建立用户组mqm和mqbrkrs,把root帐号也归属到这两个组。建立帐号mqm,它的主用户组是mqm,附属组是mqbrkrs和root。
MQServer:/tmp/mq/432 # ls -l
total 782236
drwxr-xr-x 6 root root 1408 Mar 26 00:42 .
drwxr-xr-x 3 root root 176 Mar 26 00:39 ..
-r--r--r-- 1 root 12201 56517147 May 20 2005 IBMJava2-SDK-1.4.2-0.0.i386.rpm
-rw-rw-r-- 1 root 12201 963879 May 20 2005 MQSeriesClient-6.0.0-0.i386.rpm
-rw-rw-r-- 1 root 12201 84765428 May 20 2005 MQSeriesConfig-6.0.0-0.i386.rpm
-rw-rw-r-- 1 root 12201 719764 May 20 2005 MQSeriesFTA-6.0.0-0.i386.rpm
-rw-rw-r-- 1 root 12201 163979050 May 20 2005 MQSeriesIES30-6.0.0-0.i386.rpm
-rw-rw-r-- 1 root 12201 3681759 May 20 2005 MQSeriesJava-6.0.0-0.i386.rpm
-rw-rw-r-- 1 root 12201 37483080 May 20 2005 MQSeriesKeyMan-6.0.0-0.i386.rpm
-rw-rw-r-- 1 root 12201 130189 May 20 2005 MQSeriesMan-6.0.0-0.i386.rpm
-rw-rw-r-- 1 root 12201 111975 May 20 2005 MQSeriesMsg_Zh_CN-6.0.0-0.i386.rpm
-rw-rw-r-- 1 root 12201 116214 May 20 2005 MQSeriesMsg_Zh_TW-6.0.0-0.i386.rpm
-rw-rw-r-- 1 root 12201 136622 May 20 2005 MQSeriesMsg_de-6.0.0-0.i386.rpm
-rw-rw-r-- 1 root 12201 128491 May 20 2005 MQSeriesMsg_es-6.0.0-0.i386.rpm
-rw-rw-r-- 1 root 12201 130044 May 20 2005 MQSeriesMsg_fr-6.0.0-0.i386.rpm
-rw-rw-r-- 1 root 12201 128327 May 20 2005 MQSeriesMsg_it-6.0.0-0.i386.rpm
-rw-rw-r-- 1 root 12201 122076 May 20 2005 MQSeriesMsg_ja-6.0.0-0.i386.rpm
-rw-rw-r-- 1 root 12201 116664 May 20 2005 MQSeriesMsg_ko-6.0.0-0.i386.rpm
-rw-rw-r-- 1 root 12201 127411 May 20 2005 MQSeriesMsg_pt-6.0.0-0.i386.rpm
-rw-rw-r-- 1 root 12201 7877738 May 20 2005 MQSeriesRuntime-6.0.0-0.i386.rpm
-rw-rw-r-- 1 root 12201 229101 May 20 2005 MQSeriesSDK-6.0.0-0.i386.rpm
-rw-rw-r-- 1 root 12201 1307081 May 20 2005 MQSeriesSamples-6.0.0-0.i386.rpm
-rw-rw-r-- 1 root 12201 5089089 May 20 2005 MQSeriesServer-6.0.0-0.i386.rpm
-rw-rw-r-- 1 root 12201 21376 May 20 2005 MQSeriesTXClient-6.0.0-0.i386.rpm
-rw-r--r-- 1 root root 432261120 Feb 22 11:48 MQforLinux601.tar
drwxrwxr-x 3 root 12201 72 May 20 2005 PreReqs
drwxrwxr-x 14 root 12201 352 May 20 2005 READMEs
-r--r--r-- 1 root 12201 261 May 20 2005 copyright
-r--r--r-- 1 root 12201 3988581 May 20 2005 gsk7bas-7.0-3.15.i386.rpm
drwxrwxr-x 4 root 12201 144 May 20 2005 lap
drwxrwxr-x 2 root 12201 704 May 20 2005 licenses
-rwxr-xr-x 1 root 12201 4770 May 20 2005 mqlicense.sh
-rwxr-xr-x 1 root 12201 35314 May 23 2005 readadd.txt
MQServer:/tmp/mq/432 #
MQServer:/tmp/mq/432 # ./mqlicense.sh -accept
Licensed Materials - Property of IBM
5724-H72
(C) Copyright IBM Corporation 1994, 2005 All rights reserved.
US Government Users Restricted Rights - Use, duplication or disclosure
restricted by GSA ADP Schedule Contract with IBM Corp.
Agreement accepted: Proceed with install.
MQServer:/tmp/mq/432 #
MQServer:/tmp/mq/432 # rpm -ivh MQSeriesRuntime-6.0.0-0.i386.rpm MQSeriesSDK-6.0.0-0.i386.rpm MQSeriesServer-6.0.0-0.i386.rpm MQSeriesClient-6.0.0-0.i386.rpm MQSeriesSamples-6.0.0-0.i386.rpm MQSeriesJava-6.0.0-0.i386.rpm MQSeriesMan-6.0.0-0.i386.rpmPreparing... ########################################### [100%]
1:MQSeriesRuntime ########################################### [ 14%]
2:MQSeriesSDK ########################################### [ 29%]
3:MQSeriesServer ########################################### [ 43%]
4:MQSeriesClient ########################################### [ 57%]
5:MQSeriesSamples ########################################### [ 71%]
6:MQSeriesJava ########################################### [ 86%]
7:MQSeriesMan ########################################### [100%]
MQServer:/tmp/mq/432 # rpm -ivh --force --nodeps MQSeriesFTA-6.0.0-0.i386.rpm MQSeriesIES30-6.0.0-0.i386.rpm MQSeriesConfig-6.0.0-0.i386.rpm
Preparing... ########################################### [100%]
1:MQSeriesIES30 ########################################### [ 33%]
2:MQSeriesFTA ########################################### [ 67%]
3:MQSeriesConfig ########################################### [100%]
MQServer:/tmp/mq/432 #
MQServer:/tmp/mq/432 # ls -l
total 782236
drwxr-xr-x 6 root root 1408 Mar 26 00:42 .
drwxr-xr-x 3 root root 176 Mar 26 00:39 ..
