Mithi Connect Server using the Command Line Interfaces (CLI)

Size: px
Start display at page:

Download "Mithi Connect Server using the Command Line Interfaces (CLI)"

Transcription

1 Page 1 of 1 Mithi Connect Server using the Command Line Interfaces (CLI) Introduction 1 Introduction to modules and components 2 Folder structure of an MCS installation 2 Mail store structure 3 Basic Linux commands 3 Login 3 Basic Linux commands 4 MCS Command Line interfaces 9 Mail server 9 Mail Fetcher/Mail Retriever 15 Fetchmail 15 Web proxy server 17 FTP server 19 Instant Messaging and Chat server 20 Jabber 20 LDAP server 20 Web mail client 21 Tomcat 21 Apache 21 Customization 22 Address books 22 Calendar 22 Administration 22 Server security 27 Introduction Mithi Connect Server is comprised of different modules as explained in the MCS Tech Overview document. Each of these modules uses one or more components. Components can be open source components such as the qmail server or can be components developed by Mithi. Some components are common to all the modules. These are the LDAP server, database server, firewall etc. This document provides the overview of how an administrator can manage and maintain a MCS installation using the command line interfaces. The document is divided into the following sections: Introduction to modules and components Folder structure of an MCS installation Basic Linux commands MCS command line interfaces

2 Technical Proposal to deploy Mithi Connect Server as an solution Copyright Mithi Software Technologies Page 2 of 2 Introduction to modules and components The table below lists the modules that make up the MCS solution and the components required. Module Mail server Mail Fetcher/Mail Retriever Web proxy server FTP server Instant Messaging and Chat server LDAP server Web mail client Address books Calendar Server security Enterprise replication Components Qmail-SMTP, Qmail-queue, Qmail-POP,Courier - IMAP server,qmail Scanner SpamAssassin, ClamAV Fetchmail Server Squid Server VsFtp Server Jabber Server Open Ldap Server Tomcat Server,Apache Server and Corporate Directory,Global Address Book,Personal Address Book WebCalender IPtables JBoss Folder structure of an MCS installation This section describes the folder structure of an MCS installation. What Modules Components Command Line Interfaces Configuration and event logs Logs for all mithi programs Component logs Mailstore Where Each module has configuration files pertaining to the server, domain and users located in the following folders: /mithi/mcs/modules/<module>/conf/server /mithi/mcs/modules/<module>/conf/domains/<domain>/ /mithi/mcs/modules/<module>/conf/domains/<domain>/users/a001/<user> ( <module> is the module name) /mithi/mcs/components Each component has configuration files pertaining to the server, located in the /mithi/mcs/components/<component>/conf/server folder /mithi/mcs/bin /mithi/mcs/modules/mithi-system/report/mcs_config_events.log /mithi/mcs/modules/mithi-system/report/mcs_activity_events.log /var/log/mithi/mcs/ squid : /var/log/squid jabberd: /var/log/jabberd httpd : /var/log/httpd clamav : /var/log/clamav ldap : /var/log/openldap.log pgsql : /var/log/pgsql.log ftp : /var/log/vsftp.log firewall : /var/log/iptables.log Mailing (POP/IMAP/SMTP) : /var/log/maillog, /var/log/messages mail statistics : /var/spool/qmailscan/mailstats.csv Virus quarantine log : /var/spool/qmailscan/quarantine.log Scanner log : /var/spool/qmailscan/qmail-queue.log, /var/spool/qmailscan/qmail-mithi-queue.log Tomcat : /var/log/tomcat/catalina.out /mailstore

3 Page 3 of 3 Installed patches Installed service packs Default folder to locate backup Mail store structure /home/mcs/patches /home/mcs/installables /mithi/mcs/backups Mithi Connect Server stores the user s mailboxes in an open standard format called the maildir format. The MTA qmail gives native support for the maildir format. Maildir is a format that does not require file locking to maintain message integrity because the messages are kept in separate files with unique names. A Maildir is a directory (often named Maildir) with three subdirectories named tmp, new, and cur. The Mail Transfer Agent that delivers an message (in case of MCS, qmail) writes the mail to a file in the tmp directory with a unique filename. A hard link to this file is then created in the "new" folder. Finally, the delivery program unlinks the file in tmp. This sequence guarantees that a maildir-reading program will not see a partially-written message, as mail clients never look in tmp. When the mail client process finds messages in the new directory it moves them to cur (using the same link then unlink strategy) and appends an informational suffix to the filename before reading them. The information suffix consists of a colon (to separate the unique part of the filename from the actual information), a '2', a comma and various flags. The '2' specifies, loosely speaking, the version of the information that follows the comma. '2' is the only currently officially specified version, '1' being an experimental version. The maildirs for domains and users are organized as follows: Each domain has a separate directory under /mailstore. For example, the folder for the mailstore for the domain mithi.com will be at /mailstore/mithi.com. Within a domain, the mail stores for individual users are arranged alphabetically. All the users, whose mail ids start with the letter a will have the mailstore in the folder /mailstore/mithi.com/a001 and so on. For example the mailstore for the support@mithi.com id will be at /mailstore/mithi.com/s001/support. The Maildir folders are created within the support folder and will have the tmp, cur and new folder as described above. Basic Linux commands Login 1)Putty - Copy Putty.exe from MCS CD. - Enter Mithi Server s IP address in hostname field. - Select SSH Protocol. - Select Port 22 - Click Open. - Give user name as root in Login as: prompt. - Give the root user password. 2)Directory login - Copy Winscp.exe from MCS CD. - Enter Mithi Server s IP address in hostname field. - Select Port Give username as root and root users password in the password field.

