)						     Linux Programmer's Manual						     NODE.PERMS(5)

NAME
node.perms - LinuxNode permissions file. DESCRIPTION
Node.perms file is read at program startup with the knowledge of users username (call), connection type (AX.25, NET/ROM, ROSE, TCP/IP), peers IP address (for TCP/IP) and port name (for AX.25). The first entry matching this information is taken and user is asked for password and given permissions according to it. The lines within node.perms must either be a comment line, which starts with a # in the first column, or a permission entry in the follow- ing format, each field being delimited by white space: username type portname password permissions The field descriptions are: username This is matched against users username (call) without SSID. An asterisk (*) matches any username. type This is matched against the type of the connection to user. Possible values for this field are: * matches any type of connection. ax25 matches users coming in with AX.25. netrom matches users coming in with NET/ROM. rose matches users coming in with ROSE. local matches TCP/IP connections where users host is in "local" network as defined in node.conf(5). ampr matches TCP/IP connections where users host is in amprnet (44.0.0.0/8). inet matches TCP/IP connections where users host is neither in "local" network nor in amprnet. host matches users starting LinuxNode from shell. portname If user is coming in with AX.25 this field is matched against the local port name the user is coming in via. An asterisk (*) matches any port name. password If the previous tree fields match and this field is not a single asterisk (*) the user is asked for a password. The password is then matched against this field. permissions This field represents a a bitmask of operations the user is permitted to do. It is a sum of the values listed here: 1 permits logging in even if no other permissions are given. 2 permits outgoing AX.25 connects. 4 permits outgoing NET/ROM connects. 8 permits telneting to hosts in the "local" network as defined in node.conf(5). 16 permits telneting to hosts in amprnet. 32 permits telneting to hosts neither in the "local" network nor in amprnet. 64 permits using hidden ports in outgoing AX.25 connections. (See HiddenPorts command in node.conf(5).) 128 permits outgoing ROSE connects. 256 The no-escape flag. Disables the escape mechanism for this user. FILES
/etc/ax25/node.perms SEE ALSO
node(8), node.conf(5), axports(5), ax25(4). Linux 16 June 1999 NODE.PERMS(5)
All times are GMT -4. The time now is 08:37 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy