02-10-2010
actually my prime importance is to authenticate each and every connection made to my server outside my private lan i.e. from internet.
---------- Post updated 02-10-10 at 10:12 AM ---------- Previous update was 02-09-10 at 04:22 PM ----------
i am posting again my question in more detail again
i have a linux enterprise server running oracle apps and other services. i have opened a port in the router in such a way that i am able to access my server remotely from internet.
now i want a package or settings that would grant access to people who i want by giving them additional password and usernames as i cannot track their ip`s as they keep changing dynamically as they log in from datacards nor i can use mac based configuration of firewall.
so now i need a system that would be common for all the users using any software like putty or toad or any package to acess my server. it should use basically some authentication technique.
i thought of using private and public key but it will work only with putty and not with toad..
i have heared about freeradius but i am not able to use it as i am not getting any proper notes or documentation which i can follow...
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
I have already compiled the kernel and configured it to run as a firewall. My computer has 2 NICs and is on two seperate networks. I can ping both networks from my computer, but workstations on one network can not ping workstations on the other.
What Scripts or commands do I need to install ? (2 Replies)
Discussion started by: Deuce
2 Replies
2. IP Networking
Hi
does anybody know how we can add more than one ip for NIC(in Redhat Linux 7.2)?
i usually do it by using this command
ifconfig eth0 add <ip addresss> netmask <..............> up
or ;
ip address add 192.168.20.1/24 dev eth0
or
adding it manually to file in... (12 Replies)
Discussion started by: hessam
12 Replies
3. Cybersecurity
Does anyone know where I can find some Documentation on building a linux firewall. (4 Replies)
Discussion started by: aojmoj
4 Replies
4. IP Networking
ON A LINUX NETWORK, HOW DO I ASSIGN IP ADDRESSES TO OTHER TERMINALS AND AFTER THAT HOW I CAN DENY/GRANT ACCESS TO TERMINALS ON A LAN TO MY TERMINAL.PLEASE SPECIFY THE EXACT COMMANDS.kINDLY HELP ME (3 Replies)
Discussion started by: ameya_shaligram
3 Replies
5. Shell Programming and Scripting
could anybody please tell me the best fire wall for linux . (3 Replies)
Discussion started by: Raom
3 Replies
6. UNIX for Advanced & Expert Users
I have set up a linux (red hat 9) box as my main internet router. I am also running a DNS server on it. What are the rules i have to implement to allow DNS queries through the firewall from outside so that the outside world can see my domains? (1 Reply)
Discussion started by: frankkahle
1 Replies
7. Shell Programming and Scripting
Hi,
I want to configure 2-gateways in Linux .
Please tell me how I can achieve this. I am accesing 2-internet
connection through these 2-gateways. So I am looking that
if 1-gets down then also other one is working.
Regards
JAGDISH (1 Reply)
Discussion started by: jagdish.machhi@
1 Replies
8. Infrastructure Monitoring
I am trying to enabling SNMP access and trap forwarding for Linux(RHEL5) using following official url from IBM.
http://publib.boulder.ibm.com/infocenter/eserver/v1r2/index.jsp?topic=/diricinfo/fqm0_t_enabling_snmp_access_and_trap_forwarding_for_linux.html
In my system, snmp and snmplibs are... (1 Reply)
Discussion started by: SiddhV
1 Replies
9. Linux
I' m playng a little retrocomputing.
I have setup a virtual machine with SCO unix(3.2v4.2) on qemu
The machine start, the novell2000 card(ne2k_pci,ne2k_isa) unfortunately not,probably driver issue.
So I try the slirp with this procedure
On SCO
netconfig
add chain..sl ..etc
On... (2 Replies)
Discussion started by: Linusolaradm1
2 Replies
rndc(1M) System Administration Commands rndc(1M)
NAME
rndc - name server control utility
SYNOPSIS
rndc [-V] [-c config-file] [-k key-file] [-s server] [-p port] [-y key_id] command
DESCRIPTION
The rndc utility controls the operation of a name server. It supersedes the ndc utility that was provided in previous BIND releases. If
rndc is invoked with no command line options or arguments, it prints a short summary of the supported commands and the available options
and their arguments.
The rndc utility communicates with the name server over a TCP connection, sending commands authenticated with digital signatures. The only
supported authentication algorithm in the current versions of rndc and named(1M) is HMAC-MD5, which uses a shared secret on each end of the
connection. This algorithm provides TSIG-style authentication for the command request and the name server's response. All commands sent
over the channel must be signed by a key_id known to the server.
The rndc utility reads a configuration file to determine how to contact the name server and decide what algorithm and key it should use.
OPTIONS
The following options are supported:
-c config-file Use config-file as the configuration file instead of the default /etc/rndc.conf.
-k key-file Use key-file as the key file instead of the default, /etc/rndc.key. The key in /etc/rndc.key is used to authenticate com-
mands sent to the server if the config-file does not exist.
-s server The server argument is the name or address of the server that matches a server statement in the configuration file for
rndc. If no server is supplied on the command line, the host named by the default-server clause in the option statement of
the configuration file is used.
-p port Send commands to TCP port port instead of BIND 9's default control channel port, 953.
-V Enable verbose logging.
-y keyid Use the key keyid from the configuration file. The keyid argument must be known by named with the same algorithm and secret
string for control message validation to succeed. If no keyid is specified, rndc will first look for a key clause in the
server statement of the server being used, or if no server statement is present for that host, then the default-key clause
of the options statement. The configuration file contains shared secrets that are used to send authenticated control com-
mands to name servers. It should therefore not have general read or write access.
For the complete set of commands supported by rndc, see the BIND 9 Administrator Reference Manual or run rndc without arguments to see its
help message.
LIMITATIONS
The rndc utility does not support all the commands of the BIND 8 ndc utility.
There is no way to provide the shared secret for a key_id without using the configuration file.
Several error messages could be clearer.
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
|Availability |SUNWbind9 |
|Interface Stability |External |
+-----------------------------+-----------------------------+
SEE ALSO
named(1M), named.conf(4), rndc.conf(4), attributes(5)
BIND 9 Administrator Reference Manual
NOTES
Source for BIND9 is available in the SUNWbind9S package.
SunOS 5.10 15 Dec 2004 rndc(1M)