4 Technical Proposal to deploy Mithi Connect Server as an solution Copyright Mithi Software Technologies Page 4 of 4 3) Root user 4) Incase Login user (not a super user/direct root login is disabled). - Login as the username with the respective password. - On linux prompt,type su and give the root user password. Basic Linux commands This section lists some of the basic Linux commands used to maintain and manage an MCS installation on a Linux platform. Command Syntax Description cat cat [File] Displays the contents of a file. For example To display the contents of the MCS version file /mithi/mcs/ver.txt file, use the following command: cat /mithi/mcs/ver.txt OR To display the contents of the network file : cat /etc/sysconfig/network cd cd [directory] cd command changes the current working directory to the directory specified as parameter. Example : cd /mithi/mcs/bin The above command changes your current working directory to /mithi/mcs/bin clear Clear clear command would clear the screen. cmp cmp [FromFile] [ToFile] $ cmp user1.csv user2.csv Compare two files, and if they differ, tells the first byte and line number where they differ. cp cp [Source file /Dir ] [Destination file /directory] Copy one or more files to another location. Making a copy of a file in order to take backup before making changes..for example : $ cp /etc/resolv.conf /etc/resolv.conf.org The above command will save the file /etc/resolv.conf as /etc/resolv.conf.org retaining the original file. date date [option] To print the current date of the day # date To change current date date -s "11/20/ :48:00" In quotes give the date & time you have to change.

5 Page 5 of 5 df df [options] df -h To display the amount of used and available disk space on all mounted file systems. Also to check the response time of external storage devices mounted. For Example : # df -h du du [options] To display the amount of used disk space in the specified directory in. du sh /mithi/mcs/backups fdisk fdisk [options] List all the partitions on the system. Hard disks can be divided into one or more logical disks called partitions. fdisk -l less less [filename] Displays the specified file in one screen at a time format. Page wise navigation through the file is possible. less /var/log/mithi/mcs/adduser.sh.log grep grep [options] SEARCH PATTERN [FILE...] The grep command can be used as a filter to search for strings in files. The pattern may be either a fixed character string or a regular expression. For Example: grep support@mithi.com /var/log/maillog less Searches the file "/var/log/maillog" for the search pattern support@mithi.com and displays one page at a time due to less option. head head [options] [files] Displays the first n lines of a specified file. head -5 /var/log/tomcat/catalina.out history history The 'history' utility allows you to use words from previous command lines in the command line you are typing hostname hostname [name] hostname - Would display the name of the hostname of the system. ifconfig ifconfig Command line tool to check all network cards/interfaces ls ls [options] List all the files with in the current directory and all associated subdirectories. ls /mithi/mcs/backups/*deepti* This will list any mailstore backup files for the user deepti in /mithi/mcs/backups directory.

6 Technical Proposal to deploy Mithi Connect Server as an solution Copyright Mithi Software Technologies Page 6 of 6 man man [topic] Display information from the online reference manuals about the linux system commands. man locates and prints the named title from the designated reference section man grep mkdir mkdir dirname Create a directory. This will list information on how to use grep utility. mkdir /root/mithiwork - This would create a new directory called mithiwork in /root directory. mount mount -a [-ffnrsvw] [-t vfstype] mount [-fnrsvw] [-o options [,...]] device dir mount [-fnrsvw] [-t vfstype] [-o options] device dir mount [-hv] As root, you can mount the CDROM with a command like this: mount -t auto /dev/cdrom /mnt/cdrom The mounting adds all the directories and files from your CD to your Linux directory tree so you can easily access them without the drive letter. mv mv [ SOURCE] [DEST] Move or rename files or directories. mv /root/patch.sh /root/mithiwork/ This will move the file patch.sh to /root/mithiwork directory. more more [files] Displays text one screen at a time. grep support@mithi.com /var/log/maillog more netstat netstat [options] netstat -a Shows information about all the TCP/IP sockets currently in operation. Netstat command simply displays all sockets and server connections. nmap nmap [hostname/ip address ] Nmap is designed to allow system administrators and curious individuals to scan large networks to determine which hosts are up and what services they are offering. nmap supports a large number of scanning techniques like UDP nmap localhost This option scans all reserved TCP ports on the localhost.. host host [options] hostname This will query the DNS servers configured in /etc/resolv.conf file in the server for the specified host. host a mithi.com

7 Page 7 of 7 This will return the DNS entries of mithi.com domain by querying the DNS servers. passwd passwd It is customary that the user changes his/her password immediately after the first login. Passwd is used to update a user s authentication token(s ). $ passwd (current) password: pass_old New password: pass_new Retype New password: pass_new pwd pwd pwd Display the current working directory ping ping destination_host Sends test packets to a specified server to check if it is responding properly. This is an extremely useful command that is necessary to test network connectivity and response of servers. Is first line of testing if a network failure occurs. ping Ping the secific IP address. ping Pings the specified domain. poweroff poweroff Set the computer to a mode that enables a user to turn off the computer. ps ps [options] As a system administrator, it helps list all existing processes on the server. This is helpful in case you run into problems and need to for instance kill a particular process that is stuck in memory. ps -elf more ps elf grep databackup This will assist you in determining that databackup script is running or not. rm rm [options] files Removes/deletes directories and files. rm /mithi/mcs/backups/mcs-backup-ds fedorarelease-3-8-i386-thu_jan_25_ _ist_2007.bak This will remove the backup file from /mithi/mcs/backups directory. reboot reboot This will properly shut down the server and restart it in normal mode.

8 Technical Proposal to deploy Mithi Connect Server as an solution Copyright Mithi Software Technologies Page 8 of 8 mode. rpm rpm [options] [package] RPM packages are built, installed, and queried with the rpm. Shows a list of only those installed packages that contain the specified string rpm -qa grep release This will list the OS version. rpm -qa grep mithi-patch This will list the mithi-patches installed on the server. route route Lists the routing tables for your server route scp scp [source file path] [destination path] This helps to copy files from one host to another linux host. scp userlist.txt root@ :/root/mithiwork/ ssh ssh [options] hostname [command] The above example would copy the file userlist.txt to the remote server under the user root. scp requests a password or passphrase if required. ssh ssh (SSH client) is a program for logging into a remote machine and for executing commands on a remote machine. It is intended to replace rlogin and rsh, and provide secure encrypted communications between two untrusted hosts over an insecure network. su su [username] su - would login as the superuser as if the superuser actually logged in (process all login scripts etc...) This is in cases where direct root login to the server is disabled. tar tar [options] [tarfile] [otherfiles] Copy files to or restore files from an archive medium. If any files are directories, tar acts on the entire subtree. tar -cvzf log.tar.gz /root/mithiwork This will create an archive by the name of log.tar.gz of all files in /root/mithiwork directory. tail tail [OPTION]... [FILE]... Print the last 10 lines of each FILE to standard output. tail f /var/log/maillog telnet telnet [host] [port] The telnet command is used to communicate with another host using the TELNET protocol. telnet mithi.com 25 telnet host.com - Would open a telnet session to the mithi.com server on port 25. This is to check response to servers.

