11-16-2009
Hi Jim,
Thanks a lot
The problem here is the remote machine can be a server,router,switch etc.
I want to control all the stuff in the server itself.
So I want to maintain an access list file kind of stuff and what ever IP's are there in the file the user will be able to access only to those IP's.If the user tries to access any other IP apart from those in the list he should not be allowed.
So I am not sure if we require a script for this or can is it achievable thro configuration...
Thanks
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi
I need to access files from a specific folder of a Linux system from an another Linux System Remotely.
I know how to, Export a folder on One SCO System & can access the same by using Import via., NFS in the Sco Unix SVR4 System using the scoadmin utility.
Also, I know to use mount -t ... (2 Replies)
Discussion started by: S.Vishwanath
2 Replies
2. UNIX for Dummies Questions & Answers
Hi all,
I Installed Tomcat in an remote linux server (/usr/tomcat)and start service, using ./startup.sh (and tried with ./catalina.sh too).
//----------------------------------------------------------------//
# ./startup.sh
Using CATALINA_BASE: /usr/tomcat/apache-tomcat-6.0.16/
Using... (1 Reply)
Discussion started by: gothama
1 Replies
3. UNIX for Dummies Questions & Answers
I am new to UNIX administration. I have 10 years of Windows admin experience. I need to know how to give java developers the access they need to install and maintain the applications they are writing. In the Windows world I would make them a local admin on a test server but give them limited... (4 Replies)
Discussion started by: gsander
4 Replies
4. Emergency UNIX and Linux Support
Hi,
we have a big problem,
history:
we migrated our companies ftp and sftp-server, which were vsftp and openssh, to one server, software is called JSCAPE ftp server professional edition
for the first time everything was great, but after one or two months, our uploads hang, 0 byte files are... (11 Replies)
Discussion started by: funksen
11 Replies
5. IP Networking
hi i have linux server connected to internet through a switch/router. i have opened a port on the router and i am able to connect to the server if iptables is off. but when it is on i cant.
i want to create a rule in iptables so that it accepts packets coming from a particular datacard. it... (7 Replies)
Discussion started by: u.n.i.x
7 Replies
6. Solaris
Hi,
I am trying to access a NFS shared directory on Solaris 10 Server from a client which is RHEL 4 Server.
On the NFS Server, in /etc/dfs/, I added following line to dfstab file.
& then ran the following
On the client machine, while running the mount command, I am... (0 Replies)
Discussion started by: SunilB2011
0 Replies
7. Red Hat
Hi,
I am trying to access a NFS shared directory on Solaris 10 Server from a client which is RHEL 4 Server.
On the NFS Server, in /etc/dfs/, I added following line to dfstab file.
share -F nfs -o rw /var/share
& then ran the following
svcadm -v enable -r... (3 Replies)
Discussion started by: SunilB2011
3 Replies
8. Red Hat
I can access the linux server in my company from my desktop windows explorer. I guess samba is working.
Please see the images.
http://imageshack.us/a/img854/7106/9yvl.png
I have a few questions.
I don't have the linux account and I have never accessed it from shell. Is my windows login... (1 Reply)
Discussion started by: zhshqzyc
1 Replies
9. Solaris
What I am trying to do is install Remedy on a Solaris machine. However to install Remedy on Solaris, the server has to be able to connect to the oracle database on the Linux server? How can I accomplish this? (8 Replies)
Discussion started by: newborndba
8 Replies
10. Proxy Server
Dear all experts here,
:)
I would like to install a proxy server on Linux server to perform solely to control the access of Web server.
In this case, some of my vendor asked me to try Squid and I have installed it onto my Linux server.
I would like know how can I set the configuration to... (1 Reply)
Discussion started by: kwliew999
1 Replies
xhost(1X) xhost(1X)
NAME
xhost - server access control program for X
SYNOPSIS
xhost [[+-]name...]
OPTIONS
xhost accepts the following command line options described below. For security, the options that effect access control may only be run
from the "controlling host". For workstations, this is the same machine as the server. For X terminals, it is the login host. Prints a
usage message. The given name (the plus sign is optional) is added to the list allowed to connect to the X server. The name can be a host
name or a user name. The given name is removed from the list of allowed to connect to the server. The name can be a host name or a user
name. Existing connections are not broken, but new connection attempts will be denied. Note that the current machine is allowed to be
removed; however, further connections (including attempts to add it back) will not be permitted. Resetting the server (thereby breaking
all connections) is the only way to allow local connections again. Access is granted to everyone, even if they are not on the list (that
is, access control is turned off). Access is restricted to only those on the list (that is, access control is turned on). If no command
line arguments are given, a message indicating whether or not access control is currently enabled is printed, followed by the list of those
allowed to connect. This is the only option that may be used from machines other than the controlling host.
DESCRIPTION
The xhost program is used to add and delete host names or user names to the list allowed to make connections to the X server. In the case
of hosts, this provides a rudimentary form of privacy control and security. It is only sufficient for a workstation (single user) environ-
ment, although it does limit the worst abuses. Environments which require more sophisticated measures should implement the user-based
mechanism, or use the hooks in the protocol for passing other authentication data to the server.
Hostnames that are followed by two colons (::) are used in checking DECnet connections; all other hostnames are used for TCP/IP connec-
tions.
NAMES
A complete name has the syntax "family:name" where the families are as follows: Internet host DECnet host Secure RPC network name Kerberos
V5 principal contains only one name, the empty string.
The family is case insensitive. The format of the name varies with the family. For backward compatibility with pre-R6 xhost, names that
contain an at-sign (@) are assumed to be in the nis family. Otherwise, the inet family is assumed.
DIAGNOSTICS
For each name added to the access control list, a line of the form "name being added to access control list" is printed. For each name
removed from the access control list, a line of the form "name being removed from access control list" is printed.
ENVIRONMENT
to get the default host and display to use.
FILES
/etc/X*.hosts
BUGS
You cannot specify a display on the command line because -display is a valid command line argument (indicating that you want to remove the
machine named "display" from the access list).
The X server stores network addresses, not host names. This is not really a bug. If somehow you change a host's network address while the
server is still running, xhost must be used to add the new address and/or remove the old address.
SEE ALSO
X(1X), Xsecurity(1X), Xdec(1X), xdm(1X)
AUTHORS
Bob Scheifler, MIT Laboratory for Computer Science,
Jim Gettys, MIT Project Athena (DEC).
xhost(1X)