9 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Dear all,
recently, I migrated a solaris zone from one host to another. The zone was inside of a zpool. The zpool cotains two volumes.
I did the following:
host1:
$ zlogin zone1 shutdown -y -g0 -i0 #Zone status changes from running to installed
$ zpool export zone1
host2:
$ zpool... (2 Replies)
Discussion started by: custos
2 Replies
2. Solaris
I have a question about losing a node in a zone cluster. Hopefully I can explain enough for someone to answer.
Let's say I have a zone cluster spread over 3 physical nodes. If Node1 crashes, would I be correct in assuming I would lose all zones on Node1?
If I lost Node1 below, would I lose... (4 Replies)
Discussion started by: MasonJ
4 Replies
3. UNIX for Advanced & Expert Users
I've been going crazy trying to get this working. Here's the situation: we have a Solaris 10 box that connects an internal network to an external network. We're using ipf/ipnat on it. We've added a couple of new boxes to the internal network (192.168.1.100, .101) and want to be able to get to port... (1 Reply)
Discussion started by: spakov
1 Replies
4. Solaris
I have two physical servers, with zones that mount local storage.
We were using "raw device" in the zonecfg to point to a metadevice on the global zone (it was not mounted in the global zone at any point).
It failed to mount on every boot because the directory existed in the zone.
I... (6 Replies)
Discussion started by: BG_JrAdmin
6 Replies
5. Cybersecurity
I'm running IPF on solaris 10
bash-3.00# ipf -V #display ipf version
ipf: IP Filter: v4.1.9 (592)
Kernel: IP Filter: v4.1.9
Running: yes
Log Flags: 0 = none set
Default: pass all, Logging: available
Active list: 1
Feature mask: 0x107
with the following rules
bash-3.00# ipfstat -o -i... (0 Replies)
Discussion started by: h@foorsa.biz
0 Replies
6. Solaris
I'm trying to enable IPF ( ip filter ) on solaris 10 release 6/06 Solaris 10 6/06 s10s_u2wos_09a SPARC
so i enabled svc:/network/ipfilter:default
it was disabled by default and svc:/network/pfil:default was enabled and online
there only one config file under etc
$/etc/ipf/ipf.conf
i... (1 Reply)
Discussion started by: h@foorsa.biz
1 Replies
7. Solaris
Hi all,
i am new learner in Zoning and virtualization Technology and i have some question's about it
i create zone using this step
zonecfg -z app-apache
create
set zonepath=/zone_adm/app-apache
add net
set address=192.168.1.250
set physical=bge0
end
set autoboot=true
verify
commit... (13 Replies)
Discussion started by: coxmanchester
13 Replies
8. Solaris
OK I am running solaris 10.
I made some changes to my ipf.conf file and issued the command:
ipf -Fa -f /etc/ipf/ipf.conf
to flush out the old and bring in the new changes.
When I ran ipfstat -ioh to verify it had brought in the new rule set I saw something I wasn't expecting to see.
I... (3 Replies)
Discussion started by: NewSolarisAdmin
3 Replies
9. Solaris
I have a general question regarding Zone Migration.
I have an older system that is currently running a zone configured with ProFTPD & SSL.
If I want to migrate or clone that zone to another (much newer) system, will I still have to setup & configure ProFTPD & SSL on the new system? (3 Replies)
Discussion started by: em23
3 Replies
IPFS(8) System Manager's Manual IPFS(8)
NAME
ipfs - saves and restores information for NAT and state tables.
SYNOPSIS
ipfs [-nv] -l
ipfs [-nv] -u
ipfs [-nv] [ -d <dirname> ] -R
ipfs [-nv] [ -d <dirname> ] -W
ipfs [-nNSv] [ -f <filename> ] -r
ipfs [-nNSv] [ -f <filename> ] -w
ipfs [-nNSv] -f <filename> -i <if1>,<if2>
DESCRIPTION
ipfs allows state information created for NAT entries and rules using keep state to be locked (modification prevented) and then saved to
disk, allowing for the system to experience a reboot, followed by the restoration of that information, resulting in connections not being
interrupted.
OPTIONS
-d Change the default directory used with -R and -W options for saving state information.
-n Don't actually take any action that would affect information stored in the kernel or on disk.
-v Provides a verbose description of what's being done.
-i <ifname1>,<ifname2>
Change all instances of interface name ifname1 in the state save file to ifname2. Useful if you're restoring state information
after a hardware reconfiguration or change.
-N Operate on NAT information.
-S Operate on filtering state information.
-u Unlock state tables in the kernel.
-l Lock state tables in the kernel.
-r Read information in from the specified file and load it into the kernel. This requires the state tables to have already been locked
and does not change the lock once complete.
-w Write information out to the specified file and from the kernel. This requires the state tables to have already been locked and
does not change the lock once complete.
-R Restores all saved state information, if any, from two files, ipstate.ipf and ipnat.ipf, stored in the /var/db/ipf directory unless
otherwise specified by the -d option. The state tables are locked at the beginning of this operation and unlocked once complete.
-W Saves in-kernel state information, if any, out to two files, ipstate.ipf and ipnat.ipf, stored in the /var/db/ipf directory unless
otherwise specified by the -d option. The state tables are locked at the beginning of this operation and unlocked once complete.
FILES
/var/db/ipf/ipstate.ipf
/var/db/ipf/ipnat.ipf
/dev/ipl
/dev/ipstate
/dev/ipnat
SEE ALSO
ipf(8), ipl(4), ipmon(8), ipnat(8)
DIAGNOSTICS
Perhaps the -W and -R operations should set the locking but rather than undo it, restore it to what it was previously. Fragment table
information is currently not saved.
BUGS
If you find any, please send email to me at darrenr@pobox.com
IPFS(8)