-r--r--r-- 1 root 12201 56517147 May 20 2005 IBMJava2-SDK-1.4.2-0.0.i386.rpm
-rw-rw-r-- 1 root 12201 963879 May 20 2005 MQSeriesClient-6.0.0-0.i386.rpm
-rw-rw-r-- 1 root 12201 84765428 May 20 2005 MQSeriesConfig-6.0.0-0.i386.rpm
-rw-rw-r-- 1 root 12201 719764 May 20 2005 MQSeriesFTA-6.0.0-0.i386.rpm
-rw-rw-r-- 1 root 12201 163979050 May 20 2005 MQSeriesIES30-6.0.0-0.i386.rpm
-rw-rw-r-- 1 root 12201 3681759 May 20 2005 MQSeriesJava-6.0.0-0.i386.rpm
-rw-rw-r-- 1 root 12201 37483080 May 20 2005 MQSeriesKeyMan-6.0.0-0.i386.rpm
-rw-rw-r-- 1 root 12201 130189 May 20 2005 MQSeriesMan-6.0.0-0.i386.rpm
-rw-rw-r-- 1 root 12201 111975 May 20 2005 MQSeriesMsg_Zh_CN-6.0.0-0.i386.rpm
-rw-rw-r-- 1 root 12201 116214 May 20 2005 MQSeriesMsg_Zh_TW-6.0.0-0.i386.rpm
-rw-rw-r-- 1 root 12201 136622 May 20 2005 MQSeriesMsg_de-6.0.0-0.i386.rpm
-rw-rw-r-- 1 root 12201 128491 May 20 2005 MQSeriesMsg_es-6.0.0-0.i386.rpm
-rw-rw-r-- 1 root 12201 130044 May 20 2005 MQSeriesMsg_fr-6.0.0-0.i386.rpm
-rw-rw-r-- 1 root 12201 128327 May 20 2005 MQSeriesMsg_it-6.0.0-0.i386.rpm
-rw-rw-r-- 1 root 12201 122076 May 20 2005 MQSeriesMsg_ja-6.0.0-0.i386.rpm
-rw-rw-r-- 1 root 12201 116664 May 20 2005 MQSeriesMsg_ko-6.0.0-0.i386.rpm
-rw-rw-r-- 1 root 12201 127411 May 20 2005 MQSeriesMsg_pt-6.0.0-0.i386.rpm
-rw-rw-r-- 1 root 12201 7877738 May 20 2005 MQSeriesRuntime-6.0.0-0.i386.rpm
-rw-rw-r-- 1 root 12201 229101 May 20 2005 MQSeriesSDK-6.0.0-0.i386.rpm
-rw-rw-r-- 1 root 12201 1307081 May 20 2005 MQSeriesSamples-6.0.0-0.i386.rpm
-rw-rw-r-- 1 root 12201 5089089 May 20 2005 MQSeriesServer-6.0.0-0.i386.rpm
-rw-rw-r-- 1 root 12201 21376 May 20 2005 MQSeriesTXClient-6.0.0-0.i386.rpm
-rw-r--r-- 1 root root 432261120 Feb 22 11:48 MQforLinux601.tar
drwxrwxr-x 3 root 12201 72 May 20 2005 PreReqs
drwxrwxr-x 14 root 12201 352 May 20 2005 READMEs
-r--r--r-- 1 root 12201 261 May 20 2005 copyright
-r--r--r-- 1 root 12201 3988581 May 20 2005 gsk7bas-7.0-3.15.i386.rpm
drwxrwxr-x 4 root 12201 144 May 20 2005 lap
drwxrwxr-x 2 root 12201 704 May 20 2005 licenses
-rwxr-xr-x 1 root 12201 4770 May 20 2005 mqlicense.sh
-rwxr-xr-x 1 root 12201 35314 May 23 2005 readadd.txt
MQServer:/tmp/mq/432 #
MQServer:/tmp/mq # mkdir 378
MQServer:/tmp/mq # mv 6.0-WS-MQ-LinuxIA32-RP0002.tar ./378
MQServer:/tmp/mq # ls -l
total 5278
drwxr-xr-x 4 root root 152 Mar 26 00:54 .
drwxrwxrwt 13 root root 544 Mar 26 00:53 ..
drwxr-xr-x 2 root root 96 Mar 26 00:54 378
drwxr-xr-x 6 root root 280 Mar 26 00:53 432
-rw-r--r-- 1 root root 5396480 Feb 22 11:48 6.0.2.0-WS-MQ-LinuxIA32-LAIY96282.tar
MQServer:/tmp/mq # cd 378
MQServer:/tmp/mq/378 # ls -l
total 370121
drwxr-xr-x 2 root root 96 Mar 26 00:54 .
drwxr-xr-x 4 root root 152 Mar 26 00:54 ..
-rw-r--r-- 1 root root 378634240 Feb 22 11:46 6.0-WS-MQ-LinuxIA32-RP0002.tar
MQServer:/tmp/mq/378 #
MQServer:/tmp/mq/378 # tar xvf 6.0-WS-MQ-LinuxIA32-RP0002.tar ./
gsk7bas-7.0-3.18.i386.rpm
IBMJava2-142-ia32-SDK-1.4.2-5.0.i386.rpm
MQSeriesClient-U806639-6.0.2-0.i386.rpm
MQSeriesConfig-U806639-6.0.2-0.i386.rpm
MQSeriesFTA-U806639-6.0.2-0.i386.rpm
MQSeriesIES30-U806639-6.0.2-0.i386.rpm
MQSeriesJava-U806639-6.0.2-0.i386.rpm
MQSeriesKeyMan-U806639-6.0.2-0.i386.rpm
MQSeriesMan-U806639-6.0.2-0.i386.rpm
MQSeriesMsg_de-U806639-6.0.2-0.i386.rpm
MQSeriesMsg_es-U806639-6.0.2-0.i386.rpm
MQSeriesMsg_fr-U806639-6.0.2-0.i386.rpm
MQSeriesMsg_it-U806639-6.0.2-0.i386.rpm
MQSeriesMsg_ja-U806639-6.0.2-0.i386.rpm
MQSeriesMsg_ko-U806639-6.0.2-0.i386.rpm
MQSeriesMsg_pt-U806639-6.0.2-0.i386.rpm
MQSeriesMsg_Zh_CN-U806639-6.0.2-0.i386.rpm
MQSeriesMsg_Zh_TW-U806639-6.0.2-0.i386.rpm
MQSeriesRuntime-U806639-6.0.2-0.i386.rpm
MQSeriesSamples-U806639-6.0.2-0.i386.rpm
MQSeriesSDK-U806639-6.0.2-0.i386.rpm
MQSeriesServer-U806639-6.0.2-0.i386.rpm
MQSeriesTXClient-U806639-6.0.2-0.i386.rpm
memo.ptf
readme.txt
readadd.txt
MQServer:/tmp/mq/378 # ls -l
total 740263
drwxr-xr-x 2 root root 1488 Mar 26 00:54 .
drwxr-xr-x 4 root root 152 Mar 26 00:54 ..
