11-16-2009
Hi Jim,
Thanks a lot
The problem here is the remote machine can be a server,router,switch etc.
I want to control all the stuff in the server itself.
So I want to maintain an access list file kind of stuff and what ever IP's are there in the file the user will be able to access only to those IP's.If the user tries to access any other IP apart from those in the list he should not be allowed.
So I am not sure if we require a script for this or can is it achievable thro configuration...
Thanks
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi
I need to access files from a specific folder of a Linux system from an another Linux System Remotely.
I know how to, Export a folder on One SCO System & can access the same by using Import via., NFS in the Sco Unix SVR4 System using the scoadmin utility.
Also, I know to use mount -t ... (2 Replies)
Discussion started by: S.Vishwanath
2 Replies
2. UNIX for Dummies Questions & Answers
Hi all,
I Installed Tomcat in an remote linux server (/usr/tomcat)and start service, using ./startup.sh (and tried with ./catalina.sh too).
//----------------------------------------------------------------//
# ./startup.sh
Using CATALINA_BASE: /usr/tomcat/apache-tomcat-6.0.16/
Using... (1 Reply)
Discussion started by: gothama
1 Replies
3. UNIX for Dummies Questions & Answers
I am new to UNIX administration. I have 10 years of Windows admin experience. I need to know how to give java developers the access they need to install and maintain the applications they are writing. In the Windows world I would make them a local admin on a test server but give them limited... (4 Replies)
Discussion started by: gsander
4 Replies
4. Emergency UNIX and Linux Support
Hi,
we have a big problem,
history:
we migrated our companies ftp and sftp-server, which were vsftp and openssh, to one server, software is called JSCAPE ftp server professional edition
for the first time everything was great, but after one or two months, our uploads hang, 0 byte files are... (11 Replies)
Discussion started by: funksen
11 Replies
5. IP Networking
hi i have linux server connected to internet through a switch/router. i have opened a port on the router and i am able to connect to the server if iptables is off. but when it is on i cant.
i want to create a rule in iptables so that it accepts packets coming from a particular datacard. it... (7 Replies)
Discussion started by: u.n.i.x
7 Replies
6. Solaris
Hi,
I am trying to access a NFS shared directory on Solaris 10 Server from a client which is RHEL 4 Server.
On the NFS Server, in /etc/dfs/, I added following line to dfstab file.
& then ran the following
On the client machine, while running the mount command, I am... (0 Replies)
Discussion started by: SunilB2011
0 Replies
7. Red Hat
Hi,
I am trying to access a NFS shared directory on Solaris 10 Server from a client which is RHEL 4 Server.
On the NFS Server, in /etc/dfs/, I added following line to dfstab file.
share -F nfs -o rw /var/share
& then ran the following
svcadm -v enable -r... (3 Replies)
Discussion started by: SunilB2011
3 Replies
8. Red Hat
I can access the linux server in my company from my desktop windows explorer. I guess samba is working.
Please see the images.
http://imageshack.us/a/img854/7106/9yvl.png
I have a few questions.
I don't have the linux account and I have never accessed it from shell. Is my windows login... (1 Reply)
Discussion started by: zhshqzyc
1 Replies
9. Solaris
What I am trying to do is install Remedy on a Solaris machine. However to install Remedy on Solaris, the server has to be able to connect to the oracle database on the Linux server? How can I accomplish this? (8 Replies)
Discussion started by: newborndba
8 Replies
10. Proxy Server
Dear all experts here,
:)
I would like to install a proxy server on Linux server to perform solely to control the access of Web server.
In this case, some of my vendor asked me to try Squid and I have installed it onto my Linux server.
I would like know how can I set the configuration to... (1 Reply)
Discussion started by: kwliew999
1 Replies
XHOST(1) General Commands Manual XHOST(1)
NAME
xhost - server access control program for X
SYNOPSIS
xhost [[+-]name ...]
DESCRIPTION
The xhost program is used to add and delete host names or user names to the list allowed to make connections to the X server. In the case
of hosts, this provides a rudimentary form of privacy control and security. It is only sufficient for a workstation (single user) environ-
ment, although it does limit the worst abuses. Environments which require more sophisticated measures should implement the user-based
mechanism or use the hooks in the protocol for passing other authentication data to the server.
OPTIONS
Xhost accepts the following command line options described below. For security, the options that effect access control may only be run
from the "controlling host". For workstations, this is the same machine as the server. For X terminals, it is the login host.
-help Prints a usage message.
[+]name The given name (the plus sign is optional) is added to the list allowed to connect to the X server. The name can be a host name or
a user name.
-name The given name is removed from the list of allowed to connect to the server. The name can be a host name or a user name. Existing
connections are not broken, but new connection attempts will be denied. Note that the current machine is allowed to be removed;
however, further connections (including attempts to add it back) will not be permitted. Resetting the server (thereby breaking all
connections) is the only way to allow local connections again.
+ Access is granted to everyone, even if they aren't on the list (i.e., access control is turned off).
- Access is restricted to only those on the list (i.e., access control is turned on).
nothing If no command line arguments are given, a message indicating whether or not access control is currently enabled is printed, fol-
lowed by the list of those allowed to connect. This is the only option that may be used from machines other than the controlling
host.
NAMES
A complete name has the syntax ``family:name'' where the families are as follows:
inet Internet host
dnet DECnet host
nis Secure RPC network name
krb Kerberos V5 principal
local contains only one name, the empty string
The family is case insensitive. The format of the name varies with the family.
When Secure RPC is being used, the network independent netname (e.g., "nis:unix.uid@domainname") can be specified, or a local user can be
specified with just the username and a trailing at-sign (e.g., "nis:pat@").
For backward compatibility with pre-R6 xhost, names that contain an at-sign (@) are assumed to be in the nis family. Otherwise the inet
family is assumed.
DIAGNOSTICS
For each name added to the access control list, a line of the form "name being added to access control list" is printed. For each name
removed from the access control list, a line of the form "name being removed from access control list" is printed.
FILES
/etc/X*.hosts
SEE ALSO
X(7x), Xsecurity(7x), Xserver(1), xdm(1)
ENVIRONMENT
DISPLAY to get the default host and display to use.
BUGS
You can't specify a display on the command line because -display is a valid command line argument (indicating that you want to remove the
machine named ``display'' from the access list).
The X server stores network addresses, not host names. This is not really a bug. If somehow you change a host's network address while the
server is still running, xhost must be used to add the new address and/or remove the old address.
AUTHORS
Bob Scheifler, MIT Laboratory for Computer Science,
Jim Gettys, MIT Project Athena (DEC).
X Version 11 Release 6.6 XHOST(1)