6 More Discussions You Might Find Interesting
planning to secure AIX sever by disabling insecure protocols/cipher suites; got the below requirements from secuirty team.
1.configure the server to disable support for DES and IDEA cipher suites
2.disable insecure TLS/SSL protocol support
Configure the server to... (4 Replies)
Discussion started by: Kumar7997
2. IP Networking
hello forum members,
What are L2 and L3 Protocols and can u brief me a bit little ie to gain a
Thanks & Regards
Rajkumar g (1 Reply)
Discussion started by: rajkumar_g
Hi everyone, I would like to allow multi users to access P2P networks, so I wonder if there's a way to tracking these kind of protocols with netfilter, and also compatibility with nat, like the module conntrack_ftp seems to do with the FTP protocol.
Thanks guys. (0 Replies)
Discussion started by: nekkro-kvlt
I have an LPAR in a P5 machine which has been setup in an HACMP cluster. The person who set it up allocated the wrong network adapter (en) to the persistent network. For the life of me I cannot find where I can re-assign this adapter. Anyone able to help me as I am tearing my hair out and do not... (1 Reply)
Discussion started by: johnf
5. UNIX for Dummies Questions & Answers
What protocol would be the best to use on a network with nt and unix servers and windows me clients?
Can SMB protocol be used to implement large networks?
What protocol can be used to make remote file systems appear as if they are local?
Quite a few questions I know, any help would be... (1 Reply)
Discussion started by: jnash
6. UNIX for Dummies Questions & Answers
Which network protocol is used by UNIX systems to make remote file systems appear as if they are local? (2 Replies)
Discussion started by: OLLERTON
LEARN ABOUT PLAN9
PROTOCOLS(5) Linux Programmer's Manual PROTOCOLS(5)
protocols - protocols definition file
This file is a plain ASCII file, describing the various DARPA internet protocols that are available from the TCP/IP subsystem. It should
be consulted instead of using the numbers in the ARPA include files, or, even worse, just guessing them. These numbers will occur in the
protocol field of any IP header.
Keep this file untouched since changes would result in incorrect IP packages. Protocol numbers and names are specified by the IANA (Inter-
net Assigned Numbers Authority).
Each line is of the following format:
protocol number aliases ...
where the fields are delimited by spaces or tabs. Empty lines are ignored. If a line contains a hash mark (#), the hash mark and the part
of the line following it are ignored.
The field descriptions are:
the native name for the protocol. For example ip, tcp, or udp.
number the official number for this protocol as it will appear within the IP header.
optional aliases for the protocol.
This file might be distributed over a network using a network-wide naming service like Yellow Pages/NIS or BIND/Hesiod.
The protocols definition file.
This page is part of release 4.15 of the Linux man-pages project. A description of the project, information about reporting bugs, and the
latest version of this page, can be found at https://www.kernel.org/doc/man-pages/.
Linux 2012-08-05 PROTOCOLS(5)