-rw-r--r-- 1 root root 378634240 Feb 22 11:46 6.0-WS-MQ-LinuxIA32-RP0002.tar
-r--r--r-- 1 root 12201 58425242 Sep 28 2006 IBMJava2-142-ia32-SDK-1.4.2-5.0.i386.rpm
-rw-r--r-- 1 root 12201 1041870 Sep 28 2006 MQSeriesClient-U806639-6.0.2-0.i386.rpm
-rw-r--r-- 1 root 12201 92867916 Sep 28 2006 MQSeriesConfig-U806639-6.0.2-0.i386.rpm
-rw-r--r-- 1 root 12201 742674 Sep 28 2006 MQSeriesFTA-U806639-6.0.2-0.i386.rpm
-rw-r--r-- 1 root 12201 165192528 Sep 28 2006 MQSeriesIES30-U806639-6.0.2-0.i386.rpm
-rw-r--r-- 1 root 12201 6825037 Sep 28 2006 MQSeriesJava-U806639-6.0.2-0.i386.rpm
-rw-r--r-- 1 root 12201 37541482 Sep 28 2006 MQSeriesKeyMan-U806639-6.0.2-0.i386.rpm
-rw-r--r-- 1 root 12201 158230 Sep 28 2006 MQSeriesMan-U806639-6.0.2-0.i386.rpm
-rw-r--r-- 1 root 12201 133102 Sep 28 2006 MQSeriesMsg_Zh_CN-U806639-6.0.2-0.i386.rpm
-rw-r--r-- 1 root 12201 137261 Sep 28 2006 MQSeriesMsg_Zh_TW-U806639-6.0.2-0.i386.rpm
-rw-r--r-- 1 root 12201 157792 Sep 28 2006 MQSeriesMsg_de-U806639-6.0.2-0.i386.rpm
-rw-r--r-- 1 root 12201 149548 Sep 28 2006 MQSeriesMsg_es-U806639-6.0.2-0.i386.rpm
-rw-r--r-- 1 root 12201 151037 Sep 28 2006 MQSeriesMsg_fr-U806639-6.0.2-0.i386.rpm
-rw-r--r-- 1 root 12201 149446 Sep 28 2006 MQSeriesMsg_it-U806639-6.0.2-0.i386.rpm
-rw-r--r-- 1 root 12201 143167 Sep 28 2006 MQSeriesMsg_ja-U806639-6.0.2-0.i386.rpm
-rw-r--r-- 1 root 12201 139096 Sep 28 2006 MQSeriesMsg_ko-U806639-6.0.2-0.i386.rpm
-rw-r--r-- 1 root 12201 148484 Sep 28 2006 MQSeriesMsg_pt-U806639-6.0.2-0.i386.rpm
-rw-r--r-- 1 root 12201 3482646 Sep 28 2006 MQSeriesRuntime-U806639-6.0.2-0.i386.rpm
-rw-r--r-- 1 root 12201 227539 Sep 28 2006 MQSeriesSDK-U806639-6.0.2-0.i386.rpm
-rw-r--r-- 1 root 12201 1360466 Sep 28 2006 MQSeriesSamples-U806639-6.0.2-0.i386.rpm
-rw-r--r-- 1 root 12201 5179708 Sep 28 2006 MQSeriesServer-U806639-6.0.2-0.i386.rpm
-rw-r--r-- 1 root 12201 44639 Sep 28 2006 MQSeriesTXClient-U806639-6.0.2-0.i386.rpm
-r--r--r-- 1 root 12201 4021017 Sep 28 2006 gsk7bas-7.0-3.18.i386.rpm
-r--r--r-- 1 root 12201 43127 Sep 28 2006 memo.ptf
-r--r--r-- 1 root 12201 30584 Sep 28 2006 readadd.txt
-r--r--r-- 1 root 12201 118226 Sep 28 2006 readme.txt
MQServer:/tmp/mq/378 # rpm -ivh MQSeriesIES30-U806639-6.0.2-0.i386.rpm MQSeriesSamples-U806639-6.0.2-0.i386.rpm MQSeriesSDK-U806639-6.0.2-0.i386.rpm MQSeriesJava-U806639-6.0.2-0.i386.rpm MQSeriesConfig-U806639-6.0.2-0.i386.rpm MQSeriesServer-U806639-6.0.2-0.i386.rpm MQSeriesMan-U806639-6.0.2-0.i386.rpm MQSeriesClient-U806639-6.0.2-0.i386.rpm MQSeriesRuntime-U806639-6.0.2-0.i386.rpm MQSeriesFTA-U806639-6.0.2-0.i386.rpm
Preparing... ########################################### [100%]
1:MQSeriesFTA-U806639 ########################################### [ 10%]
2:MQSeriesIES30-U806639 ########################################### [ 20%]
3:MQSeriesSamples-U806639########################################### [ 30%]
4:MQSeriesSDK-U806639 ########################################### [ 40%]
5:MQSeriesJava-U806639 ########################################### [ 50%]
6:MQSeriesConfig-U806639 ########################################### [ 60%]
7:MQSeriesServer-U806639 ########################################### [ 70%]
8:MQSeriesMan-U806639 ########################################### [ 80%]
9:MQSeriesClient-U806639 ########################################### [ 90%]
10:MQSeriesRuntime-U806639########################################### [100%]
MQServer:/tmp/mq/# mkdir 53
MQServer:/tmp/mq/# mv 6.0.2.0-WS-MQ-LinuxIA32-LAIY96282.tar ./53
MQServer:/tmp/mq/# cd 53
MQServer:/tmp/mq/53/# tar xvf 6.0.2.0-WS-MQ-LinuxIA32-LAIY96282.tar
MQServer:/tmp/mq/# cp /tmp/mq/53/lib/libmqmcs.so /opt/mqm/lib/libmqmcs.so
MQServer:/tmp/mq/# cp /tmp/mq/53/lib/libmqmcs_r.so /opt/mqm/lib/libmqmcs_r.so
MQServer:/tmp/mq/# cp /tmp/mq/53/lib/libmqz.so /opt/mqm/lib/libmqz.so
MQServer:/tmp/mq/# cp /tmp/mq/53/lib/libmqz_r.so /opt/mqm/lib/libmqz_r.so
MQServer:/tmp/mq/# su - mqm
MQServer:/tmp/mq/~> dspmqver
Name: WebSphere MQ
Version: 6.0.2.0
CMVC level: p600-200-060921
BuildType: IKAP - (Production)
itshow
2010年12月25日星期六
Linux下检查系统开放的端口及服务
以下是在RHEL5中运行示例: [root@RHEL5 ~]# nmap -sT -O localhost
Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2008-03-19 22:14 CST
mass_dns: warning: Unable to determine any DNS servers. Reverse DNS is disabled. Try using --system-dns or specify valid servers with --dns_servers
Interesting ports on localhost.localdomain (127.0.0.1):
Not shown: 1670 closed ports
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
23/tcp open telnet
25/tcp open smtp
111/tcp open rpcbind
609/tcp open npmp-trap
631/tcp open ipp
1521/tcp open oracle
2601/tcp open zebra
6103/tcp open RETS-or-BackupExec
No exact OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi).
