09-01-2012
Well, we actually got a good handbook for the included OS and are getting it up and running right now, so no need to switch... But thanks a lot anyway!
This User Gave Thanks to ijiboom For This Post:
9 More Discussions You Might Find Interesting
1. Linux
Hey, i was wondering if anybody knew of a good VPN that is compatible with nat? If a VPN will not work with NAT could it work with PAT? Right now i'm using RH9. I wanted to use IPsec but i don't think that is compatiable with nat or pat. Please correct me if i'm wrong.
Thanks,
Byblyk. (0 Replies)
Discussion started by: byblyk
0 Replies
2. Linux Benchmarks
Dear Frnds
We are having WHM Cpanel in which many website are their , one of our customer want to install Clientexec software which requires GD2.0.28(compatible) library which is installed.
The problem is libpng version which is incompatible with the GD library .
Please kindly... (0 Replies)
Discussion started by: naik_mit
0 Replies
3. IP Networking
Arright, here's what I'm trying to do. I want to dig up currently active IP addresses on my subnet, and my present strategy is to ping every address until I find active ones, then ping them more often to verify their status. Next, I want to find the names of the computers associated with those... (1 Reply)
Discussion started by: sladuuch
1 Replies
4. UNIX for Dummies Questions & Answers
Dear friends,
I m new to Unix, can anybody please guide me on how to zip and password protect a normal text (or any file) in unix prompt? (1 Reply)
Discussion started by: topgear1000cc
1 Replies
5. IP Networking
Hi all,
One of my computers (an iMac) was recently stolen, but I have been able to connect to it over the internet through Apple's 'back to my mac' feature. In order for the police to find these people they need to know the IP address of the stolen computer.
I suspect that I will have find the... (6 Replies)
Discussion started by: RJFoulston
6 Replies
6. Red Hat
Hi, there, How to know location of a computer where its IP Address and Computer name is known? tx (5 Replies)
Discussion started by: budiantho_indra
5 Replies
7. Shell Programming and Scripting
This is for PHP preg_match code - which is PCRE therefore looking for a perl compatible suggestion
I have this line returned I want to match and return..
I want to match the two instances of string ending 'ABCXYZ' into an array.
And on second element (ie. RootABCXYZ) only return the word... (4 Replies)
Discussion started by: deadyetagain
4 Replies
8. UNIX for Dummies Questions & Answers
I have ubuntu 32 bit installed on VMware with win 7 as host operating system. I am a newbie to Linux shell mode and vi editor. When ever I open the vi editor and select insert mode I don't see the insert mode being highlighted at the bottom of the screen as it is supposed to be. Only when I enable... (4 Replies)
Discussion started by: sabsac
4 Replies
9. Shell Programming and Scripting
the following command works beautifully. it basically grabs the content of a file from First to End, then excludes any lines containing specific patterns.
awk '/^First/,/^End$/ {if (!/#\/bin\/sh|not.*commonly|#/) print}' datafile.
i never had any issues with the command until I ran it on a... (5 Replies)
Discussion started by: SkySmart
5 Replies
LEARN ABOUT DEBIAN
fence_mcdata
fence_mcdata(8) System Manager's Manual fence_mcdata(8)
NAME
fence_mcdata - I/O Fencing agent for McData FC switches
SYNOPSIS
fence_mcdata [OPTION]...
DESCRIPTION
fence_mcdata is an I/O Fencing agent which can be used with McData FC switches. It logs into a McData switch via telnet and disables a
specified port. Disabling the port which a machine is connected to effectively fences that machine. Lengthy telnet connections to the
switch should be avoided while a GFS cluster is running because the connection will block any necessary fencing actions.
fence_mcdata accepts options on the command line as well as from stdin. fenced sends parameters through stdin when it execs the agent.
fence_mcdata can be run by itself with command line options which is useful for testing.
After a fence operation has taken place the fenced machine can no longer connect to the McData FC switch. When the fenced machine is ready
to be brought back into the GFS cluster (after reboot) the port on the McData FC switch needs to be enabled. This can be done by running
fence_mcdata and specifying the enable action.
Vendor URL: http://www.brocade.com
OPTIONS
-a IPaddress
IP address of the switch.
-h Print out a help message describing available options, then exit.
-l login
Username name for the switch.
-n port
The port number to disable on the switch.
-o action
The action required. disable (default) or enable.
-p password
Password for login.
-S path
Full path to an executable to generate the password for login.
-q Quiet mode: print only error messages.
-V Print out a version message, then exit.
STDIN PARAMETERS
agent = < param >
This option is used by fence_node(8) and is ignored by fence_mcdata.
ipaddr = < hostname | ip >
IP address or hostname of the switch.
login = < param >
Login name.
option = < param >
The action required. disable (default) or enable.
passwd = < param >
Password for login.
passwd_script = < param >
Full path to an executable to generate the password for login.
port = < param >
The port number to disable on the switch.
SEE ALSO
fence(8), fence_node(8)
fence_mcdata(8)