11-26-2008
End-to-End Network Access Analysis
HPL-2008-28 (R.1)
End-to-End Network Access Analysis - Bandhakavi, Sruthi; Bhatt, Sandeep; Okita, Cat; Rao, Prasad
Keyword(s): No keywords available.
Abstract: Network security administrators cannot always accurately tell which end-to-end accesses are permitted within their network, and which ones are not. The problem is that every access is determined by the configurations of multiple, separately administered, components along a path. Furthermore, configu ...
Full Report
More...
8 More Discussions You Might Find Interesting
1. IP Networking
following is the output from traceroute
traceroute 10.1.11.6
traceroute to 10.1.11.6 (10.1.11.6), 30 hops max, 38 byte packets
1 10.129.1.250 (10.129.1.250) 20.618 ms 0.335 ms 0.271 ms
2 192.0.20.1 (192.0.20.1) 0.694 ms 4.660 ms 0.422 ms
3 192.0.40.1 (192.0.40.1) 0.972 ms 1.917 ms 0.873 ms... (4 Replies)
Discussion started by: yogesh_powar
4 Replies
2. Linux
Hi,
we have running 8 box sles 9 cluster and on an nfs filesystem we have the problem which is grepped from /var/log/messages.
Jun 8 13:40:46 qnclpx02 kernel: attempt to access beyond end of device
Jun 8 13:40:46 qnclpx02 kernel: sdat: rw=0, want=8894615912, limit=314572800
Is there... (1 Reply)
Discussion started by: ortsvorsteher
1 Replies
3. Shell Programming and Scripting
Hi guys i am new to shell scripting. I wrote this script that simply searches a column value of file1 from file2.
please look at the code below:
awk '
FILENAME==ARGV { file_1_data=$0; next }
FILENAME==ARGV { file_2_data=substr($3,1,12); next }
END { ... (5 Replies)
Discussion started by: fahadaizaz
5 Replies
4. IP Networking
I am looking for a utility (Windows/Linux/Mac) that will allow me to run some test packets across a customer's network (between their client & my server) to identify a list of (or at least a guess of) all protocols and significant network settings that could adversely effect my systems performance... (1 Reply)
Discussion started by: jjinno
1 Replies
5. Shell Programming and Scripting
Hi,
I would like to learn shell scripting in UNIX. Can any one please give me the support and share the information/documents with me.
If any documents please post it to aswanikumar_nimmagadda@yahoo.co.in
Thanks in advance...!!! (3 Replies)
Discussion started by: aswani_n
3 Replies
6. Shell Programming and Scripting
Hi,
I want to add \n as a EOF at the end of file if it does't exist in a single command. How to do this?
when I use command
echo "1\n" > a.txt
and
od -c a.txt
0000000 1 \n \n
0000003
How does it differentiate \n and eof in this case?
Regards,
Venkat (1 Reply)
Discussion started by: svenkatareddy
1 Replies
7. Shell Programming and Scripting
Hi
I have written a script .The script runs properly if i write sql queries .But if i use PLSQL commands of BEGIN if end if , end ,then on running the script the comamds are getting printed on the prompt .
Ex :temp.sql
After connecting to the databse at the sql prompt i type... (1 Reply)
Discussion started by: isha_1
1 Replies
8. Solaris
Hi all,
I have written the following program and run on both T5440 and T5220 on same OS version. I found that T5540 server takes more time than T5220. Please find below the details.
test1.cpp
#include <iostream>
#include <pthread.h>
using namespace std;
#define NUM_OF_THREADS 20... (17 Replies)
Discussion started by: sanjay_singh85
17 Replies
LEARN ABOUT POSIX
securenets
securenets(4) File Formats securenets(4)
NAME
securenets - configuration file for NIS security
SYNOPSIS
/var/yp/securenets
DESCRIPTION
The /var/yp/securenets file defines the networks or hosts which are allowed access to information by the Network Information Service
("NIS").
The format of the file is as follows:
o Lines beginning with the ``#'' character are treated as comments.
o Otherwise, each line contains two fields separated by white space. The first field is a netmask, the second a network.
o The netmask field may be either 255.255.255.255 (IPv4), ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff (IPv6) , or the string ``host'' indi-
cating that the second field is a specific host to be allowed access.
Both ypserv(1M) and ypxfrd(1M) use the /var/yp/securenets file. The file is read when the ypserv(1M) and ypxfrd(1M) daemons begin. If
/var/yp/securenets is present, ypserv(1M) and ypxfrd(1M) respond only to IP addresses in the range given. In order for a change in the
/var/yp/securenets file to take effect, you must kill and restart any active daemons using ypstop(1M) and ypstart(1M).
An important thing to note for all the examples below is that the server must be allowed to access itself. You accomplish this either by
the server being part of a subnet that is allowed to access the server, or by adding an individual entry, as the following:
hosts 127.0.0.1
EXAMPLES
Example 1: Access for Individual Entries
If individual machines are to be give access, the entry could be:
255.255.255.255 192.9.1.20
or
host 192.0.1.20
Example 2: Access for a Class C Network
If access is to be given to an entire class C network, the entry could be:
255.255.255.0 192.9.1.0
Example 3: Access for a Class B Network
The entry for access to a class B network could be:
255.255.0.0 9.9.0.0
Example 4: Access for an Invidual IPv6 Address
Similarly, to allow access for an individual IPv6 address:
ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff fec0::111:abba:ace0:fba5e:1
or
host fec0::111:abba:ace0:fba5e:1
Example 5: Access for all IPv6 Addresses Starting with fe80
To allow access for all IPv6 addresses starting with fe80:
ffff:: fe80::
FILES
/var/yp/securenets Configuration file for
NIS security.
SEE ALSO
ypserv(1M), ypstart(1M), ypstop(1M), ypxfrd(1M)
NOTES
The Network Information Service (NIS) was formerly known as Sun Yellow Pages (YP). The functionality of the two remains the same; only the
name has changed. The name Yellow Pages is a registered trademark in the United Kingdom of British Telecommunications plc, and may not be
used without permission.
SunOS 5.10 26 Apr 1999 securenets(4)