TCP/IP fingerprint:
SInfo(V=4.11%P=i686-redhat-linux-gnu%D=3/19%Tm=47E11FD8%O=21%C=1)
Nmap finished: 1 IP address (1 host up) scanned in 9.886 seconds
或者使用netstat -anp命令来查看:
[root@RHEL5 ~]# netstat -anp | grep LISTEN
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 127.0.0.1:2208 0.0.0.0:* LISTEN 1894/hpiod
tcp 0 0 0.0.0.0:609 0.0.0.0:* LISTEN 1699/rpc.statd
tcp 0 0 0.0.0.0:111 0.0.0.0:* LISTEN 1669/portmap
tcp 0 0 0.0.0.0:1521 0.0.0.0:* LISTEN 29463/tnslsnr
tcp 0 0 0.0.0.0:21 0.0.0.0:* LISTEN 25248/vsftpd
tcp 0 0 0.0.0.0:23 0.0.0.0:* LISTEN 25182/xinetd
tcp 0 0 127.0.0.1:631 0.0.0.0:* LISTEN 1911/cupsd
tcp 0 0 0.0.0.0:6103 0.0.0.0:* LISTEN 29394/ora_d000_ora1
tcp 0 0 127.0.0.1:25 0.0.0.0:* LISTEN 1971/sendmail: acce
tcp 0 0 127.0.0.1:2207 0.0.0.0:* LISTEN 1899/python
tcp 0 0 :::2601 :::* LISTEN 3039/zebra
tcp 0 0 :::22 :::* LISTEN 1925/sshd
[root@RHEL5 ~]# lsof -n -i | grep LISTEN
COMMAND PID USER FD TYPE DEVICE SIZE NODE NAME
portmap 1669 rpc 4u IPv4 4861 TCP *:sunrpc (LISTEN)
rpc.statd 1699 root 7u IPv4 4930 TCP *:npmp-trap (LISTEN)
hpiod 1894 root 0u IPv4 5369 TCP 127.0.0.1:2208 (LISTEN)
python 1899 root 4u IPv4 5405 TCP 127.0.0.1:2207 (LISTEN)
cupsd 1911 root 2u IPv4 791632 TCP 127.0.0.1:ipp (LISTEN)
sshd 1925 root 3u IPv6 5461 TCP *:ssh (LISTEN)
sendmail 1971 root 4u IPv4 5627 TCP 127.0.0.1:smtp (LISTEN)
zebra 3039 root 10u IPv6 9912 TCP *:discp-client (LISTEN)
xinetd 25182 root 5u IPv4 879173 TCP *:telnet (LISTEN)
vsftpd 25248 root 3u IPv4 879367 TCP *:ftp (LISTEN)
oracle 29394 oracle 17u IPv4 285612 TCP *:rets (LISTEN)
tnslsnr 29463 oracle 7u IPv4 286748 TCP *:ncube-lm (LISTEN)
Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2008-03-19 22:14 CST
mass_dns: warning: Unable to determine any DNS servers. Reverse DNS is disabled. Try using --system-dns or specify valid servers with --dns_servers
Interesting ports on localhost.localdomain (127.0.0.1):
Not shown: 1670 closed ports
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
23/tcp open telnet
25/tcp open smtp
111/tcp open rpcbind
609/tcp open npmp-trap
631/tcp open ipp
1521/tcp open oracle
2601/tcp open zebra
6103/tcp open RETS-or-BackupExec
No exact OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi).
TCP/IP fingerprint:
SInfo(V=4.11%P=i686-redhat-linux-gnu%D=3/19%Tm=47E11FD8%O=21%C=1)
Nmap finished: 1 IP address (1 host up) scanned in 9.886 seconds
或者使用netstat -anp命令来查看:
[root@RHEL5 ~]# netstat -anp | grep LISTEN
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 127.0.0.1:2208 0.0.0.0:* LISTEN 1894/hpiod
tcp 0 0 0.0.0.0:609 0.0.0.0:* LISTEN 1699/rpc.statd
tcp 0 0 0.0.0.0:111 0.0.0.0:* LISTEN 1669/portmap
tcp 0 0 0.0.0.0:1521 0.0.0.0:* LISTEN 29463/tnslsnr
tcp 0 0 0.0.0.0:21 0.0.0.0:* LISTEN 25248/vsftpd
tcp 0 0 0.0.0.0:23 0.0.0.0:* LISTEN 25182/xinetd
tcp 0 0 127.0.0.1:631 0.0.0.0:* LISTEN 1911/cupsd
tcp 0 0 0.0.0.0:6103 0.0.0.0:* LISTEN 29394/ora_d000_ora1
tcp 0 0 127.0.0.1:25 0.0.0.0:* LISTEN 1971/sendmail: acce
tcp 0 0 127.0.0.1:2207 0.0.0.0:* LISTEN 1899/python
tcp 0 0 :::2601 :::* LISTEN 3039/zebra
tcp 0 0 :::22 :::* LISTEN 1925/sshd
[root@RHEL5 ~]# lsof -n -i | grep LISTEN
COMMAND PID USER FD TYPE DEVICE SIZE NODE NAME
portmap 1669 rpc 4u IPv4 4861 TCP *:sunrpc (LISTEN)
rpc.statd 1699 root 7u IPv4 4930 TCP *:npmp-trap (LISTEN)
hpiod 1894 root 0u IPv4 5369 TCP 127.0.0.1:2208 (LISTEN)
python 1899 root 4u IPv4 5405 TCP 127.0.0.1:2207 (LISTEN)
cupsd 1911 root 2u IPv4 791632 TCP 127.0.0.1:ipp (LISTEN)
sshd 1925 root 3u IPv6 5461 TCP *:ssh (LISTEN)
sendmail 1971 root 4u IPv4 5627 TCP 127.0.0.1:smtp (LISTEN)
zebra 3039 root 10u IPv6 9912 TCP *:discp-client (LISTEN)
xinetd 25182 root 5u IPv4 879173 TCP *:telnet (LISTEN)
vsftpd 25248 root 3u IPv4 879367 TCP *:ftp (LISTEN)
oracle 29394 oracle 17u IPv4 285612 TCP *:rets (LISTEN)
tnslsnr 29463 oracle 7u IPv4 286748 TCP *:ncube-lm (LISTEN)
Cisco RIP动态路协议之被动接口实验
网络拓朴:
路由器配置:
R1路由器:
version 12.1
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname R1
!