9 Page 9 of 9 top top [options] This is a very useful system administrator tool that basically gives you a summary view of the system including number of users, memory usage, CPU usage, and active processes. To display processes sorted by CPU useage, updating every 5 seconds: $ top Displays many system statistics and details regarding active processes traceroute traceroute host Gives the exact route between your machine and a server. $ traceroute vi vi filename A screen-oriented text editor based on ex. vi is bi-modal, with a command mode and an insert mode. vi /mithi/mcs/modules/mithi-system/conf/server/mithisystem.httpd.conf.sh To enter command mode press Esc and : To enter into insert mode press esc and i. To exit without saving press esc and :q! To exit after saving changes press esc and :wq who who who MCS Command Line interfaces Determine the users logged on the machine. MCS servers can be administered using the command line interfaces provided. The command line interfaces (CLI) allow the administrators to configure, maintain and trouble shoot a MCS installation command through a script base interface. These scripts are wrappers over the complex logic of the MCS components and modules and also the open source components. All the scripts are located in the folder \mithi\mcs\bin. Each script takes one or more parameters. To give a comprehensive help on the usage of the scripts, you can refer to the online help or execute the script without any parameters. This section lists all the scripts that can be executed from the Linux prompt. The scripts have been categorized according the module on which they operate. Also within each module, the scripts are categorized according to the component, whether the settings are for individual users, working at a domain or server level. Mail server Qmail-smtp qmail-smtp.restart.sh qmail-smtp.start.sh To restart qmail smtp. To start qmail smtp.

10 Technical Proposal to deploy Mithi Connect Server as an solution Copyright Mithi Software Technologies Page 10 of 10 qmail-smtp.status.sh qmail-smtp.stop.sh To find the status of qmail smtp. To stop qmail smtp. Configuration: Server level addsmtprule.sh deletesmtprule.sh delsmtproute.sh getsmtproute.sh setsmtproute.sh getsmtpconcurrency.sh setsmtpconcurrency.sh getsmtpcontrols.sh setsmtpcontrols.sh getsmtpport.sh setsmtpport.sh To add an SMTP Rule To delete an SMTP Rule To delete an SMTP Route To get an SMTP Route To set an SMTP Route To get the concurrency for SMTP To set the concurrency for SMTP To get the SMTP controls for various IP s To set the SMTP controls for various IP s To get the SMTP port. To set the SMTP Agent: agent_check_smtp.sh To check smtp. Qmail-Queue qmail-queue.start.sh qmail-queue.status.sh qmail-queue.stop.sh qmail-queue.alarm.sh To start qmail queue service. To get the current status of qmail queue. To stop qmail queue service. Alarm the queue to flush it Configuration: Server Level: getqueuelifetime.sh setqueuelifetime.sh To view the currently set queue life time. To set the queue life time.

11 Page 11 of 11 Agent: agent_queuemax.sh Added during the setup to monitor mail queue size - POP server qmail-pop.start.sh qmail-pop.status.sh qmail-pop.stop.sh To start pop service. To get status of pop service. To stop pop service. Configuration: Server level getpopconcurrency.sh setpopconcurrency.sh setpopport.sh getpopport.sh To get the POP concurrency. To set the POP concurrency. To set the POP port To get the POP port Agent: agent_check_pop.sh To monitor the POP service. Courier Authlib courier-authlib.restart.sh courier-authlib.start.sh courier-authlib.stop.sh courier-authlib.status.sh To restart courier imap service. To start courier authentication service. To stop courier authentication service. To see the current status of the service Agent: agent_check_courier_authlib.sh To check courier authentication services Courier IMAP courier.start.sh courier.stop.sh To start the service To stop the service

12 Technical Proposal to deploy Mithi Connect Server as an solution Copyright Mithi Software Technologies Page 12 of 12 courier.status.sh courier.restart.sh To see the current status of the service To restart the service Configuration: setimapport.sh getimapport.sh setimapconcurrency.sh getimapconcurrency.sh To set the port number for IMAP To get the port number for IMAP To set the IMAP concurrency. To get the POP concurrency. Agent: agent_check_imap.sh Monitor the IMAP service on the local or a remote server and raise an alert if service is not responding Qmail scanner Anti Spam: spamassassin.restart.sh spamassassin.status.sh spamassassin.stop.sh spamassassin.start.sh Configuration: To restart service spam assassin. To get the current status of spamassassin. To stop service. To start service Server level getspambounceconfig.sh Setspambounceconfig.sh Getspamfitering.sh unblockrecipientdomain.sh unblockrecipient .sh unblocksenderdomain.sh unblocksender .sh blockrecipientdomain.sh To view the currently set spam bounce configuration To change the spam bounce configuration To set parameters of filtering for spamassassin. To Unblock a Recipient domain To Unblock a Recipient To Unblock a Sender domain To Unblock a Sender To Block a Recipient domain

13 Page 13 of 13 blocksenderdomain.sh blockrecipient .sh blocksender .sh setantispam.sh getantispam.sh addblacklistsender.sh addwhitelistsender.sh deleteblacklistsender.sh deletewhitelistsender.sh listblacklistedsenders.sh listblockedrecipientdomain.sh listblockedrecipient .sh listblockedsenderdomain.sh listblockedsender .sh listwhitelistedsenders.sh setspamfiltering.sh getspamfiltering.sh Agent: To Block a Sender domain To Block a Recipient To Block a Sender To Set antispam The output of the command should display Spam Scanning ON. If it is not so, start spamassassin. To add a sender as blacklisted. To add a sender as whitelisted. To delete a sender as blacklisted To delete a sender as whitelisted To list out all the black listed senders. To list out all the blocked recipient domains. To list out all the blocked recipient id s. To list out all the black listed sender domains. To list out all the blocked sender id s. To list senders as whitelisted To set the filtering configuration of mails marked as spam. To get the filtering configuration of mails marked as spam agent_check_spamassassin.sh This agent monitors the spamassassin service and raises an alert if the service is down. agent_update_spamrules.sh AntiVirus: setantivirus.sh getfreshclamav.sh getantivirus.sh To set antivirus. To view the current auto update configuration To view the anti virus status Configuration: getscanner.sh display the current configuration

