08-21-2009
Hi all,
It seems that the problem is with cisco_ipsec driver, might be the kernel is not supporting the driver or not sure whats missing. Anyway I found a different solution, I used vpnc and it worked.. [
]
Thanks...
9 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
I have set up a linux (red hat 9) box as my main internet router. I am also running a DNS server on it. What are the rules i have to implement to allow DNS queries through the firewall from outside so that the outside world can see my domains? (1 Reply)
Discussion started by: frankkahle
1 Replies
2. IP Networking
Hi All.
can anybody help me out in knowing the technical details of Firewall Policy Scheduler
:confused:
Thanks (1 Reply)
Discussion started by: ashokmeti
1 Replies
3. UNIX for Dummies Questions & Answers
# date;ps -ef|grep confused.
Tue Dec 13 11:11:22 EST 2005
root 12847 12733 0 11:21 pts/83 00:00:00 grep confused.
I am really confused on why my ps and my date command are returning different values for the time. Anyone know how to resolve this?
Running FC2, if it helps. (14 Replies)
Discussion started by: r0sc0
14 Replies
4. Shell Programming and Scripting
Hi,
I have a doubt when searching files for the existence of a particular key.
I have a property file has data with key and value pair like below and i call it as property file.ini
here are the contents in File: popertyfile.ini
location.property=2
agent.method=begin
newkey=23
... (2 Replies)
Discussion started by: raghu.amilineni
2 Replies
5. Solaris
I am a complete UNIX neophyte with the unenviable task of trying to pseudo manage two SUN boxes with an unknown past. I was not responsible for setting them up, anything that was done on them previously, and have no means of figuring out anything that was done to them. So far I have changed the... (4 Replies)
Discussion started by: tawnos42
4 Replies
6. IP Networking
I've experienced this same issue with both the Endian Firewall Appliance and a Vyatta Firewall Appliance. Conversely, it works with a Draytek Firewall/Router.
I am trying to forward port 80 traffic to my internal web server which is located on the /24 subnet. I have an external static IP which... (0 Replies)
Discussion started by: mboudro
0 Replies
7. HP-UX
Hi, anyone can give me the answer about Fatal: HP-UX error exa_parm mismatch? We are running HP-UX ver. 9.0.1 also running some OCP software along with Licensed dongle. Every three to four hour (some time it will last up to 24 hour) the OCP software shutdown unexpectedly (0 Replies)
Discussion started by: monukwt
0 Replies
8. Shell Programming and Scripting
Hi,
I have a requirement like below.
client is sending the .txt filles.In that file we have 10 records but when I execute the below command it is showing 9 records.
klena20> wc -l sample_file.txt|awk '{print $1}'
It is showing the output as 9
But in a file records are 10. I found... (7 Replies)
Discussion started by: kirankumar
7 Replies
9. Linux
I' m playng a little retrocomputing.
I have setup a virtual machine with SCO unix(3.2v4.2) on qemu
The machine start, the novell2000 card(ne2k_pci,ne2k_isa) unfortunately not,probably driver issue.
So I try the slirp with this procedure
On SCO
netconfig
add chain..sl ..etc
On... (2 Replies)
Discussion started by: Linusolaradm1
2 Replies
LEARN ABOUT REDHAT
profiles
profiles(1) profiles(1)
NAME
profiles - print execution profiles for a user
SYNOPSIS
profiles [-l] [ user ...]
The profiles command prints on standard output the names of the execution profiles that have been assigned to you or to the optionally-
specified user or role name. Profiles are a bundling mechanism used to enumerate the commands and authorizations needed to perform a spe-
cific function. Along with each listed executable are the process attributes, such as the effective user and group IDs, with which the
process runs when started by a privileged command interpreter. The profile shells are pfcsh, pfksh, and pfexec. See the pfexec(1) man page.
Profiles can contain other profiles defined in prof_attr(4).
Multiple profiles can be combined to construct the appropriate access control. When profiles are assigned, the authorizations are added to
the existing set. If the same command appears in multiple profiles, the first occurrence, as determined by the ordering of the profiles, is
used for process-attribute settings. For convenience, a wild card can be specified to match all commands.
When profiles are interpreted, the profile list is loaded from user_attr(4). If any default profile is defined in /etc/security/policy.conf
(see policy.conf(4)), the list of default profiles are added to the list loaded from user_attr(4). Matching entries in prof_attr(4) provide
the authorizations list, and matching entries in exec_attr(4) provide the commands list.
The following options are supported:
-l Lists the commands in each profile followed by the special process attributes such as user and group IDs.
Example 1: Sample Output
The output of the profiles command has the following form:
example% profiles tester01 tester02
tester01 : Audit Management, All Commands
tester02 : Device Management, All Commands
example%
Example 2: Using the list Option
example% profiles -l tester01 tester02
tester01 :
Audit Management:
/usr/sbin/audit euid=root
/usr/sbin/auditconfig euid=root egid=sys
All Commands:
*
tester02 :
Device Management:
/usr/bin/allocate: euid=root
/usr/bin/deallocate: euid=root
All Commands
*
example%
The following exit values are returned:
0 Successful completion.
1 An error occurred.
/etc/security/exec_attr
/etc/security/prof_attr
/etc/user_attr
/etc/security/policy.conf
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Availability |SUNWcsu |
+-----------------------------+-----------------------------+
auths(1), pfexec(1), roles(1), getprofattr(3SECDB), exec_attr(4), policy.conf(4), prof_attr(4), user_attr(4), attributes(5)
11 Feb 2000 profiles(1)