memory-size iomem 15
ip subnet-zero
no ip domain-lookup
!
interface Loopback0
ip address 10.1.1.1 255.255.255.0
!
interface FastEthernet0/0
ip address 148.1.1.1 255.255.255.0
no keepalive
duplex auto
speed auto
!
interface FastEthernet0/1
ip address 192.1.1.1 255.255.255.0
duplex auto
speed auto
!
router rip
passive-interface FastEthernet0/1
network 10.0.0.0
network 148.1.0.0
network 192.1.1.0!
ip classless
no ip http server
!
line con 0
transport input none
line aux 0
line vty 0 4
!
no scheduler allocate
end
R2路由器:
version 12.1
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname R2
!
memory-size iomem 15
ip subnet-zero
no ip domain-lookup
!
interface Ethernet1/0
ip address 192.1.1.2 255.255.255.0
!
interface Ethernet1/1
ip address 193.1.1.1 255.255.255.0
!
interface Ethernet1/2
no ip address
shutdown
!
interface Ethernet1/3
no ip address
shutdown
!
router rip
network 192.1.1.0
network 193.1.1.0
!
ip classless
no ip http server
!
line con 0
transport input none
line aux 0
line vty 0 4
!
no scheduler allocate
end
R3路由器:
version 12.1
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname R3
!
memory-size iomem 15
ip subnet-zero
no ip domain-lookup
!
interface Ethernet1/0
ip address 193.1.1.2 255.255.255.0
!
interface Ethernet1/1
ip address 152.1.1.1 255.255.255.0
!
interface Ethernet1/2
no ip address
shutdown
!
interface Ethernet1/3
no ip address
shutdown
!
router rip
network 152.1.0.0
network 193.1.1.0
!
ip classless
no ip http server
!
line con 0
transport input none
line aux 0
line vty 0 4
!
no scheduler allocate
end
04:18:00: RIP: received v1 update from 192.1.1.2 on FastEthernet0/1
04:18:00: 152.1.0.0 in 2 hops
04:18:00: 193.1.1.0 in 1 hops04:18:17: RIP: sending v1 update to 255.255.255.255 via FastEthernet0/0 (148.1.1.1)
04:18:17: RIP: build update entries
04:18:17: network 10.0.0.0 metric 1
04:18:17: network 152.1.0.0 metric 3
04:18:17: network 192.1.1.0 metric 1
04:18:17: network 193.1.1.0 metric 2
04:18:17: RIP: sending v1 update to 255.255.255.255 via Loopback0 (10.1.1.1)
04:18:17: RIP: build update entries
04:18:17: network 148.1.0.0 metric 1
04:18:17: network 152.1.0.0 metric 3
04:18:17: network 192.1.1.0 metric 1
04:18:17: network 193.1.1.0 metric 2
R1#sh ip route rip
R 152.1.0.0/16 [120/2] via 192.1.1.2, 00:00:06, FastEthernet0/1
R 193.1.1.0/24 [120/1] via 192.1.1.2, 00:00:06, FastEthernet0/1
R2#sh ip route rip
R 152.1.0.0/16 [120/1] via 193.1.1.2, 00:00:12, Ethernet1/1
R3#sh ip route rip
R 192.1.1.0/24 [120/1] via 193.1.1.1, 00:00:07, Ethernet1/0
注意到路由器R1从路由器R3学到所有的路径,而路由器R3不从路由器R1学任何路径。
路由器配置:
R1路由器:
version 12.1
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname R1
!
memory-size iomem 15
ip subnet-zero
no ip domain-lookup
!
interface Loopback0
ip address 10.1.1.1 255.255.255.0
!
interface FastEthernet0/0
ip address 148.1.1.1 255.255.255.0
no keepalive
duplex auto
speed auto
!
interface FastEthernet0/1
ip address 192.1.1.1 255.255.255.0
duplex auto
speed auto
!
router rip
passive-interface FastEthernet0/1
network 10.0.0.0
network 148.1.0.0
network 192.1.1.0!
ip classless
no ip http server
!
line con 0
transport input none
line aux 0
line vty 0 4
!
no scheduler allocate
end
R2路由器:
version 12.1
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname R2
!
memory-size iomem 15
ip subnet-zero
no ip domain-lookup
!
interface Ethernet1/0
ip address 192.1.1.2 255.255.255.0
!
interface Ethernet1/1
ip address 193.1.1.1 255.255.255.0
!
interface Ethernet1/2
no ip address
shutdown
!
interface Ethernet1/3
no ip address
shutdown
!
router rip
network 192.1.1.0
network 193.1.1.0
!
ip classless
no ip http server
!
line con 0
transport input none
line aux 0
line vty 0 4
!
no scheduler allocate
end
R3路由器:
version 12.1
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname R3
!
memory-size iomem 15
ip subnet-zero
no ip domain-lookup
!
interface Ethernet1/0
ip address 193.1.1.2 255.255.255.0
!
interface Ethernet1/1
ip address 152.1.1.1 255.255.255.0
!
interface Ethernet1/2
no ip address
shutdown
!
interface Ethernet1/3
no ip address
shutdown
!
router rip
network 152.1.0.0
network 193.1.1.0
!
ip classless
no ip http server
!
line con 0
transport input none
line aux 0
line vty 0 4
!
no scheduler allocate
end
04:18:00: RIP: received v1 update from 192.1.1.2 on FastEthernet0/1
04:18:00: 152.1.0.0 in 2 hops
04:18:00: 193.1.1.0 in 1 hops04:18:17: RIP: sending v1 update to 255.255.255.255 via FastEthernet0/0 (148.1.1.1)
04:18:17: RIP: build update entries
04:18:17: network 10.0.0.0 metric 1
04:18:17: network 152.1.0.0 metric 3
04:18:17: network 192.1.1.0 metric 1
04:18:17: network 193.1.1.0 metric 2
04:18:17: RIP: sending v1 update to 255.255.255.255 via Loopback0 (10.1.1.1)
04:18:17: RIP: build update entries
04:18:17: network 148.1.0.0 metric 1
04:18:17: network 152.1.0.0 metric 3
04:18:17: network 192.1.1.0 metric 1
04:18:17: network 193.1.1.0 metric 2
R1#sh ip route rip
R 152.1.0.0/16 [120/2] via 192.1.1.2, 00:00:06, FastEthernet0/1
R 193.1.1.0/24 [120/1] via 192.1.1.2, 00:00:06, FastEthernet0/1
R2#sh ip route rip
R 152.1.0.0/16 [120/1] via 193.1.1.2, 00:00:12, Ethernet1/1
R3#sh ip route rip
R 192.1.1.0/24 [120/1] via 193.1.1.1, 00:00:07, Ethernet1/0
注意到路由器R1从路由器R3学到所有的路径,而路由器R3不从路由器R1学任何路径。
Cisco路由器动态内部源地址转换实验
实验网络拓朴:
实验目的:演示内部源地址到内部全局地址之间的动态转换。路由器R2把10.1.1.1到10.1.1.3之间的任一源地址动态转换为地址池中的三个内部全局地址之一(Internet注册过的唯一全局地址)。
监测配置:在路由器R2上,用扩展ping命令测试配置,在特权模式下键入ping即可。
R2#pingProtocol [ip]:
Target IP address: 152.1.1.1Repeat count [5]: 10
Datagram size [100]:
Timeout in seconds [2]:
Extended commands [n]: ySource address or interface: 10.1.1.1
Type of service [0]:
Set DF bit in IP header? [no]:
Validate reply data? [no]:
Data pattern [0xABCD]:
Loose, Strict, Record, Timestamp, Verbose[none]:
Sweep range of sizes [n]:
1) 从路由器R2,用源地址10.1.1.2 ping 152.1.1.1
2) 从路由器R2,用源地址10.1.1.1 ping 152.1.1.1
3) 从路由器R2,用源地址10.1.1.3 ping 152.1.1.1
在路由器R2上执行debug ip nat命令,可得知IP地址转换情况,如下所示:
12:00:29: NAT: s=10.1.1.1->195.1.1.1, d=152.1.1.1 [1]
12:00:29: NAT*: s=152.1.1.1, d=195.1.1.1->10.1.1.1 [1]
12:01:26: NAT: s=10.1.1.2->195.1.1.2, d=152.1.1.1 [11]
12:01:26: NAT*: s=152.1.1.1, d=195.1.1.2->10.1.1.2 [11]
12:01:55: NAT: s=10.1.1.3->195.1.1.3, d=152.1.1.1 [16]
12:01:55: NAT*: s=152.1.1.1, d=195.1.1.3->10.1.1.3 [16]
当第4台终端站点想访问外面的网络时,所发生的情况,但是IP地址池中的的所有地址都用完了,如下所示:
12:02:33: NAT: translation failed (E), dropping packet s=10.1.1.4 d=152.1.1.1.
12:02:35: NAT: translation failed (E), dropping packet s=10.1.1.4 d=152.1.1.1.
R2#sh ip nat translations
Pro Inside global Inside local Outside local Outside global
--- 195.1.1.1 10.1.1.1 --- ---
--- 195.1.1.2 10.1.1.2 --- ---
--- 195.1.1.3 10.1.1.3 --- ---
从上面的例子可知,虽然动态地址转换比静态转换效率更高,但每一转换仍需要自己
的地址。因此,网络管理者必须正确地掌握离线访问的通信量并相应地定义地址池的大小。
路由器配置:
R2路由器:
version 12.1
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname R2
!
memory-size iomem 15
ip subnet-zero
!
interface Ethernet1/0
ip address 10.1.1.1 255.255.255.0 secondary
ip address 10.1.1.2 255.255.255.0 secondary
ip address 10.1.1.3 255.255.255.0 secondary
ip address 10.1.1.4 255.255.255.0 secondary
ip address 10.1.1.5 255.255.255.0
ip nat inside
!
interface Ethernet1/1
ip address 195.1.1.4 255.255.255.0
ip nat outside
!
ip nat pool globalpool 195.1.1.1 195.1.1.3 netmask 255.255.255.0ip nat inside source list 1 pool globalpool
ip classless
ip route 152.1.1.1 255.255.255.255 Ethernet1/1no ip http server
!
access-list 1 permit 10.1.1.2
access-list 1 permit 10.1.1.3
access-list 1 permit 10.1.1.1
access-list 1 permit 10.1.1.4!
line con 0
transport input none
line aux 0
line vty 0 4
login
!
end
R3路由器:
version 12.1
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname R3
!
memory-size iomem 15
ip subnet-zero
!
interface Ethernet1/0
ip address 195.1.1.10 255.255.255.0
!
interface Ethernet1/1
ip address 152.1.1.1 255.255.255.0
!
interface Ethernet1/2
no ip address
shutdown
!
interface Ethernet1/3
no ip address
shutdown
!
ip classless
no ip http server
!
line con 0
transport input none
line aux 0
line vty 0 4
login
!
end
实验目的:演示内部源地址到内部全局地址之间的动态转换。路由器R2把10.1.1.1到10.1.1.3之间的任一源地址动态转换为地址池中的三个内部全局地址之一(Internet注册过的唯一全局地址)。
监测配置:在路由器R2上,用扩展ping命令测试配置,在特权模式下键入ping即可。
R2#pingProtocol [ip]:
Target IP address: 152.1.1.1Repeat count [5]: 10
Datagram size [100]:
Timeout in seconds [2]:
Extended commands [n]: ySource address or interface: 10.1.1.1
Type of service [0]:
Set DF bit in IP header? [no]:
Validate reply data? [no]:
Data pattern [0xABCD]:
Loose, Strict, Record, Timestamp, Verbose[none]:
Sweep range of sizes [n]:
1) 从路由器R2,用源地址10.1.1.2 ping 152.1.1.1
2) 从路由器R2,用源地址10.1.1.1 ping 152.1.1.1
3) 从路由器R2,用源地址10.1.1.3 ping 152.1.1.1
在路由器R2上执行debug ip nat命令,可得知IP地址转换情况,如下所示:
12:00:29: NAT: s=10.1.1.1->195.1.1.1, d=152.1.1.1 [1]
12:00:29: NAT*: s=152.1.1.1, d=195.1.1.1->10.1.1.1 [1]
12:01:26: NAT: s=10.1.1.2->195.1.1.2, d=152.1.1.1 [11]
12:01:26: NAT*: s=152.1.1.1, d=195.1.1.2->10.1.1.2 [11]
12:01:55: NAT: s=10.1.1.3->195.1.1.3, d=152.1.1.1 [16]
12:01:55: NAT*: s=152.1.1.1, d=195.1.1.3->10.1.1.3 [16]
当第4台终端站点想访问外面的网络时,所发生的情况,但是IP地址池中的的所有地址都用完了,如下所示:
12:02:33: NAT: translation failed (E), dropping packet s=10.1.1.4 d=152.1.1.1.
12:02:35: NAT: translation failed (E), dropping packet s=10.1.1.4 d=152.1.1.1.
R2#sh ip nat translations
Pro Inside global Inside local Outside local Outside global
--- 195.1.1.1 10.1.1.1 --- ---
--- 195.1.1.2 10.1.1.2 --- ---
--- 195.1.1.3 10.1.1.3 --- ---
从上面的例子可知,虽然动态地址转换比静态转换效率更高,但每一转换仍需要自己
的地址。因此,网络管理者必须正确地掌握离线访问的通信量并相应地定义地址池的大小。
路由器配置:
R2路由器:
version 12.1
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname R2
!
memory-size iomem 15
ip subnet-zero
!
interface Ethernet1/0
ip address 10.1.1.1 255.255.255.0 secondary
ip address 10.1.1.2 255.255.255.0 secondary
ip address 10.1.1.3 255.255.255.0 secondary
ip address 10.1.1.4 255.255.255.0 secondary
ip address 10.1.1.5 255.255.255.0
ip nat inside
!
interface Ethernet1/1
ip address 195.1.1.4 255.255.255.0
ip nat outside
!
ip nat pool globalpool 195.1.1.1 195.1.1.3 netmask 255.255.255.0ip nat inside source list 1 pool globalpool
ip classless
ip route 152.1.1.1 255.255.255.255 Ethernet1/1no ip http server
!
access-list 1 permit 10.1.1.2
access-list 1 permit 10.1.1.3
access-list 1 permit 10.1.1.1
access-list 1 permit 10.1.1.4!
line con 0
transport input none
line aux 0
line vty 0 4
login
!
end
R3路由器:
version 12.1
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname R3
!
memory-size iomem 15
ip subnet-zero
!
interface Ethernet1/0
ip address 195.1.1.10 255.255.255.0
!
interface Ethernet1/1
ip address 152.1.1.1 255.255.255.0
!
interface Ethernet1/2
no ip address
shutdown
!
interface Ethernet1/3
no ip address
shutdown
!
ip classless
no ip http server
!
line con 0
transport input none
line aux 0
line vty 0 4
login
!
end
Cisco路由器静态内部源地址转换实验
实验网络拓扑:
实验目的:R2路由器配置了NAT,把源地址10.1.1.2/24(R1路由器F0/1 IP地址,在这里称为内部地址)转换为195.1.1.1/32(模拟公网IP地址,在这里称为外部地址),提供外网用户访问。R1和R4模拟PC。
路由器配置:
R2路由器:
version 12.1
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname R2
!
memory-size iomem 15
ip subnet-zero
!
interface Ethernet1/0
ip address 10.1.1.1 255.255.255.0
ip nat inside
!
interface Ethernet1/1
ip address 195.1.1.4 255.255.255.0
ip nat outside
!
ip nat inside source static 10.1.1.2 195.1.1.1
ip classless
ip route 152.1.1.2 255.255.255.255 Ethernet1/1
no ip http server
!
line con 0
transport input none
line aux 0
line vty 0 4
!
no scheduler allocate
end
R3路由器:
version 12.1
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname R3
!
memory-size iomem 15
ip subnet-zero
!
interface Ethernet1/0
ip address 195.1.1.10 255.255.255.0
!
interface Ethernet1/1
ip address 152.1.1.1 255.255.255.0
!
no ip address
shutdown
!
ip classless
no ip http server
!
line con 0
transport input none
line aux 0
line vty 0 4
!
no scheduler allocate
end
R1路由器:
version 12.1
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname R1
!
memory-size iomem 15
ip subnet-zero
!
interface FastEthernet0/1
ip address 10.1.1.2 255.255.255.0
duplex auto
speed auto
!
ip classless
ip route 0.0.0.0 0.0.0.0 10.1.1.1
no ip http server
!
line con 0
transport input none
line aux 0
line vty 0 4
!
no scheduler allocate
end
R4路由器:
version 12.1
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname R4
!
memory-size iomem 15
ip subnet-zero
!
interface FastEthernet0/0
ip address 152.1.1.2 255.255.255.0
duplex auto
speed auto
!
ip classless
ip route 0.0.0.0 0.0.0.0 152.1.1.1
no ip http server
!
line con 0
transport input none
line aux 0
line vty 0 4
!
