Sponsored Content
Full Discussion: Disable the SNMP Service
Operating Systems SCO Disable the SNMP Service Post 302279795 by jpradley on Friday 23rd of January 2009 08:22:46 PM
Old 01-23-2009
The SNMP daemon is launched at boot time by /etc/rc2.d/S85tcp.

So just fire up 'vi /etc/tcp' and comment our the relevant lines.

(You could have found this out with 'grep snmp /etc/rc2.d/*i'.)
 

10 More Discussions You Might Find Interesting

1. Linux

Disable connection logging for a specfic service (/var/log/secure)

Hello, is there a way to disable connection logging for a specific service? Or eventually to disable /var/log/secure in general? Closed. Double post (0 Replies)
Discussion started by: TehOne
0 Replies

2. UNIX for Advanced & Expert Users

Disable connection logging for a specfic service (/var/log/secure)

Hello, is there a way to disable connection logging for a specific service? Or eventually to disable /var/log/secure in general? (2 Replies)
Discussion started by: TehOne
2 Replies

3. AIX

SNMP service

dear how can i disable the SNMP service in AIX 6.1 . (2 Replies)
Discussion started by: thecobra151
2 Replies

4. HP-UX

FTP service Enable/Disable

hi everybody, I can easily enable /disable the FTP service from SAM, how can I do this via command line? using inetd? how? cheers, messi (1 Reply)
Discussion started by: messi777
1 Replies

5. UNIX for Dummies Questions & Answers

System snmp service is unavailable

Hello, am working on a suse linux system and trying to connect the server to the monitoring system we use. On checking the logs, i see that the snmp service is unavailable and would appreciate any help on how to fix this. snmpd stop - done snmpd start - done snmpd status - unused (instead... (16 Replies)
Discussion started by: mena
16 Replies

6. Solaris

Disable SNMP v1/2 authentification and use SNMPv3 authentification

Hello everyone, Can anyone help me to disable SNMP v1/2 authentification on Solaris 10 and use SNMP v3 authentification ? I have SNMPv3 installed on my Solaris but the tool we use to scan vulnerabilities still show that there is a problem whith authentification version. Does it mean that... (1 Reply)
Discussion started by: adilyos
1 Replies

7. UNIX for Dummies Questions & Answers

Need to transfer all kernel logs (var/log/messages) to the snmp listener as snmp trap

i am working with embedded system -Dell DCS management sub system. my question is as below: currently we are using linux kernel 2.6.30 build and we have a kernel logs stored to the /var/log/messages path. now we have to transfer all this logs to the specified SNMP target as a part of SNMP... (4 Replies)
Discussion started by: vipul_prajapati
4 Replies

8. Solaris

Disable or remove SNMPv1/2c authentication and SNMP version-3

Hi; How can I disable or remove SNMPv1/2c authentication. I would like to use SNMP version 3 authentication. bash-3.00# uname -a SunOS SOL9229 5.10 Generic_142910-17 i86pc i386 i86pc bash-3.00# (1 Reply)
Discussion started by: gc_sw
1 Replies

9. Solaris

Svcadm disable in global zone affects same service in ngz

I have a service that resides in both the global and non global zones. When I disable the service in the global zone, a svcs -p on that service shows the process name and ID of the svcadmd for the non global. An svcs -l on the service in the global shows online with an intended state of disabled.... (0 Replies)
Discussion started by: Cbrown31
0 Replies

10. Solaris

Cannot get sma (net-snmp) service to start.

Hey everyone, so I recently installed sma and disabled snmpdx for system monitoring in Solarwinds on 7 Oracle servers running Solaris 10. It was running just fine until we had to shutdown all systems and power back up (hurricane). Since then I cannot get the sma service to start, it goes into... (4 Replies)
Discussion started by: Zeus18
4 Replies
init.d(4)                                                                                                                                init.d(4)

NAME
init.d - initialization and termination scripts for changing init states SYNOPSIS
/etc/init.d /etc/init.d is a directory containing initialization and termination scripts for changing init states. These scripts are linked when appro- priate to files in the rc?.d directories, where `?' is a single character corresponding to the init state. See init(1M) for definitions of the states. The service management facility (see smf(5)) is the preferred mechanism for service initiation and termination. The init.d and rc?.d direc- tories are obsolete, and are provided for compatibility purposes only. Applications launched from these directories by svc.startd(1M) are incomplete services, and will not be restarted on failure. File names in rc?.d directories are of the form [SK]nn<init.d filename>, where S means start this job, K means kill this job, and nn is the relative sequence number for killing or starting the job. When entering a state (init S,0,2,3,etc.) the rc[S0-6] script executes those scripts in /etc/rc[S0-6].d that are prefixed with K followed by those scripts prefixed with S. When executing each script in one of the /etc/rc[S0-6] directories, the /sbin/rc[S0-6] script passes a single argument. It passes the argument 'stop' for scripts prefixed with K and the argument 'start' for scripts prefixed with S. There is no harm in applying the same sequence number to multiple scripts. In this case the order of execution is deterministic but unspecified. Guidelines for selecting sequence numbers are provided in README files located in the directory associated with that target state. For example, /etc/rc[S0-6].d/README. Absence of a README file indicates that there are currently no established guidelines. Do not put /etc/init.d in your $PATH. Having this directory in your $PATH can cause unexpected behavior. The programs in /etc/init.d are associated with init state changes and, under normal circumstances, are not intended to be invoked from a command line. Example 1: Example of /sbin/rc2. When changing to init state 2 (multi-user mode, network resources not exported), /sbin/rc2 is initiated by the svc.startd(1M) process. The following steps are performed by /sbin/rc2. 1. In the directory /etc/rc2.d are files used to stop processes that should not be running in state 2. The filenames are prefixed with K. Each K file in the directory is executed (by /sbin/rc2) in alphanumeric order when the system enters init state 2. See example below. 2. Also in the rc2.d directory are files used to start processes that should be running in state 2. As in Step 1, each S file is executed. Assume the file /etc/init.d/netdaemon is a script that will initiate networking daemons when given the argument 'start', and will terminate the daemons if given the argument 'stop'. It is linked to /etc/rc2.d/S68netdaemon, and to /etc/rc0.d/K67netdaemon. The file is executed by /etc/rc2.d/S68netdaemon start when init state 2 is entered and by /etc/rc0.d/K67netdaemon stop when shutting the system down. svcs(1), init(1M), svc.startd(1M), svccfg(1M), smf(5) Solaris now provides an expanded mechanism, which includes automated restart, for applications historically started via the init script mechanism. The Service Management Facility (introduced in smf(5)) is the preferred delivery mechanism for persistently running applica- tions. Existing init.d scripts will, however, continue to be executed according to the rules in this manual page. The details of execution in relation to managed services are available in svc.startd(1M). On earlier Solaris releases, a script named with a suffix of '.sh' would be sourced, allowing scripts to modify the environment of other scripts executed later. This behavior is no longer supported; for altering the environment in which services are run, see the setenv sub- command in svccfg(1M). /sbin/rc2 has references to the obsolescent rc.d directory. These references are for compatibility with old INSTALL scripts. New INSTALL scripts should use the init.d directory for related executables. The same is true for the shutdown.d directory. 17 Aug 2005 init.d(4)
All times are GMT -4. The time now is 04:16 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy