Sponsored Content
Operating Systems SCO Backup/RAID of HD on Old UNIX Server Post 302956639 by hicksd8 on Thursday 1st of October 2015 01:59:57 PM
Old 10-01-2015
There used to be a licencing application which was very popular with software vendors wanting licence control called FlexLM (standing for Flexible Licence Manager). This tied licence security to the MAC address of the network interface. A value was computed on the MAC address which is known as the Hostid.

If your server is running FlexLM it will have a process running the executable 'lmgrd'. See if you've got one of those.

Code:
# ps -eaf|grep lmgrd

This User Gave Thanks to hicksd8 For This Post:
 

9 More Discussions You Might Find Interesting

1. Filesystems, Disks and Memory

2-Ch RAID Problem in SCO Open Server

Help, if possible. In SCO Open Server with installation of two-channel RAID controller the following happens: on the channel 0 disk array is seen by an operational system, and on the channel 1 array is not seen (simultaneously). That is the operational system can not simultaneously use more than... (1 Reply)
Discussion started by: pko60
1 Replies

2. Filesystems, Disks and Memory

Adding RAID to server

Hi, I have a server that I am adding a RAID that we purchased to. The server works fine. It is running Fedora 7 and is a Dell Precision 690. When the RAID is attached, it boots up and says the following: Controller Bus #00, Device#1F, Function#02: 00 Ports No device found AHCI BIOS not... (0 Replies)
Discussion started by: user23
0 Replies

3. Red Hat

linux server with raid controller card

I am planning on building a fedora box with raid controller (database server). Is anybody done that ? also what kind of software do you need to backup and recover data. (1 Reply)
Discussion started by: amir07
1 Replies

4. UNIX for Dummies Questions & Answers

efficient raid file server

I need to put together a RAID1 file server for use by Windoze systems. I've built zillions of windows systems from components. I was a HPUX SE for a long time at HP, but have been out of the game for years. I've got an old workhorse mobo FIC PA-2013 with a 450 MHz K6 III+ I could use, but I'd... (2 Replies)
Discussion started by: pcmacd
2 Replies

5. Hardware

Hardware RAID on Sun T2000 Server

Hi All I have a Sun T2000 server. Couple of years ago I had configured and mirrored the boot drive with an other drive using hardware RAID 1 using raidctl command. Following is the hardware RAID output. root@oracledatabaseserver / $ raidctl RAID Volume RAID RAID Disk... (0 Replies)
Discussion started by: Tirmazi
0 Replies

6. Hardware

Raid 0 on database server

Hi guys. if we want to use SSD drives on a database server, can we use RAID 0 configuration because of their reliability? (3 Replies)
Discussion started by: majid.merkava
3 Replies

7. Linux

Help Setting up Linux Raid Server

I just built a home computer with 3TB hard drives I wanted to set up in a RAID 5 and load Ubuntu server onto it. The first thing I did was set up the drives in a RAID 5 using just the motherboard chipset software to do it, so a 'hardware' RAID basically. I installed Windows first to see if... (2 Replies)
Discussion started by: lorewap3
2 Replies

8. Filesystems, Disks and Memory

Help finding a Unix friendly RAID 1 backup

First time poster and a very new Unix user, so I'll just pre-apologize for stupid questions now. Does anybody know of a good RAID 1 hard drive backup that is Unix friendly? I want to avoid any hardcore programming. Can you recommend both NAS and non-NAS options? I need to do nightly backups... (31 Replies)
Discussion started by: c.wakeman
31 Replies

9. Hardware

3ware RAID server

We have a 3ware RAID server at work, and as the appointed systems administrator (by virtue of being the one with the most knowledge) I've taken on the job of maintaining it. I've installed smartmontools on it to keep an eye on the drives and run scans every day, and looking at the data from the... (0 Replies)
Discussion started by: Krendoshazin
0 Replies
ARPWATCH(8)						      System Manager's Manual						       ARPWATCH(8)

NAME
arpwatch - keep track of ethernet/ip address pairings SYNOPSIS
arpwatch [ -dN ] [ -f datafile ] [ -i interface ] [ -n net[/width ]] [ -r file ] [ -u username ] [ -e username ] [ -s username ] DESCRIPTION
Arpwatch keeps track for MAC/IP address pairings. It syslogs activity and reports certain changes via email. Arpwatch uses pcap(3) to lis- ten for arp packets on a local ethernet/tokenring/fddi interface. The -d flag is used enable debugging. This also inhibits forking into the background and emailing the reports. Instead, they are sent to stderr. The -f flag is used to set the MAC/IP address database filename. The default is arp.dat. The -i flag is used to override the default interface. The -n flag specifies additional local networks. This can be useful to avoid "bogon" warnings when there is more than one network running on the same wire. If the optional width is not specified, the default netmask for the network's class is used. The -N flag disables reporting any bogons. The -r flag is used to specify a savefile (perhaps created by tcpdump(1) or pcapture(1)) to read from instead of reading from the network. In this case, arpwatch does not fork. If -u flag is used, arpwatch drops root privileges and changes user ID to username and group ID to that of the primary group of username. This is recommended for security reasons. If the -e flag is used, arpwatch sends e-mail messages to username rather than the default (root). If a single `-' character is given for the username, sending of e-mail is suppressed, but logging via syslog is still done as usual. (This can be useful during initial runs, to collect data without being flooded with messages about new stations.) If the -s flag is used, arpwatch sends e-mail messages with username as the return address, rather than the default (root). Note that an empty arp.dat file must be created before the first time you run arpwatch. Also, the default directory (where arp.dat is stored) must be owned by username if -u flag is used. REPORT MESSAGES
Here's a quick list of the report messages generated by arpwatch(1) (and arpsnmp(1)): new activity This MAC/IP address pair has been used for the first time six months or more. new station The MAC address has not been seen before. flip flop The MAC address has changed from the most recently seen address to the second most recently seen address. (If either the old or new MAC address is a DECnet address and it is less than 24 hours, the email version of the report is suppressed.) changed MAC address The host switched to a new MAC address. SYSLOG MESSAGES
Here are some of the syslog messages; note that messages that are reported are also sysloged. MAC broadcast The MAC address of the host is a broadcast address. ip broadcast The ip address of the host is a broadcast address. bogon The source ip address is not local to the local subnet. MAC broadcast The source MAC address was all ones or all zeros. MAC mismatch The source MAC address didn't match the address inside the arp packet. reused old MAC address The MAC address has changed from the most recently seen address to the third (or greater) least recently seen address. (This is similar to a flip flop.) suppressed DECnet flip flop A "flip flop" report was suppressed because one of the two addresses was a DECnet address. FILES
/usr/operator/arpwatch - default directory arp.dat - MAC/IP address database ethercodes.dat - vendor ethernet block list SEE ALSO
arpsnmp(8), arp(8), bpf(4), tcpdump(1), pcapture(1), pcap(3) AUTHORS
Craig Leres of the Lawrence Berkeley National Laboratory Network Research Group, University of California, Berkeley, CA. The current version is available via anonymous ftp: ftp://ftp.ee.lbl.gov/arpwatch.tar.gz BUGS
Please send bug reports to arpwatch@ee.lbl.gov. Attempts are made to suppress DECnet flip flops but they aren't always successful. Most error messages are posted using syslog. 4th Berkeley Distribution 8 October 2000 ARPWATCH(8)
All times are GMT -4. The time now is 04:53 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy