05-27-2014
Sorry, I was not aware about posting a new thead.
Kindly help me resolving me issue.
I am now the step where we have to map the linux server to AD server.
Thanks in advance!!!
10 More Discussions You Might Find Interesting
1. SuSE
Hi All,
I have a system running with Suse Enterprise Linux 9.0.
xyz# uname -a
Linux xyz 2.4.21-291-smp #1 SMP Tue May 24 14:07:45 UTC 2005 i686 unknown
I would like to configure postfix on this system for sending mails as a root user using "mail" command to smtp server (Windows System)... (5 Replies)
Discussion started by: jumadhiya
5 Replies
2. Linux
Can anybody please tell me how to configure linux to receive snmp traps from a windows server? I am not able to receieve snmp traps on unix machines specifically linux and solaris. I have tried starting snmptrapd service on linux but it didn't work. Is there anything special that I have to do on... (2 Replies)
Discussion started by: iamtulipin
2 Replies
3. UNIX for Advanced & Expert Users
Hi all,
I need to send mail to a particular email id using a local mail server.This mail shall contain the content of a file. I don't have any idea how to do it. Can anyone guide me ,where to start proceeding for it. Any guide or study material would appreciated. (1 Reply)
Discussion started by: amit_kv1983
1 Replies
4. UNIX for Dummies Questions & Answers
Hi
The script:
#!/bin/sh
#set -x
# set admin email so that you can get email
ADMIN="myemailaddress"
# set alert level
ALERT=4
df -HP | grep -vE '^Filesystem|tmpfs|cdrom' | awk '{ print $5 " " $1 }' | while read output;
do
#echo $output
usep=$(echo $output | awk '{ print... (5 Replies)
Discussion started by: wbdevilliers
5 Replies
5. UNIX for Dummies Questions & Answers
I am using red hat linux server. I need to know what softwares installed on that server.
What command can i use to get this list?
Any help is highly appreciated. (2 Replies)
Discussion started by: govindts
2 Replies
6. Red Hat
Hi,
We have a OEL6.1 installed on our server.
We want developers to view there application logs generated on the server, but doesn't really want to give them access to server machine.
Can someone please suggest how can we configure apache/httpd to create a url which will show all files in... (1 Reply)
Discussion started by: shrshah64
1 Replies
7. Linux
i want to configure machine1 as ntp server. this machine has oel 5.9 64 bit installed and this machine is not connected to internet neither there is any ntp server.
there is another machine2 and i want to configure that as ntp client.
plz do tell me that what lines do i add in /etc/ntp.conf... (0 Replies)
Discussion started by: rehantayyab82
0 Replies
8. Linux
Hi my name is Manju.
->I have configure the two way authentication on my linux server.
->Now I am able to apply two way authenticator on particuler user.
->Now I want to map this linux server to my AD server.
->Kindly tell me how to map AD(Active Directory) with this linux server.
... (0 Replies)
Discussion started by: manjusharma128
0 Replies
9. UNIX for Dummies Questions & Answers
Hi Guys
I am working on a project where is looking after the infrastructure and they have delivered RHEL servers.
I need to confirm if PGP has been installed on the newly delivered linux servers.
Is there any command I can run or directory I can go in to find that out.
Any help will be... (5 Replies)
Discussion started by: sachinksl
5 Replies
10. UNIX for Beginners Questions & Answers
I would like to use Xming to connect a server and managed to get it to work. I am now trying to get it to connect to a different server but i am not sure which X Window system is installed. I tried it through putty and i get the following error/warning:
/usr/java/jdk1.7.0_67/bin> jvisualvm... (5 Replies)
Discussion started by: ziggy25
5 Replies
LEARN ABOUT CENTOS
fail2ban
FAIL2BAN(1) General Commands Manual FAIL2BAN(1)
NAME
fail2ban - a set of server and client programs to limit brute force authentication attempts.
DESCRIPTION
Fail2Ban consists of a client, server and configuration files to limit brute force authentication attempts.
The server program fail2ban-server is responsible for monitoring log files and issuing ban/unban commands. It gets configured through a
simple protocol by fail2ban-client, which can also read configuration files and issue corresponding configuration commands to the server.
For details on the configuration of fail2ban see the jail.conf(5) manual page. A jail (as specified in jail.conf) couples filters and
actions definitions for any given list of files to get monitored.
For details on the command-line options of fail2ban-server see the fail2ban-server(1) manual page.
For details on the command-line options and commands for configuring the server via fail2ban-client see the fail2ban-client(1) manual page.
For testing regular expressions specified in a filter using the fail2ban-regex program may be of use and its manual page is fail2ban-
regex(1).
LIMITATION
Fail2Ban is able to reduce the rate of incorrect authentications attempts however it cannot eliminate the risk that weak authentication
presents. Configure services to use only two factor or public/private authentication mechanisms if you really want to protect services.
A local user is able to inject messages into syslog and using a Fail2Ban jail that reads from syslog, they can effectively trigger a DoS
attack against any IP. Know this risk and configure Fail2Ban/grant shell access accordingly.
FILES
/etc/fail2ban/*
AUTHOR
Manual page written by Daniel Black and Yaroslav Halchenko
REPORTING BUGS
Report bugs to https://github.com/fail2ban/fail2ban/issues
COPYRIGHT
Copyright (C) 2013
Copyright of modifications held by their respective authors. Licensed under the GNU General Public License v2 (GPL).
SEE ALSO
fail2ban-server(1) fail2ban-client(1) fail2ban-regex(1) jail.conf(5)
Fail2Ban March 2013 FAIL2BAN(1)