04-03-2008
First find the file.
find / -name oraenv
The file would mostly be under your $ORACLE_HOME/bin directory.
Secondly run the file as suggested.
HTH
enc
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
I need to do a full system inventory & pull details for:
CPU
Mem
HDD (Size, config, partitions)
Is there a single command to get this, or separate for each?
Thanks,
Gareth. (3 Replies)
Discussion started by: garethh
3 Replies
2. Red Hat
Hi
Need to know the version(suse/redhat) and processor info(x86/itanium/amd etc).
I tried uname -a but cannot understand what is what...
Linux myworkhost 2.4.21-4.ELsmp #1 SMP Fri Oct 3 17:52:56 EDT 2003 i686 i686 i386 GNU/Linux
I dont have the root password, I can only ssh and have to... (3 Replies)
Discussion started by: amiri2000
3 Replies
3. Solaris
I am using Solaris 10
Please tell me which path values are necessary for
PATH=
MANPATH=
LD_LIBRARY_PATH= (1 Reply)
Discussion started by: mansoorulhaq
1 Replies
4. Shell Programming and Scripting
DNS details of HP-UX
--------------------------------------------------------------------------------
1)how to get the DNS details, as i need to use these in shell script..
require info ASAP...
Thanks in advance (1 Reply)
Discussion started by: ksailesh
1 Replies
5. UNIX for Dummies Questions & Answers
Hi,
i am working on Tru64 os...
When i try to connect to an Oracle instance, the usual method i follow is
chsxsora1:oracle:PRD1 > . oraenv
ORACLE_SID = ? PRD1
But for one Instance it was not working,
chsxsora2:oracle:TST2 > . oraenv
ORACLE_SID =*= ? TST2
i... (0 Replies)
Discussion started by: saharookiedba
0 Replies
6. HP-UX
OS: HP-UX
I need the following details from HP-UX server.
I don't have root login, so most of the commands require root privilege
1. No of cpu in the server
2. Total Memory, Free & Used
3. Space used and free space
Any help would be highly appreciated (6 Replies)
Discussion started by: manijash
6 Replies
7. Shell Programming and Scripting
Hi all,
I am having lots of oracle servers. I want to collect some health check details from all the server and report to one single centralized server. What would be best solution for this?
OS: AIX
Thanks
Gopal (1 Reply)
Discussion started by: ilugopal
1 Replies
8. Shell Programming and Scripting
Hi All,
I have a Linux server where many script run on daily basis through crontab.
I could see some entries on my name but I am not able to get the details.
>>ps -ef | grep an001
>>root 9905 1742 0 Apr17 ? 00:00:00 sshd: an001
>>an001 9907 9905 0 Apr17 ? ... (3 Replies)
Discussion started by: infyanurag
3 Replies
9. UNIX for Dummies Questions & Answers
I have scheduled couple of shell scripts to run using 'at' command.
The o/p of at -l is:
$ at -l
1320904800.a Thu Nov 10 01:00:00 2011
1320894000.a Wed Nov 9 22:00:00 2011
1320876000.a Wed Nov 9 17:00:00 2011
$ uname -a
SunOS dc2prcrptetl2 5.9 Generic_122300-54 sun4u sparc... (2 Replies)
Discussion started by: superparticle
2 Replies
10. UNIX for Beginners Questions & Answers
Hi All ,
I'm a fresher and don't have much knowledge on scripting.
I want to extract log details like count of rows inserted , job start time and end time from Datastage log and want to insert into table.
Can you please me in this (2 Replies)
Discussion started by: Srikavya_manda
2 Replies
LEARN ABOUT FREEBSD
if_enc
ENC(4) BSD Kernel Interfaces Manual ENC(4)
NAME
enc -- Encapsulating Interface
SYNOPSIS
To compile this driver into the kernel, place the following line in your kernel configuration file:
device enc
DESCRIPTION
The enc interface is a software loopback mechanism that allows hosts or firewalls to filter ipsec(4) traffic using any firewall package that
hooks in via the pfil(9) framework.
The enc interface allows an administrator to see incoming and outgoing packets before and after they will be or have been processed by
ipsec(4) via tcpdump(1).
The ``enc0'' interface inherits all IPsec traffic. Thus all IPsec traffic can be filtered based on ``enc0'', and all IPsec traffic could be
seen by invoking tcpdump(1) on the ``enc0'' interface.
What can be seen with tcpdump(1) and what will be passed on to the firewalls via the pfil(9) framework can be independently controlled using
the following sysctl(8) variables:
Name Defaults Suggested
net.enc.out.ipsec_bpf_mask 0x00000003 0x00000001
net.enc.out.ipsec_filter_mask 0x00000001 0x00000001
net.enc.in.ipsec_bpf_mask 0x00000001 0x00000002
net.enc.in.ipsec_filter_mask 0x00000001 0x00000002
For the incoming path a value of 0x1 means ``before stripping off the outer header'' and 0x2 means ``after stripping off the outer header''.
For the outgoing path 0x1 means ``with only the inner header'' and 0x2 means ``with outer and inner headers''.
incoming path |------|
---- IPsec processing ---- (before) ---- (after) ----> | |
| Host |
<--- IPsec processing ---- (after) ----- (before) ---- | |
outgoing path |------|
Most people will want to run with the suggested defaults for ipsec_filter_mask and rely on the security policy database for the outer head-
ers.
EXAMPLES
To see the packets the processed via ipsec(4), adjust the sysctl(8) variables according to your need and run:
tcpdump -i enc0
SEE ALSO
tcpdump(1), bpf(4), ipf(4), ipfw(4), ipsec(4), pf(4), tcpdump(8)
BSD
November 28, 2007 BSD