10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
hi Im unable to find how this script in conencting to DB and which DB and job is scheduled in TWS to run this script.
Any sugggestion where to look for or how to get information.
please find below part of script for DB conenction.
##### SET VARIABLES ##################
rundate=`date... (1 Reply)
Discussion started by: saif2825
1 Replies
2. UNIX for Advanced & Expert Users
Hi everybody,
I am running a program on a supercomputer via my personal computer through a ssh connection. My program take more than a day to run, so when I left work with my PC I stop the connection with the supercomputer and the program stop.
I am wondering if someone know how I can manage... (2 Replies)
Discussion started by: TomTomGre
2 Replies
3. Shell Programming and Scripting
Hi All.
I have a script, in which its throwing me error like
/data/ds/dpr_ebicm_uat//etl/cm3_0/entities/BBME/parameters/cm_file_util.plg: line 7: export: `exist.=SQL1024N A database connection does not exist. SQLSTATE=08003': not a valid identifier
whereas i have already made a... (4 Replies)
Discussion started by: vee_789
4 Replies
4. AIX
Hi,
I have a server AIX 5.3
Few people have the root password and somebody used the root login to erase a file (command rm in the .sh_history of root). :mad:
I would like to know if a file exist with what ip address has been connected.
I want to find the guilty!!! :D
Thanks guys (2 Replies)
Discussion started by: Castelior
2 Replies
5. Shell Programming and Scripting
Hi,
I'm trying to write a script which will run a select on db.
#!/usr/bin/ksh
SQL_INPUT_FILE=file_name.sql
SQL_OUTPUT_FILE=output.txt
MANPATH=/usr/share/man:/opt/SUNWspro/man:/usr/local/man... (2 Replies)
Discussion started by: ozum
2 Replies
6. Solaris
Hi all,
I have just installed SunOS 10 at the first PC and exceed (pc-x server) at the second.
I'm trying to connect to the first pc via exceed softvare. After entering login and pass, the exceed window immidiate close without any errors (if CDE or JDS has been chosen). Via exceed working just... (0 Replies)
Discussion started by: Marauder62
0 Replies
7. Solaris
Hi everyone,
I am hoping anyone of you could help me in this weird problem we have in 1 of our Solaris 10 servers. Lately, we have been having some ftp problems in this server. Though it can ping any server within the network, it seems that it can only ftp to a select few. For most servers, the... (4 Replies)
Discussion started by: labdakos
4 Replies
8. UNIX for Advanced & Expert Users
Hello
I'm facing the above problem while doing a performance run. I've a script which I'm launching from my windows desktop using mozilla. The script will invoke backend action on a Solaris host which in turn feeds the records to a driver located on a linux box(Cent OS).
What's happening is... (1 Reply)
Discussion started by: subramanyab
1 Replies
9. UNIX for Dummies Questions & Answers
Hi Everyone,
Good day.
Scenario:
2 unix servers -- A (SunOS) and B (AIX)
I have an ftp script to sftp 30 files from A to B which happen almost instantaneously i.e 30 sftp's happen at the same time.
Some of these sftp's fail with the following error:
ssh_exchange_identification: Connection... (1 Reply)
Discussion started by: jeevan_fimare
1 Replies
10. UNIX for Advanced & Expert Users
Hi Experts,
need help about release or refresh TCP Connection:
i have the sample like below :
application log connection:
0500 ( 192.168.0.1:36053) 00919 2007/05/10 23:30:25 112 13 2007/05/10 23:30:25 1969/12/31 17:00:00
0500 ( 192.168.0.1:36054) 00920 2007/05/10 23:30:26 000 00... (3 Replies)
Discussion started by: bucci
3 Replies
SECVPN(1) General Commands Manual SECVPN(1)
NAME
secvpn.conf - Configuration file for the Secure Virtual Private Network
SYNOPSIS
/etc/network/secvpn.conf
DESCRIPTION
The configuration file for the Secure Virtual Private Network is expected to be a valid shell script defining variables and functions. The
script is sourced by the other programs and scripts maintaining the SVPN and therefore must be handled with care!
The file is composed of two parts, a variable definition section and a function definition section (in the sense of the shell syntax).
Variables
The variables are used to define global variables for the SVPN:
THIS_IS identifies the current hostname.
VPNS is used to specifiy the relationship of SVPN hosts, i.e. which SVPNs should be started by secvpn and which role do the host
play in this relationship.
The syntax is ActiveHost->PassiveHost, i.e. the active host is responsible to establish the secure channel to the passive host
(using ssh) by starting the pppd connection and setting routes on the active and the passive host.
Multiple relationships are separated by a blank, the identifiers used for the ActiveHost and the PassiveHost must match the
contents of the variable THIS_IS in the corresponding configuration files.
CRYPT_MASK is the network mask used for the real connection via the T_CRYPT_IP IP addresses.
SSHPORT is currently not used. In future releases, this variable may be used to identify the port to which the ssh connection should be
made.
Functions
Functions are used to define the specific attributes of the SVPN hosts and the SVPN relationships.
