Sponsored Content
Operating Systems Solaris How to assign static ip address to the server having solaris 10. i.e. nge0 Post 302423898 by pankajd on Sunday 23rd of May 2010 06:28:12 AM
Old 05-23-2010
How to assign static ip address to the server having solaris 10. i.e. nge0

hi,
how to assign static ip address to the server having solaris 10. assign static ip to nge0 which will sustain across reboots which will include all settings including gateway setting etc..
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

How to apply static ip address

Hi there, I have a Debian 5.0 server newly installed. By default, the ip address is given by dhcp. pegase:~# grep '^' /etc/network/interfaces auto lo iface lo inet loopback allow-hotplug eth0 iface eth0 inet dhcp pegase:~# head -2 /etc/hosts 127.0.0.1 localhost 127.0.1.1 ... (1 Reply)
Discussion started by: chebarbudo
1 Replies

2. Solaris

How to assign MAC address to N/W interface in solaris

I m having interface ce0 ce1 and its sub interfaces for that. I want to give MAC addresses for the same. How will I assign it. Please give solution for the same (4 Replies)
Discussion started by: sunray
4 Replies

3. Solaris

How to Configure a Static Ip Address

Hello friend, I am new in UNIX, but I want to learn a lot Well I have a problem to try to configure my PC with a static IP Address (IP 192.168.1.39, Mask 255.255.255.0, gateway 192.168.1.1) (DNS 200.48.225.130 and 200.48.225.146). where are the file that I must be change? The SO is Sun Solaris... (15 Replies)
Discussion started by: andresguillen
15 Replies

4. UNIX for Dummies Questions & Answers

Static IP address for solaris 10 virtual machine

Hi All I am having a solaris 10 virtual machine on vista (using vmware 7) laptop. Now i want to access virtual machine from vista using putty. Problem is that i insalled the solaris machine as dhcp. and whenever i connect to internet or reboot my system the IP address of solaris... (1 Reply)
Discussion started by: ankurk
1 Replies

5. Solaris

Solaris - Assign Static IP

Hi, I have cloned a SOLARIS 8 (BLADE 150) Hard Disk and have put into other system. So, now how do I configure the NIC and assign static IP for this new machine ? (8 Replies)
Discussion started by: angshuman_ag
8 Replies

6. Red Hat

Purpose of Static IP address through DHCP

Hi All, Could you please explain the purpose of assigning the static IP by using the DHCP Concept. Like by using the clients MAC address we assign the static IP Address. Waiting for your reply. Thanks in Advance. (6 Replies)
Discussion started by: Sharath Kumar
6 Replies

7. Solaris

How to resolve duplicated MAC address on Solaris server?

Hi folks, I found out the following: provadm@BKP_LIV_NPPGW_02:home/provadm%/usr/sbin/arp -a Net to Media Table: IPv4 Device IP Address Mask Flags Phys Addr ------ -------------------- --------------- -------- -------------------- ce5 BKP_OnM_NPPGW_02 255.255.255.255 SPLA 00:14:4f:44:e0:86... (1 Reply)
Discussion started by: kimurayuki
1 Replies

8. IP Networking

Free subdomain to my IP Address and Static IP

Hi all, I would need to register a random free subdomain address and associate that to my IP Address. Any suggestion of a good service? Also I don't have a static IP but i remember that there are services that automatically reset the right IP address behind the subdomain but i don't remember... (1 Reply)
Discussion started by: Tameto
1 Replies

9. IP Networking

Configuring static ip address on several systems

p { margin-bottom: 0.1in; line-height: 120%; }a:link { } Hello, I'm have an interesting issue with some Raspberry Pi's which I have on my home network. The pi's are on 192.168.1.102, 192.168.1.103, 192.168.1.104 Something very strange is happening on my network. The pi on 192.168.1.104 is... (2 Replies)
Discussion started by: JoeOnaMac
2 Replies

10. Linux

Unable to set static ip address

Hi All, Am using centos 7 in my vmware workstatio with the bridged network. when run the ifconfig cmd its not at all showing the ip address and pls advise how to set static ip address in my linux box. (1 Reply)
Discussion started by: sarathkumar s
1 Replies
auth_attr(4)							   File Formats 						      auth_attr(4)

NAME
auth_attr - authorization description database SYNOPSIS
/etc/security/auth_attr DESCRIPTION
/etc/security/auth_attr is a local source for authorization names and descriptions. The auth_attr file can be used with other authorization sources, including the auth_attr NIS map and NIS+ table. Programs use the getauthattr(3SECDB) routines to access this information. The search order for multiple authorization sources is specified in the /etc/nsswitch.conf file, as described in the nsswitch.conf(4) man page. An authorization is a right assigned to users that is checked by certain privileged programs to determine whether users can execute restricted functionality. Each entry in the auth_attr database consists of one line of text containing six fields separated by colons (:). Line continuations using the backslash () character are permitted. The format of each entry is: name:res1:res2:short_desc:long_desc:attr name The name of the authorization. Authorization names are unique strings. Construct authorization names using the following convention: prefix. or prefix.suffix prefix Everything in the name field up to the final dot (.). Authorizations from Sun Microsystems, Inc. use solaris as a prefix. To avoid name conflicts, all other authorizations should use a prefix that begins with the reverse-order Internet domain name of the organization that creates the authorization (for example, com.xyzcompany). Prefixes can have additional arbitrary components chosen by the authorization's developer, with components separated by dots. suffix The final component in the name field. Specifies what is being authorized. When there is no suffix, the name is defined as a heading. Headings are not assigned to users but are constructed for use by applications in their GUIs. When a name ends with the word grant, the entry defines a grant authorization. Grant authorizations are used to support fine-grained delegation. Users with appropriate grant authorizations can delegate some of their authorizations to others. To assign an authorization, the user needs to have both the authorization itself and the appropriate grant authorization. res1 Reserved for future use. res2 Reserved for future use. short_desc A short description or terse name for the authorization. This name should be suitable for displaying in user interfaces, such as in a scrolling list in a GUI. long_desc A long description. This field can explain the precise purpose of the authorization, the applications in which it is used, and the type of user that would be interested in using it. The long description can be displayed in the help text of an application. attr An optional list of semicolon-separated (;) key-value pairs that describe the attributes of an authorization. Zero or more keys may be specified. The keyword help identifies a help file in HTML. EXAMPLES
Example 1: Constructing a Name In the following example, the name has a prefix (solaris.admin.usermgr) followed by a suffix (read): solaris.admin.usermgr.read Example 2: Defining a Heading Because the name field ends with a dot, the following entry defines a heading: solaris.admin.usermgr.:::User Accounts::help=AuthUsermgrHeader.html Example 3: Assigning Separate Authorizations to Set User Attributes In this example, a heading entry is followed by other associated authorization entries. The entries below the heading provide separate authorizations for setting user attributes. The attr field for each entry, including the heading entry, assigns a help file. The applica- tion that uses the help key requires the value to equal the name of a file ending in .htm or .html: solaris.admin.usermgr.:::User Accounts::help=AuthUsermgrHeader.html solaris.admin.usermgr.pswd:::Change Password::help=AuthUserMgrPswd.html solaris.admin.usermgr.write:::Manage Users::help=AuthUsermgrWrite.html Example 4: Assigning a Grant Authorization This example assigns to an administrator the following authorizations: solaris.admin.printer.grant solaris.admin.printer.delete solaris.admin.printer.modify solaris.admin.printer.read solaris.login.enable With the above authorizations, the administrator can assign to others the solaris.admin.printer.delete, solaris.admin.printer.modify, and solaris.admin.printer.read authorizations, but not the solaris.login.enable authorization. If the administrator has both the grant autho- rization, solaris.admin.printmgr.grant, and the wildcard authorization, solaris.admin.printmgr.*, the administrator can grant to others any of the printer authorizations. See user_attr(4) for more information about how wildcards can be used to assign multiple authorizations whose names begin with the same components. Example 5: Authorizing the Ability to Assign Other Authorizations The following entry defines an authorization that grants the ability to assign any authorization created with a solaris prefix, when the administrator also has either the specific authorization being granted or a matching wildcard entry: solaris.grant:::Grant All Solaris Authorizations::help=PriAdmin.html Example 6: Consulting the Local Authorization File Ahead of the NIS Table With the following entry from /etc/nsswitch.conf, the local auth_attr file is consulted before the NIS table: auth_attr:files nisplus FILES
/etc/nsswitch.conf /etc/user_attr /etc/security/auth_attr SEE ALSO
getauthattr(3SECDB), getexecattr(3SECDB), getprofattr(3SECDB), getuserattr(3SECDB), exec_attr(4), nsswitch.conf(4), user_attr(4) NOTES
When deciding which authorization source to use, keep in mind that NIS+ provides stronger authentication than NIS. Because the list of legal keys is likely to expand, any code that parses this database must be written to ignore unknown key-value pairs without error. When any new keywords are created, the names should be prefixed with a unique string, such as the company's stock symbol, to avoid potential naming conflicts. Each application has its own requirements for whether the help value must be a relative pathname ending with a filename or the name of a file. The only known requirement is for the name of a file. The following characters are used in describing the database format and must be escaped with a backslash if used as data: colon (:), semi- colon (;), equals (=), and backslash (). SunOS 5.10 9 Jan 2002 auth_attr(4)
All times are GMT -4. The time now is 11:19 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy