10 More Discussions You Might Find Interesting
1. Solaris
I am trying to establish passwordless connectivity between server A and server B, but unsuccessfuly, because I beleive two issues.
the first one is that on both servers, it is not possible to use root to login, it only allows to connect using a user (any) them su - root, which in turns I am able... (1 Reply)
Discussion started by: fretagi
1 Replies
2. UNIX for Beginners Questions & Answers
Hi Everyone,
I am trying to send files from Linux to DataPower server using public key based authentication but it's not working as expected and every-time password expecting for sftp transfer.
Can someone please help on this?
Steps I fallowed:
Created keys pair at source server... (4 Replies)
Discussion started by: renukeswar
4 Replies
3. Red Hat
Hi All,
If I disable the iptables on the server then I can use the command
mount -t cifs //192.168.122.21/sharedata tmpdata -o username=smbuser4,password=1234
If I enable the iptables. However I have use the commands on server
iptables -A INPUT -m state --state NEW -m udp -p udp --dport... (1 Reply)
Discussion started by: joj123
1 Replies
4. Shell Programming and Scripting
Hello Guys ,
I have been working on a script where we are looking to connect a remote Xserver from a Unix box. Once a connection is made , i need to run several commands on remote machine to check various stuffs.
As per my knowledge on unix (which is like a drop in ocean) , i found SSH as a... (7 Replies)
Discussion started by: himanshu sood
7 Replies
5. Cybersecurity
hello,
after configuration ipsec in ip4 I can not ping between client and server whereas I had success ping before configuration!
I also generate different key for AH and ESP as i have shown below.
what is my problem and what should i do to have ping and test the configuration?
code:
... (0 Replies)
Discussion started by: elinaz
0 Replies
6. Ubuntu
we designed a primitive operating system for learning basics fundamentals and we created process switching, interrupt/polled IO for device drivers like UART and printers. We accomplish this by using our own tools called SPEDE (for downloading compiled elf image from host ubuntu system that have... (0 Replies)
Discussion started by: bicepjai
0 Replies
7. BSD
Hi, this is my first post...:p
Hello Admin :)
Can I have an ask for something with my configuration ?
I have finished some kind of the tutorial to build ipsec site to site, and the "step" has finished completely.
I have a simulation with a local design topology with two PC's (FreeBSD ... (0 Replies)
Discussion started by: aulia
0 Replies
8. SuSE
Hi, I am trying to use nomachine nx server and client. But somehow it doen't work. What happens is the following:
1.- Client starts up
2.- Client authenticates with Server
3.- The NoMachine window appears for 2-4 seconds
4.- The NoMachine window exists
Somehow a "closeEvent" is sent.... (3 Replies)
Discussion started by: blackicecube
3 Replies
9. Shell Programming and Scripting
Hi everybody i need your help on this I have LAN which run Sun microsystem with solaris 7 OS on each of the servers. The LAN was working fine before an interruption of power supply which makes servers to operating as standalone servers. i.e none of the servers have access to one another. How do i... (2 Replies)
Discussion started by: sbmada
2 Replies
10. UNIX for Dummies Questions & Answers
Hello there, just a quick question.....Can someone please explain the concept that enables you to establish a connection using the same userId
Thanx (1 Reply)
Discussion started by: BigTool4u2
1 Replies
RACOON(8) BSD System Manager's Manual RACOON(8)
NAME
racoon -- IKE (ISAKMP/Oakley) key management daemon
SYNOPSIS
racoon [-BdFv46] [-f configfile] [-l logfile] [-p isakmp-port]
DESCRIPTION
racoon speaks IKE (ISAKMP/Oakley) key management protocol, to establish security association with other hosts. SPD (Security Policy
Database) in the kernel usually triggers to start racoon. racoon usually sends all of informational messages, warnings and error messages to
syslogd(8) with the facility LOG_DAEMON, the priority LOG_INFO. Debugging messages are sent with the priority LOG_DEBUG. You should config-
ure syslog.conf(5) appropriately to see these messages.
-B Install SA(s) from the file which is specified in racoon.conf(5).
-d Increase the debug level. Multiple -d will increase the debug level even more.
-F Run racoon in the foreground.
-f configfile
Use configfile as the configuration file instead of the default.
-l logfile
Use logfile as the logging file instead of syslogd(8).
-p isakmp-port
Listen to ISAKMP key exchange on port isakmp-port instead of the default port number, 500.
-v The flag causes the packet dump be more verbose, with higher debugging level.
-4
-6 Specifies the default address family for the sockets.
racoon assumes the presence of kernel random number device rnd(4) at /dev/urandom. Informational messages are labeled info, and debugging
messages are labeled debug. You have to configure syslog.conf(5) if you want to see them in a logging file.
RETURN VALUES
The command exits with 0 on success, and non-zero on errors.
FILES
/usr/local/v6/etc/racoon.conf default configuration file.
SEE ALSO
ipsec(4), racoon.conf(5), syslog.conf(5), setkey(8), syslogd(8)
HISTORY
The racoon command first appeared in ``YIPS'' Yokogawa IPsec implementation.
KAME
November 20, 2000 KAME