First, a function for each SVPN host has to be defined. The name of the function must match the hostname of the SVPN host (i.e. the con-
tents of the variable THIS_IS in the corresponding configuration file). The SVPN host specific functions are used to set the following,
host specific variables:
GOOD_ONES specifies the official, good network address (together with the network mask given as the number of contiguous bits separated
with a slash) of this SVPN host. This network is the secure subnet which is represented by this SVPN host.
GOOD_IP identifies the official, good IP address of the SVPN host. This IP address must be used for all secure communications with this
host.
Next, a function for each SVPN relationship has to be defined. The names of these functions are listed in the VPNS variable (see above) and
receive a prefix of vpn_ These relationship defining functions are used to set the following connection specific variables:
T_GOOD_ONES is an optional variable used to specify the list (blank separated) of secure networks which are directly or indirectly reach-
able via the active SVPN host of this SVPN connection ( this good IP addresses ). The networks are identified by their IP
address and their attached network mask specified by the number of contiguous bits and separated by a slash. Note that the own
network must not be listed in this variable, because it is specified in the GOOD_ONES variable in the SVPN host function of the
active member of the current connection.
T_BAD_IP is the IP address of the active SVPN host which is used to establish the secure channel to the passive SVPN host. This IP
address might be attached to a second interface on the active SVPN host (if a multi homed system is used) or the same IP
address as for the GOOD_IP might be used (if the active SVPN host is a single homed system).
T_CRYPT_IP is the IP address on the active SVPN host which is used for the secure ppp connection to the corresponding pppd on the passive
SVPN host -- a new ppp interface will be added by secvpn for this ip.
O_CRYPT_IP is the IP address on the passive SVPN host which is used for the secure ppp connection to the corresponding pppd on the active
SVPN host -- a new ppp interface will be added by secvpn for this ip.
O_BAD_IP is the IP address of the passive SVPN host which is used to establish the secure channel to the active SVPN host. This IP
address might be attached to a second interface on the passive SVPN host (if a multi homed system is used) or the same IP
address as for the GOOD_IP might be used (if the passive SVPN host is a single homed system).
O_GOOD_ONES is an optional variable used to specify the list (blank separated) of secure networks which are directly or indirectly reach-
able via the passive SVPN host of this SVPN connection ( other good IP addresses ). The networks are identified by their IP
address and their attached network mask specified by the number of contiguous bits and separated by a slash. Note that the own
network must not be listed in this variable, because it is specified in the GOOD_ONES variable in the SVPN host function of the
passive member of the current connection.
Example
# The SVPN acts as a router connecting 2 subnets.
# Each subnet itself is secure. But the Internet is unsecure.
#
# Secure Subnet 1 / / Secure Subnet 2
# / Unsecure /
# [hosts1] [secvpn1] / Internet / [secvpn2] [hosts2]
# X.X.X.n eth0:X.X.X.1 / ISDN / eth0:Y.Y.Y.1 Y.Y.Y.n
# eth1:I.I.I.1 / / eth1:J.J.J.1
#
# ToDo:
# The hosts1 should be able to communicate secure with hosts2
# over an unsecure network.
# secvpn1/secvpn2 are used as routers that connect the secure
# subnet to the internet.
# Hosts1/hosts2 have routing entries using secvpn1/secvpn2 to
# reach hosts2/hosts1.
#
#
# Global variables
#
THIS_IS="`hostname`"
VPNS="secvpn1->secvpn2"
CRYPT_MASK="255.255.255.0"
SSHPORT="22"
#
# SVPN host specifications
#
# this is for the system with hostname 'secvpn1'
secvpn1() { GOOD_ONES="X.X.X.0/24"; GOOD_IP="X.X.X.1" }
# this is for the system with hostname 'secvpn2'
secvpn2() { GOOD_ONES="Y.Y.Y.0/24"; GOOD_IP="Y.Y.Y.1" }
#
# SVPN connection specifications
#
# this is for the connection from 'secvpn1' (active) to
# 'secvpn2' (passive)
vpn_secvpn1_secvpn2()
{
# -----------
# | secvpn1 |----------------+
# ----------- |
# | |
| # ppp-DEV
T_BAD_IP="I.I.I.1"; T_CRYPT_IP="10.1.1.1"
# | |
| # ppp-DEV
O_BAD_IP="J.J.J.1"; O_CRYPT_IP="10.1.1.2"
# | |
# ----------- |
# | secvpn2 |----------------+
# -----------
}
OTHER
To have real security it is necessary to secure each secvpn host and to have firewalls on each secvpn host allowing only selected IP-
Adresses and Ports to pass through the VPN.
AUTHOR
Bernd Schumacher, HP Consulting, HEWLETT-PACKARD GmbH, Bad Homburg, 2000
COPYRIGHT
Copyright: Most recent version of the GPL.
On Debian GNU/Linux systems, the complete text of the GNU General Public License can be found in "/usr/share/common-licenses/GPL".
SEE ALSO
secvpn(1) secvpnmon(1)
secvpn August 2000 SECVPN(1)