14 Technical Proposal to deploy Mithi Connect Server as an solution Copyright Mithi Software Technologies Page 14 of 14 setscanner.sh Mithi Connect Server bundles a pre-queue scanner engine which scans all mail before they enter the queue Mail Policies: addmailpolicyrule.sh getmailpolicyconfig.sh getmailpolicyrule.sh delet policyrule.sh deletedomainmailpolicyrules.sh listmailpolicyrules.sh disablegroupmailpolicyrules.sh modifymailpolicyrule.sh disableusermailpolicyrules.sh setmailpolicyconfig.sh To add the rules of mail policy To get the mail policy configuration file To get the rules set for mail policy. To delete rules set for mail policy Delete all domain rules. To list out all the mail policy rules. To disable mail policy groups of a particular group. To modify the mail policy rules. To disable mail policy rules for a user. To set the mail policy configuration. MailBox Quota: listquotapolicy.sh getdefaultquotasize.sh getdomainquotapolicy.sh getuserquotapolicy.sh setquota.sh setdefaultquotasize.sh setdomainquotapolicy.sh resetquotapolicy.sh getquota.sh getquotawarnlimit.sh updateusedquota.sh To view the options available in the quota policy Specify the maximum amount of disk space that each user's mail storage can occupy To view the current quota policy for the individual user To find out the quota rules of a particular user. To set the quota used and allocated for a particular user/users of particular domain. To set a default quota size. Change the domain default To reset the quota policy. To get the quota used and allocated for a particular user/users of particular domain. To get the warning limit for quota policy implementation. To update the used quota of a particular user/users of particular domain.

15 Page 15 of 15 setuserquotapolicy.sh To set the quota rules of a particular user. Agent: agent_update_used_quota.sh agent_quota_overuse_warning.sh This agent runs periodically, scans the mailbox of each user, computes the used disk space and stores it for use by the applications. This agent runs periodically, scans the mailbox usage by each user and depending on the configuration of the quota alerting system, will raise alerts to the users prompting them to clean their mailboxes. Filter User level: addfilter.sh setfilterstate.sh updatefilter.sh regenmainfilter.sh deletefilters.sh movefilter.sh listuserfilters.sh Add filter information in the database. Enable/Disable filters for users. To update filter. Regeneration of a filter. To delete existing filters. To change the priority of the filter. To list users current filters. Domain Level: filterstate.sh buildfilterfile.sh Enable/Disable filter for domain/server. Create the filter file. Mail Fetcher/Mail Retriever Fetchmail fetchmail.start.sh fetchmail.status.sh fetchmail.stop.sh startfetchcycle.sh To start fetchmail service To find the status of fetchmail. To stop fetchmail service. To restart service.

16 Technical Proposal to deploy Mithi Connect Server as an solution Copyright Mithi Software Technologies Page 16 of 16 disableautofetchmail.sh enableautofetchmail.sh Disables fetchmail daemon Enables fetchmail daemon Server Level: setconcurrency.sh getconcurrency.sh getdefaultexpungelimit.sh setdefaultexpungelimit.sh getdefaultsizelimit.sh setdefaultsizelimit.sh getloglevel. setloglevel.sh getextraoptions.sh setextraoptions.sh Sets fetchmail concurrency Prints the fetchmail concurrency. To get the default expunge limit. To set the expunge limit. To get the default size limit. To set the size limit. To get the log level. To set the log level. Prints the extra options specified by user Sets the extra options that has to be appended to the fetchmail command while executing. User Level: addpoptableentry.sh delpoptableentry.sh getpoptableentries.sh modifypoptableentry.sh getuserfetchpriority.sh setuserfetchpriority.sh getdefaultfetchlimit.sh To add a pop table entry. To delete a pop table entry. To get the current pop table entries. To modify an already existing pop table entry To View the fetch priority for a user. To Set the fetch priority for a user. To find the default fetchmail limit. setdefaultfetchlimit.sh getfetchmailschedule.sh schedulefetchmail.sh fetchmailforuser.sh To set a default limit for fetchmail. To View the currently set time interval Sets time interval for fetchmail to run in daemon mode To fetchmail for a particular user.

17 Page 17 of 17 getroaminginfo.sh setroaminginfo.sh To get the current status of fetchmail service. To set roaming status. Agents: agent_check_fetchmail.sh To check fetchmail services Catchall account: Server Level getcatchallrx.sh setcatchallrx.sh removecatchallrx.sh listcatchallrx.sh To get the catchall settings of ISP server. To set the catchall settings of ISP server To remove the catchall settings of ISP server To list all the catchall settings of ISP server Web proxy server Squid squid.autostart.sh squid.restart.sh squid.status.sh squid.stop.sh squid.start.sh Agent: agent_check_proxy_cache_logs_limit.sh agent_check_squid.sh agent_generatepxur.sh To automatically start proxy. To restart proxy. To find status of proxy. To stop proxy. To start proxy Keep a tab on the Proxy cache folder & the log files The squid service is monitored and if the service is not responding the agent will raise an alert. Generate the proxy reports after the automatic daily log rotation and create a link to this report, which is accessible from the Server Manager. Domain Level: getdefaultsquidaccessrules.sh setdefaultsquidaccessrules.sh To find out the default rules set for a proxy. To set the default rules to access squid. Server Level:

18 Technical Proposal to deploy Mithi Connect Server as an solution Copyright Mithi Software Technologies Page 18 of 18 getsquidloglevel.sh getsquidport.sh setsquidloglevel.sh setsquidport.sh IsHTTPAccessAllowedforall.sh granthttpaccessforall.sh denyhttpaccessforall.sh granthttpaccess.sh denyhttpaccess.sh granthttpaccessforallbyrule.sh grantmsnaccessforallbyrule.sh grantyahooaccessforallbyrule.sh clearcache.sh granthttpaccessforip.sh denyhttpaccessforip.sh IsMSNMsgAccessAllowed.sh IsYahooMsgAccessAllowedforall.sh IsYahooMsgAccessAllowedforIP.sh User Level: To find log level of the proxy. To get port of proxy. To change the log level. To set the squid. To check the HTTP access policy for all To allow the HTTP access for all To deny the HTTP access for all To allow the HTTP access for user / IP / Domain To deny the HTTP access for user / IP / Domain To allow the HTTP access to all as per the rules configured at user / IP / Domain level To allow the MSN Messenger access to all as per the rules configured at user / IP / Domain level To allow the Yahoo messenger access to all as per the rules configured at user / IP / Domain level Clear the content cached by the proxy server To allow the HTTP access for the given IP To deny the HTTP access for the given IP To check the MSN messenger access allowed for the user To check the Yahoo messenger access allowed for the given IP To check the Yahoo messenger access allowed for the given IP grantmsnmsgaccess.sh denymsnmsgaccess.sh grantyahoomsgaccess.sh denyyahoomsgaccess.sh To allow the MSN messenger access To deny the MSN messanger access To allow the Yahoo messenger access To deny the Yahoo messanger access

19 Page 19 of 19 denyaccesstosites.sh removedeniedsites.sh granthttpaccessforuser.sh denyhttpaccessforuser.sh bindusertoip.sh Getbindipaddress.sh removebindipaddress.sh IsMSNMsgAccessAllowedforall.sh IsMSNMsgAccessAllowedforIP.sh To deny the access to the list of sites To remove the list of denied sites and allow them for the HTTP access To allow the HTTP access for the user To deny the HTTP access for the user To bind the user with specified IP address To check the bind IP address of the user To remove the bind IP address of the user To check the MSN messenger access allowed for the given IP To check the MSN messenger access allowed for the given IP FTP server Vsftp vsftp.start.sh vsftp.status.sh vsftp.restart.sh vsftp.stop.sh ftp_disableautostart.sh ftp_enableautostart.sh Start vsftp service Determine the status of vsftp service Restart vsftp service Stop vsftp service Disable auto start of FTP service on boot Enable auto start of FTP service on boot Agent: agent_ftp_off_warn.sh Is scheduled to run every hour to check the status of the FTP service. If the ftp service is OFF, it will raise an alert. Server Level: ftp_closeport.sh ftp_openport.sh Block remote FTP access Allow remote FTP access User Level: ftp_resetuserpass.sh To add a user which can use the FTP service.

20 Technical Proposal to deploy Mithi Connect Server as an solution Copyright Mithi Software Technologies Page 20 of 20 ftp_adduser.sh ftp_deluser.sh ftp_listusers.sh To add an FTP user. To delete an FTP user. list FTP users. Instant Messaging and Chat server Jabber Jabberd.restart.sh Jabberd.start.sh Jabberd.status.sh Jabberd.stop.sh im_disableautostart.sh im_enableautostart.sh Configuration: Server Level : im_openport.sh im_closeport.sh Domain level: To restart the jabberd service. To start the jabberd service. To find the status of jabberd service. To stop the jabberd service. To disable instant messaging auto start use this. To enable auto start for instant messaging use this script. To open the im port. To close an im port enableimfordomain.sh disableimfordomain.sh listimenableddomains.sh This script will enable instant messaging for this domain This script is used to disable instant messaging for a domain This will list all the domain which have instant messaging enabled. Agents: agent_im_off_warn.sh Warn if the im is off LDAP server ldap.start.sh ldap.status.sh To start LDAP service. To find current status of LDAP service.

21 Page 21 of 21 ldap.stop.sh ldap.restart.sh To stop LDAP service. To restart LDAP service. Domain Level: updateldap.sh Use for add, modify,delete from LDAP using the different 'change type:' options in LDIF file. Agent: agent_check_ldap.sh Monitor the LDAP service on the local or a remote server and raise an alert if service is not responding. Web mail client Tomcat tomcat.start.sh To start tomcat server. tomcat.restart.sh To restart tomcat server. tomcat.status.sh To find status of tomcat server. agent_check_tomcat.sh To check the tomcat service of the specified server. Apache apache.start.sh apache.restart.sh apache.stop.sh sethttpport.sh gethttpport.sh getadminport.sh To start apache server. To restart tomcat server. To stop tomcat server. Modify httpd port number- Retrieved httpd port number. Retrieve the port on which Administrative console will work. setadminport.sh Set the port on which Administrative console will work. Agents: agent_check_http.sh To check the http service of the specified server.

22 Technical Proposal to deploy Mithi Connect Server as an solution Copyright Mithi Software Technologies Page 22 of 22 Customization Server Level: getsessiontimeout.sh To get the login session timeout value in the webclient. setsessiontimeout.sh To set the login session timeout value in the webclient Domain level: getcolortheme.sh setmaxattachmentsize.sh setmailclientfeatures.sh To get the present color theme. To set the maximum size of attachments. To set mail client features. User level: getmailclientmailfooter.sh getmailclientpreferences.sh setmailclientpreferences.sh setusersignature.sh To get the present footer in use. To get client preferences. To set the client preferences. To set a user signature. Address books addcontact2ab.sh addcontact2gab.sh addmultiplecontacts2ab.sh addmultiplecontacts2gab.sh Add contact to personal address book. Add contact to global address book. Add multiple contacts to address book. Add multiple contacts to global address book. Calendar Administration Server Manager Monitoring:

23 Page 23 of 23 checkservices.sh startconsole.sh getmcsversion.sh To check services To start monitoring console. To get the MCS version. Agent: addagent.sh listagents.sh modifyagent.sh delagent.sh To add the agent To list all existing agents. To modify time interval of receiving alert. To delete agent. Backup: databackupex.sh databackup.sh datarestore.sh deletebackup.sh getbackupconfig.sh listbackups.sh listbackuptasks.sh mailstorebkup.sh To execute data backup Backup the database on the Master Server and copy to new Slave To execute a Backup Job To delete a backup. This will display the current configuration To list the Backup Jobs This will display the list of backup task To take backup of mailstore. Access control: getserveraccesscontrol.sh setserveraccesscontrol.sh To get access control of a server. To set the access control of a user. Domain Level Domain: adddomain.sh deldomain.sh istdomain.sh getdefaultdoamin.sh Create a new domain Delete an existing domain. List all the existing domains. To get the default domain.

24 Technical Proposal to deploy Mithi Connect Server as an solution Copyright Mithi Software Technologies Page 24 of 24 setadminid.sh getadminid.sh States the status reporting ID. To get id of administrator. Group: addgroup.sh listgroupbounceadmins.sh listgroupsforbounceadmin.sh To add group Retrieve the bounce administrator(s) designated for a group id This script will list groups whose bounce admin is this user setgroupbounceadmin.sh deletegroupbounceadmin.sh addusersingroup.sh Isgroup.sh listgroupnames.sh listusergroups.sh This script will delete groups whose bounce admin is this user add Users in a Group To find if group exists. To list all the existing group names. To list users of a group. Access control: getdomainaccesscontrol.sh setdomainaccesscontrol.sh To get access control for a particular domain To set access control for a domain. Catchall account: getcatchall.sh setcatchall.sh removecatchall.sh To get local catchall settings for the domain. To set local catchall settings for the domain. To remove the local catchall settings for the domain. User level Mail delivery : getmaildeliverycommands.sh setmaildeliverycommands.sh appendmaildeliverycmd.sh remov deliverycmd.sh To view the current mail delivery commands set for the user To set the mail delivery commands for a user To add the mail delivery command for a user To remove the command from the mail delivery command list

25 Page 25 of 25 mov deliverycmdtop.sh mov deliverycmdbottom.sh mov deliverycmdup.sh mov deliverycmddown.sh resetpass.sh To move the command to the top of the mail delivery command list To move the command to the bottom of the mail delivery command list To move the command one step up in the mail delivery command list To move the command one step down in the mail delivery command list To reset password. Account Status: enableaccount.sh disableaccount.sh setaccountstatus.sh To enable an account. To disable an account. To set the status of an account. User account: deluser.sh adduser.sh addusermultiple.sh renameuser.sh Delete an user from your domain You can add user in your domain Add multiple user in a batch To rename users Delegate: delegat boxtouser.sh getdelegatesforuser.sh setdelegateusers.sh listdelegateusers.sh removedelegateforuser.sh undelegateuser.sh setadminaccess.sh This script is used to delegate mailbox of another user to a user. Retrieve the accounts that have been delegated to a user. To delegate a user to another user s account. To list delegated users. Disallow delegation or access to your account by another user (delegate). To remove all delegation setting for a user. Enable/Disable access of delegate users to administrative tasks

26 Technical Proposal to deploy Mithi Connect Server as an solution Copyright Mithi Software Technologies Page 26 of 26 Roles: addroles.sh listroles.sh modifyroles.sh deleteroles.sh Define roles or task that need to be assigned to junior administrators. To list the designated roles. To modify a role. To delete an assigned role. Alias: listalias.sh listallaliases.sh removealiases.sh setalias.sh To list all the aliases set for a user To list all aliases set for all users in the domain To delete an alais To add a new Alias for user. Access control: getuseraccesscontrol.sh setuseraccesscontrol.sh This script sets user access control. This script sets user access control. Enterprise Level setasmaster.sh setasslave.sh addslave.sh listjmsmessages.sh fetchcommands.sh setfetchstatus.sh setmasterfirewallconfiguration.sh setslavefirewallconfiguration.sh getfetchstatus.sh Set this server as the Master Server Set this server as slave server. Add slave information to Master information To list instant messages This script is a wrapper for FetchCommand. This script is to set fetch status to t/f. This script sets this server as domain master for existing given domain name This script sets this server as domain master for existing given domain name To find the status of fetch mail. Network settings:

27 Page 27 of 27 renameip.sh setmcsipaddress.sh To rename an ip for enterprise level config. Reset the IP address of this Server Server security Firewall iptables.policy.sh iptables.restart.sh This script will be called by servlets to check the rules of the firewall This script is called to restart the firewall iptables.func.sh iptables.status.sh iptables.stop.sh This script is called by other scripts to check the status of firewall This script is called to stop the firewall The information in this document is subject to change without notice. Mithi makes no warranty of any kind regarding this material and assumes no responsibility for any errors that may appear in this document. Mithi Software Technologies, Mithi Connect Server, Mithi Web Mail, Mithi Personal Address Book, Mithi Global Address Book, Mithi Corporate Directory, ithinkshop, IndiaInteractive, IndiaPage, mailjol, mailjol Unplugged, Mithi Enterprise Messaging are trademarks of Mithi Software Technologies. Other product names mentioned in this document are for identification purposes only and may be trademarks or registered trademarks of their respective companies.

Embedded Linux Systems. Bin Li Assistant Professor Dept. of Electrical, Computer and Biomedical Engineering University of Rhode Island

Embedded Linux Systems. Bin Li Assistant Professor Dept. of Electrical, Computer and Biomedical Engineering University of Rhode Island Embedded Linux Systems Bin Li Assistant Professor Dept. of Electrical, Computer and Biomedical Engineering University of Rhode Island Generic Embedded Systems Structure User Sensors ADC microcontroller

More information

Index. B Big Brother, 218 BMC Patrol, 219

Index. B Big Brother, 218 BMC Patrol, 219 Index A access control instruction, 159 lists, 105 additional attributes, 16 administration ports, 70 administration web interface, 54 alias, 16 aliases file, 171 alternate address, 16 annual checks, 214

More information

Basic Linux Command Line Interface Guide

Basic Linux Command Line Interface Guide This basic Linux Command-Line Interface (CLI) Guide provides a general explanation of commonly used Bash shell commands for the Barracuda NG Firewall. You can access the command-line interface by connecting

