07-22-2009
Setting up private and public ip on same machine.
Hi,
We have a ftp server which is running on public ip and out side of firewall.
Users out side of our network and users of our local network both using the same public ip and doing upload and downloading.
Last few days we are facing bandwidth problem as internal network users increased.
We want setup ftp server with 2 ips as follows.
Internal users will use private IP
users out side network will use public Ip.
Is there any procedure available to configure same machine with private and public ips.
please help me sort out this issue.
Thanks in advance.
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Firstly, i apologise if i have posted in a wrong section of the forum. Please let me know which is the correct section my post should go to.
I have to SCP a file from one server(server A) to another (server B). I read around that a secure way is to use public and private keys.
Assuming my... (2 Replies)
Discussion started by: new2ss
2 Replies
2. UNIX for Dummies Questions & Answers
Hello,
I have an issue with an outside party trying to deliver a file to our server via SFTP.
I have setup the .ssh directory under the home directory for the user account that is being used and setup the authorized_keys file with correct permissons etc for .ssh directory and file.
We... (2 Replies)
Discussion started by: richo king
2 Replies
3. UNIX for Dummies Questions & Answers
Hi everyone,
I have a quick/newb question:
I know that a public key is used to encrypt data and a private key is used to decrypt data but who keeps the public/private keys??
Does the Web Server hold both?
Does the Web Server have the public key and does the client have the private key? ... (3 Replies)
Discussion started by: tical00
3 Replies
4. Shell Programming and Scripting
Hi All,
I have a query....say on server A, I have generated the Private and Public keys and shared the public key with server B.
Now i can surelyconnect(without password) from server A to server B.....
but can i similarly connect from server B to server A as well
Regards (1 Reply)
Discussion started by: Arpit Narula
1 Replies
5. Shell Programming and Scripting
hi guys , i have few files i have to do sftp, the public and private key work like a magic , no problem at all
the syntax is as below
sftp -0 identityfile=~/ure/blsl/loc2/.ssh/id_rsa_ssh1 ssh1@remote >log_dir/file.timestamp<<end
lcd folder
cd folder
put *
quit
end
================
my... (3 Replies)
Discussion started by: rockymayavia
3 Replies
6. Virtualization and Cloud Computing
Hi all,
Private, Public and Hybrid Clouds
I'm now testing OpenStack;
Home OpenStack Open Source Cloud Computing Software
-Infrastructure as a Service (IaaS)
-Platform as a Service (PaaS)
-Software as a Service (SaaS)
It is an Open Source software.
I'm interested to know whether... (0 Replies)
Discussion started by: satimis
0 Replies
7. UNIX for Dummies Questions & Answers
Hi,
What tool is used to generate public and private keys for SCP?
Do you have an example script that generates these keys, puts them in files and then another example script that references them from SCP?
Thanks, (9 Replies)
Discussion started by: Astrocloud
9 Replies
8. Shell Programming and Scripting
Hi All,
I have a requirement where i need to check if an rsa public key corresponds to a private key and hence return success or failure. Currently i am using the command
diff <( ssh-keygen -y -e -f "$PRIVKEY" ) <( ssh-keygen -y -e -f "$PUBLICKEY" )
and its solving my purpose. This is in... (1 Reply)
Discussion started by: mritusmoi
1 Replies
9. UNIX for Advanced & Expert Users
Hi,
we have private and public key, encrypt file using public and want to decrypt using private key. can you please advise below commands are correct or other remedy if unix have?
encrypt -a arcfour -k publickey.asc -i TESTFILE.csv -o TESTFILE00.csv
decrypt -a arcfour -k privatekey.asc... (2 Replies)
Discussion started by: rizwan.shaukat
2 Replies
10. UNIX for Advanced & Expert Users
Hi,
i generate private and public key using below command.
ssh-keygen -t rsa
can you please share command for encryption and decryption file using above generated keys.
Regards, (4 Replies)
Discussion started by: rizwan.shaukat
4 Replies
LEARN ABOUT ULTRIX
ruptime
ruptime(1c) ruptime(1c)
Name
ruptime - show host status of local machines
Syntax
ruptime [ options ] [ machinename ]
Description
The command gives a status line like for each machine on the local network. If a machinename is given, the status of only the named
machine is given. These status lines are formed from packets broadcast by each host on the network once a minute.
Machines for which no status report has been received for 5 minutes are shown as being down.
Options
-a Users idle an hour or more are not counted unless this option is specified.
-d Display only those hosts that are considered down.
-l Sort the status list by load average. If more than one sort option is given, uses the last one.
-r Show only hosts that are up and running.
-t Sort the status list by uptime. If more than one sort option is given, uses the last one.
-u Sort the status list by number of users. If more than one sort option is given, uses the last one.
-nn Show only those hosts with nn or more users.
Restrictions
Because the daemon sends its information in broadcast packets it generates a large amount of network traffic. On large networks the extra
traffic may be objectionable. Therefore, the daemon is disabled by default. To make use of the daemon for both the local and remote
hosts, remove the comment symbols (#) from in front of the lines specifying in the file.
If the daemon is not running on a remote machine, the machine may incorrectly appear to be down when you use the command to determine its
status. See the reference page for more information.
If a system has more than 40 users logged in at once, the number of users displayed by the command is incorrect. Users who login to a
machine after that point fail to increment the user count that appears in the output of the command. This is due to the maximum size limit
of an Ethernet packet, which is 1500 bytes, and the fact that the daemon must broadcast its information in a single packet.
Files
/usr/spool/rwho/whod.* Information about other machines
See Also
rwho(1c), rwhod(8c)
ruptime(1c)