End-to-End Network Access Analysis


 
Thread Tools Search this Thread
Special Forums News, Links, Events and Announcements UNIX and Linux RSS News End-to-End Network Access Analysis
# 1  
Old 11-26-2008
End-to-End Network Access Analysis

HPL-2008-28 (R.1) End-to-End Network Access Analysis - Bandhakavi, Sruthi; Bhatt, Sandeep; Okita, Cat; Rao, Prasad
Keyword(s): No keywords available.
Abstract: Network security administrators cannot always accurately tell which end-to-end accesses are permitted within their network, and which ones are not. The problem is that every access is determined by the configurations of multiple, separately administered, components along a path. Furthermore, configu ...
Full Report

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

8 More Discussions You Might Find Interesting

1. Solaris

Test program running taking much more time on high end server T5440 than low end server T5220

Hi all, I have written the following program and run on both T5440 and T5220 on same OS version. I found that T5540 server takes more time than T5220. Please find below the details. test1.cpp #include <iostream> #include <pthread.h> using namespace std; #define NUM_OF_THREADS 20... (17 Replies)
Discussion started by: sanjay_singh85
17 Replies

2. Shell Programming and Scripting

Use of Begin IF ,END IF END not working in the sql script

Hi I have written a script .The script runs properly if i write sql queries .But if i use PLSQL commands of BEGIN if end if , end ,then on running the script the comamds are getting printed on the prompt . Ex :temp.sql After connecting to the databse at the sql prompt i type... (1 Reply)
Discussion started by: isha_1
1 Replies

3. Shell Programming and Scripting

Add end of char \n on end of file

Hi, I want to add \n as a EOF at the end of file if it does't exist in a single command. How to do this? when I use command echo "1\n" > a.txt and od -c a.txt 0000000 1 \n \n 0000003 How does it differentiate \n and eof in this case? Regards, Venkat (1 Reply)
Discussion started by: svenkatareddy
1 Replies

4. Shell Programming and Scripting

Need UNIX shell scripting end to end information

Hi, I would like to learn shell scripting in UNIX. Can any one please give me the support and share the information/documents with me. If any documents please post it to aswanikumar_nimmagadda@yahoo.co.in Thanks in advance...!!! (3 Replies)
Discussion started by: aswani_n
3 Replies

5. IP Networking

Looking for an end-to-end network diagnostic utility...

I am looking for a utility (Windows/Linux/Mac) that will allow me to run some test packets across a customer's network (between their client & my server) to identify a list of (or at least a guess of) all protocols and significant network settings that could adversely effect my systems performance... (1 Reply)
Discussion started by: jjinno
1 Replies

6. Shell Programming and Scripting

array access in END block failure

Hi guys i am new to shell scripting. I wrote this script that simply searches a column value of file1 from file2. please look at the code below: awk ' FILENAME==ARGV { file_1_data=$0; next } FILENAME==ARGV { file_2_data=substr($3,1,12); next } END { ... (5 Replies)
Discussion started by: fahadaizaz
5 Replies

7. Linux

attempt to access beyond end of device

Hi, we have running 8 box sles 9 cluster and on an nfs filesystem we have the problem which is grepped from /var/log/messages. Jun 8 13:40:46 qnclpx02 kernel: attempt to access beyond end of device Jun 8 13:40:46 qnclpx02 kernel: sdat: rw=0, want=8894615912, limit=314572800 Is there... (1 Reply)
Discussion started by: ortsvorsteher
1 Replies

8. IP Networking

end-end packet delay?

following is the output from traceroute traceroute 10.1.11.6 traceroute to 10.1.11.6 (10.1.11.6), 30 hops max, 38 byte packets 1 10.129.1.250 (10.129.1.250) 20.618 ms 0.335 ms 0.271 ms 2 192.0.20.1 (192.0.20.1) 0.694 ms 4.660 ms 0.422 ms 3 192.0.40.1 (192.0.40.1) 0.972 ms 1.917 ms 0.873 ms... (4 Replies)
Discussion started by: yogesh_powar
4 Replies
Login or Register to Ask a Question
securenets(4)							   File Formats 						     securenets(4)

NAME
securenets - configuration file for NIS security SYNOPSIS
/var/yp/securenets DESCRIPTION
The /var/yp/securenets file defines the networks or hosts which are allowed access to information by the Network Information Service ("NIS"). The format of the file is as follows: o Lines beginning with the ``#'' character are treated as comments. o Otherwise, each line contains two fields separated by white space. The first field is a netmask, the second a network. o The netmask field may be either 255.255.255.255 (IPv4), ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff (IPv6) , or the string ``host'' indi- cating that the second field is a specific host to be allowed access. Both ypserv(1M) and ypxfrd(1M) use the /var/yp/securenets file. The file is read when the ypserv(1M) and ypxfrd(1M) daemons begin. If /var/yp/securenets is present, ypserv(1M) and ypxfrd(1M) respond only to IP addresses in the range given. In order for a change in the /var/yp/securenets file to take effect, you must kill and restart any active daemons using ypstop(1M) and ypstart(1M). An important thing to note for all the examples below is that the server must be allowed to access itself. You accomplish this either by the server being part of a subnet that is allowed to access the server, or by adding an individual entry, as the following: hosts 127.0.0.1 EXAMPLES
Example 1: Access for Individual Entries If individual machines are to be give access, the entry could be: 255.255.255.255 192.9.1.20 or host 192.0.1.20 Example 2: Access for a Class C Network If access is to be given to an entire class C network, the entry could be: 255.255.255.0 192.9.1.0 Example 3: Access for a Class B Network The entry for access to a class B network could be: 255.255.0.0 9.9.0.0 Example 4: Access for an Invidual IPv6 Address Similarly, to allow access for an individual IPv6 address: ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff fec0::111:abba:ace0:fba5e:1 or host fec0::111:abba:ace0:fba5e:1 Example 5: Access for all IPv6 Addresses Starting with fe80 To allow access for all IPv6 addresses starting with fe80: ffff:: fe80:: FILES
/var/yp/securenets Configuration file for NIS security. SEE ALSO
ypserv(1M), ypstart(1M), ypstop(1M), ypxfrd(1M) NOTES
The Network Information Service (NIS) was formerly known as Sun Yellow Pages (YP). The functionality of the two remains the same; only the name has changed. The name Yellow Pages is a registered trademark in the United Kingdom of British Telecommunications plc, and may not be used without permission. SunOS 5.10 26 Apr 1999 securenets(4)