no scheduler allocate
end
监测配置:
从R1路由器ping 152.1.1.2(R4路由器F0/0 IP地址),用debug ip packet命令分析到达R4的报文,命令执行结果如下:
R1#debug ip packetIP packet debugging is on
R1#ping 152.1.1.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 152.1.1.2, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/37/68 ms
R1#
00:21:28: IP: s=10.1.1.2 (local), d=152.1.1.2 (FastEthernet0/1), len 100, sending <-----ICMP ECHO00:21:28: IP: s=152.1.1.2 (FastEthernet0/1), d=10.1.1.2 (FastEthernet0/1), len 100, rcvd 3 <-----ICMP ECHO REPLY
在R2路由器上执行debug ip nat命令可以看到源IP地址(10.1.1.2)已经转换为195.1.1.1,这是个双向转换过程,而返回报文到195.1.1.1的目标地址也转回到10.1.1.2了,如下所示:
R2#debug ip nat
IP NAT debugging is on
00:21:27: NAT*: s=10.1.1.2->195.1.1.1, d=152.1.1.2 [30]
00:21:27: NAT*: s=152.1.1.2, d=195.1.1.1->10.1.1.2 [30]
以上也称为一对一的静态IP映射,相当于Juniper NetScreen产品中的MIP。
实验目的:R2路由器配置了NAT,把源地址10.1.1.2/24(R1路由器F0/1 IP地址,在这里称为内部地址)转换为195.1.1.1/32(模拟公网IP地址,在这里称为外部地址),提供外网用户访问。R1和R4模拟PC。
路由器配置:
R2路由器:
version 12.1
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname R2
!
memory-size iomem 15
ip subnet-zero
!
interface Ethernet1/0
ip address 10.1.1.1 255.255.255.0
ip nat inside
!
interface Ethernet1/1
ip address 195.1.1.4 255.255.255.0
ip nat outside
!
ip nat inside source static 10.1.1.2 195.1.1.1
ip classless
ip route 152.1.1.2 255.255.255.255 Ethernet1/1
no ip http server
!
line con 0
transport input none
line aux 0
line vty 0 4
!
no scheduler allocate
end
R3路由器:
version 12.1
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname R3
!
memory-size iomem 15
ip subnet-zero
!
interface Ethernet1/0
ip address 195.1.1.10 255.255.255.0
!
interface Ethernet1/1
ip address 152.1.1.1 255.255.255.0
!
no ip address
shutdown
!
ip classless
no ip http server
!
line con 0
transport input none
line aux 0
line vty 0 4
!
no scheduler allocate
end
R1路由器:
version 12.1
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname R1
!
memory-size iomem 15
ip subnet-zero
!
interface FastEthernet0/1
ip address 10.1.1.2 255.255.255.0
duplex auto
speed auto
!
ip classless
ip route 0.0.0.0 0.0.0.0 10.1.1.1
no ip http server
!
line con 0
transport input none
line aux 0
line vty 0 4
!
no scheduler allocate
end
R4路由器:
version 12.1
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname R4
!
memory-size iomem 15
ip subnet-zero
!
interface FastEthernet0/0
ip address 152.1.1.2 255.255.255.0
duplex auto
speed auto
!
ip classless
ip route 0.0.0.0 0.0.0.0 152.1.1.1
no ip http server
!
line con 0
transport input none
line aux 0
line vty 0 4
!
no scheduler allocate
end
监测配置:
从R1路由器ping 152.1.1.2(R4路由器F0/0 IP地址),用debug ip packet命令分析到达R4的报文,命令执行结果如下:
R1#debug ip packetIP packet debugging is on
R1#ping 152.1.1.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 152.1.1.2, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/37/68 ms
R1#
00:21:28: IP: s=10.1.1.2 (local), d=152.1.1.2 (FastEthernet0/1), len 100, sending <-----ICMP ECHO00:21:28: IP: s=152.1.1.2 (FastEthernet0/1), d=10.1.1.2 (FastEthernet0/1), len 100, rcvd 3 <-----ICMP ECHO REPLY
在R2路由器上执行debug ip nat命令可以看到源IP地址(10.1.1.2)已经转换为195.1.1.1,这是个双向转换过程,而返回报文到195.1.1.1的目标地址也转回到10.1.1.2了,如下所示:
R2#debug ip nat
IP NAT debugging is on
00:21:27: NAT*: s=10.1.1.2->195.1.1.1, d=152.1.1.2 [30]
00:21:27: NAT*: s=152.1.1.2, d=195.1.1.1->10.1.1.2 [30]
以上也称为一对一的静态IP映射,相当于Juniper NetScreen产品中的MIP。
2010年12月15日星期三
Array TMX/APV产品运维知识之查看后台服务状态
ArrayOS#show health server r_test
----------------------------------- Server Status ---------------------------------
real server name status
r_test UP
----------------------------------- Health Check ----------------------------------
real server name ip :port status hct rqr rpr checklist
-----------------------------------------------------------------------------------
r_test 111.222.111.222 :80 UP tcp
----------------------------------- Server Status ---------------------------------
real server name status
r_test UP
----------------------------------- Health Check ----------------------------------
real server name ip :port status hct rqr rpr checklist
-----------------------------------------------------------------------------------
r_test 111.222.111.222 :80 UP tcp
Array TMX/APV产品运维知识之查看产品平台型号及OS版本号
ArrayOS>show version
ArrayOS Rel.TM.6.5.2.9 build on Thu Jul 10 21:22:44 2009 #OS版本号
Host name : TMX3000
System CPU : i386 Intel(R) Pentium(R) 4 CPU 2.80GHz
System Module : P4SCI
System RAM : 3645520 kbytes.
System boot time : xxxxxxxx
Current time : xxxxxxxx
System up time : 100 days, 13:58
Platform Bld Date : xxxxxxxx
SSL Hardware : No HW Available
Compression HW : No HW Available
Network Interface : 2 x Gigabit Ethernet copper
Model : Array TMX 3000 #产品平台型号
Serial Number : xxxxxxxx
Licensed Features : WebWall Clustering L4SLB L7SLB Caching
SwCompression LLB CCB GSLB QoS MultiLang
License Key : xxxxxxxx
ArrayOS Rel.TM.6.5.2.9 build on Thu Jul 10 21:22:44 2009 #OS版本号
Host name : TMX3000
System CPU : i386 Intel(R) Pentium(R) 4 CPU 2.80GHz
System Module : P4SCI
System RAM : 3645520 kbytes.
System boot time : xxxxxxxx
Current time : xxxxxxxx
System up time : 100 days, 13:58
Platform Bld Date : xxxxxxxx
SSL Hardware : No HW Available
Compression HW : No HW Available
Network Interface : 2 x Gigabit Ethernet copper
Model : Array TMX 3000 #产品平台型号
Serial Number : xxxxxxxx
Licensed Features : WebWall Clustering L4SLB L7SLB Caching
SwCompression LLB CCB GSLB QoS MultiLang
License Key : xxxxxxxx
订阅:
博文 (Atom)