More information

Linux Systems Administration Getting Started with Linux

Linux Systems Administration Getting Started with Linux Linux Systems Administration Getting Started with Linux Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International

More information

Linux Administration

Linux Administration Linux Administration This course will cover all aspects of Linux Certification. At the end of the course delegates will have the skills required to administer a Linux System. It is designed for professionals

More information

Basic Linux Command Line Interface Guide

Basic Linux Command Line Interface Guide This basic Linux Command-Line Interface (CLI) Guide provides a general explanation of commonly used Bash shell commands for the Barracuda NG Firewall. You can access the command-line interface by connecting

More information

Contents at a Glance COPYRIGHTED MATERIAL. Introduction...1 Part I: Becoming Familiar with Enterprise Linux...7

Contents at a Glance COPYRIGHTED MATERIAL. Introduction...1 Part I: Becoming Familiar with Enterprise Linux...7 Contents at a Glance Introduction...1 Part I: Becoming Familiar with Enterprise Linux...7 Chapter 1: Getting Acquainted with Enterprise Linux...9 Chapter 2: Exploring the Desktop...17 Chapter 3: Putting

More information

Linux Command Line Primer. By: Scott Marshall

Linux Command Line Primer. By: Scott Marshall Linux Command Line Primer By: Scott Marshall Draft: 10/21/2007 Table of Contents Topic Page(s) Preface 1 General Filesystem Background Information 2 General Filesystem Commands 2 Working with Files and

More information

Table of Contents 1 V3 & V4 Appliance Quick Start V4 Appliance Reference...3

Table of Contents 1 V3 & V4 Appliance Quick Start V4 Appliance Reference...3 Table of Contents 1 V & V4 Appliance Quick Start...1 1.1 Quick Start...1 1.2 Accessing Appliance Menus...1 1. Updating Appliance...1 1.4 Webmin...1 1.5 Setting Hostname IP Address...2 1.6 Starting and

More information

CDP Data Center Console User Guide CDP Data Center Console User Guide Version

CDP Data Center Console User Guide CDP Data Center Console User Guide Version CDP Data Center Console User Guide CDP Data Center Console User Guide Version 3.18.2 1 README FIRST Welcome to the R1Soft CDP Data Center Console User Guide The purpose of this manual is to provide you

More information

Command-Line Interface Command Summary

Command-Line Interface Command Summary CHAPTER 1 Command-Line Interface Command Summary This chapter provides a summary of the command-line interface (CLI) commands included in the Global Site Selector software. The command summary tables are

More information

Micro Focus Security ArcSight Connectors. SmartConnector for McAfee Gateway Syslog. Configuration Guide

Micro Focus Security ArcSight Connectors. SmartConnector for McAfee  Gateway Syslog. Configuration Guide Micro Focus Security ArcSight Connectors SmartConnector for McAfee Email Gateway Syslog Configuration Guide June, 2018 Configuration Guide SmartConnector for McAfee Email Gateway Syslog June, 2018 Copyright

More information

MDaemon Vs. SmarterMail Enterprise Edition

MDaemon Vs. SmarterMail Enterprise Edition Comparison Guide Vs. Enterprise Edition The following chart is a side-by-side feature comparison of and Enterprise Edition. Flex Licensing û Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP,

More information

WebAdmin IceWarp WebAdmin Manual

WebAdmin IceWarp WebAdmin Manual WebAdmin IceWarp WebAdmin Manual WWW.ICEWARP.COM 1 WebClient WebAdmin User Manual Guide Contents About IceWarp WebAdmin Manual 3 1/ Login Page 4 2/ 4 Control bar 5 User Account Menu 5 Main Windows 6 Dashboard

More information

RedHat Certified Engineer

RedHat Certified Engineer RedHat Certified Engineer Red Hat Certified Engineer (RHCE) is a performance-based test that measures actual competency on live systems. Called the "crown jewel of Linux certifications," RHCE proves an

More information

IceWarp to IceWarp Migration Guide

IceWarp to IceWarp Migration Guide IceWarp Unified Communications IceWarp to IceWarp Migration Guide Version 12.0 IceWarp to IceWarp Migration Guide 2 Contents IceWarp to IceWarp Migration Guide... 4 Used Terminology... 4 Brief Introduction...

More information

Stop all processes and then reboot - same as above startx. Log in as superuser from current login exit

Stop all processes and then reboot - same as above startx. Log in as superuser from current login exit Starting & Stopping shutdown -h now Shutdown the system now and do not reboot shutdown -r 5 Shutdown the system in 5 minutes and reboot shutdown -r now Shutdown the system now and reboot reboot Stop all

More information

MDaemon Vs. Kerio Connect

MDaemon Vs. Kerio Connect Comparison Guide Vs. The following chart is a side-by-side feature comparison of and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP SSL / TLS / StartTLS Account

More information

MDaemon Vs. Kerio Connect

MDaemon Vs. Kerio Connect Comparison Guide Vs. The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP SSL / TLS / StartTLS

More information

MDaemon Vs. Microsoft Exchange Server 2016 Standard

MDaemon Vs. Microsoft Exchange Server 2016 Standard Comparison Guide Vs. The following chart is a side-by-side feature comparison of and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP POP3 & SMTP Only SSL / TLS

More information

Univention Corporate Server. Cyrus mail server

Univention Corporate Server. Cyrus mail server Univention Corporate Server Cyrus mail server 2 Table of Contents 1. Introduction... 4 2. Installation... 5 3. Management of the mail server data... 6 3.1. Management of mail domains... 6 3.2. Assignment

More information

Introduction to Linux

Introduction to Linux Introduction to Linux Mukesh Pund Principal Scientist, NISCAIR, New Delhi, India History In 1969, a team of developers developed a new operating system called Unix which was written using C Linus Torvalds,

More information

Cisco WAAS Software Command Summary

Cisco WAAS Software Command Summary 2 CHAPTER This chapter summarizes the Cisco WAAS 4.0.7 software commands. lists the WAAS commands (alphabetically) and indicates the command mode for each command. The commands used to access modes are

More information

MDaemon Vs. MailEnable Enterprise Premium

MDaemon Vs. MailEnable Enterprise Premium Comparison Guide Vs. Enterprise Premium The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP

More information

Overview of the Cisco NCS Command-Line Interface

Overview of the Cisco NCS Command-Line Interface CHAPTER 1 Overview of the Cisco NCS -Line Interface This chapter provides an overview of how to access the Cisco Prime Network Control System (NCS) command-line interface (CLI), the different command modes,

More information

Grapevine web hosting user manual. 12 August 2005

Grapevine web hosting user manual. 12 August 2005 Grapevine web hosting user manual 12 August 2005 Grapevine web hosting user manual 2 Contents Contents... 2 Introduction... 4 System features... 4 How it looks... 5 Main navigation... 5 Reports... 6 Web

More information

MDaemon Vs. Microsoft Exchange Server 2016 Standard

MDaemon Vs. Microsoft Exchange Server 2016 Standard Comparison Guide Vs. The following chart is a side-by-side feature comparison of and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP POP3 & SMTP Only SSL / TLS

More information

MDaemon Vs. SmarterMail Enterprise Edition

MDaemon Vs. SmarterMail Enterprise Edition Comparison Guide Vs. Enterprise Edition The following chart is a side-by-side feature comparison of and Enterprise Edition. Flex Licensing û Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP,

More information

AXIGEN Features and Supported Platforms

AXIGEN Features and Supported Platforms AXIGEN Features and Supported Platforms GECAD Technologies 10A Dimitrie Pompei Blvd., BUCHAREST 2, ROMANIA Tel.: +40 21 303 20 80 +40 21 303 20 81 Last modified: 09/18/2007 Product Features v 4.0 and v

More information

UoW HPC Quick Start. Information Technology Services University of Wollongong. ( Last updated on October 10, 2011)

UoW HPC Quick Start. Information Technology Services University of Wollongong. ( Last updated on October 10, 2011) UoW HPC Quick Start Information Technology Services University of Wollongong ( Last updated on October 10, 2011) 1 Contents 1 Logging into the HPC Cluster 3 1.1 From within the UoW campus.......................

More information

SAP Business One. User Guide. Issue 04 Date HUAWEI TECHNOLOGIES CO., LTD.

SAP Business One. User Guide. Issue 04 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 04 Date 2018-12-31 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2019. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Command-Line Interface Command Summary

Command-Line Interface Command Summary CHAPTER 1 Command-Line Interface Command Summary This chapter provides a summary of the command-line interface (CLI) commands included in the Cisco Global Site Selector (GSS) software. The command summary

More information

MDaemon Vs. Zimbra Network Edition Professional

MDaemon Vs. Zimbra Network Edition Professional Comparison Guide Vs. The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP SSL / TLS / StartTLS

More information

GSS Administration and Troubleshooting

GSS Administration and Troubleshooting CHAPTER 9 GSS Administration and Troubleshooting This chapter covers the procedures necessary to properly manage and maintain your GSSM and GSS devices, including login security, software upgrades, GSSM

More information

MDaemon Vs. MailEnable Enterprise Premium

MDaemon Vs. MailEnable Enterprise Premium Comparison Guide Vs. Enterprise Premium The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP

More information

Platform Administration

Platform Administration CHAPTER 6 Cisco provides these tools to manage the Cisco MobilityManager server platform: Cisco IPT web pages that provide complete platform administration functions. Command Line Interface (CLI) that

More information

Configuring Cisco TelePresence Manager

Configuring Cisco TelePresence Manager CHAPTER 3 Revised: November 27, 2006, First Published: November 27, 2006 Contents Introduction, page 3-1 System Configuration Tasks, page 3-2 Security Settings, page 3-3 Database, page 3-4 Room Phone UI,

More information

Mastering Linux. Paul S. Wang. CRC Press. Taylor & Francis Group. Taylor & Francis Croup an informa business. A CHAPMAN St HALL BOOK

Mastering Linux. Paul S. Wang. CRC Press. Taylor & Francis Group. Taylor & Francis Croup an informa business. A CHAPMAN St HALL BOOK Mastering Linux Paul S. Wang CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an Imprint of the Taylor & Francis Croup an informa business A CHAPMAN St HALL BOOK Contents Preface

More information

Extending the Domino System. Powered by Notes. The First Groupware and Server for the Net R E L E A S E

Extending the Domino System. Powered by Notes. The First Groupware and  Server for the Net R E L E A S E Extending the Domino System Powered by Notes The First Groupware and E-mail Server for the Net R E L E A S E COPYRIGHT Under the copyright laws, neither the documentation nor the software may be copied,

More information

2 Hardening the appliance

2 Hardening the appliance 2 Hardening the appliance 2.1 Objective For security reasons McAfee always recommends putting the McAfee Web Gateway appliance behind a firewall. For added security McAfee also recommends that the appliance

More information

Maintaining the System Software

Maintaining the System Software CHAPTER 2 This chapter covers the tasks required for maintaining a Content Engine. Upgrading the System Software, page 2-1 Recovering the System Software, page 2-2 Maintaining the Hard Disk Storage, page

More information

MDaemon Vs. IceWarp Unified Communications Server

MDaemon Vs. IceWarp Unified Communications Server Comparison Guide Vs. The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP SSL / TLS / StartTLS

More information

This lab exercise is to be submitted at the end of the lab session! passwd [That is the command to change your current password to a new one]

This lab exercise is to be submitted at the end of the lab session! passwd [That is the command to change your current password to a new one] Data and Computer Security (CMPD414) Lab II Topics: secure login, moving into HOME-directory, navigation on Unix, basic commands for vi, Message Digest This lab exercise is to be submitted at the end of

More information

MDaemon Vs. SmarterMail Enterprise Edition

MDaemon Vs. SmarterMail Enterprise Edition Comparison Guide Vs. Enterprise Edition The following chart is a side-by-side feature comparison of Email Server and Enterprise Edition. Flex Licensing û Maximum Accounts Unlimited Unlimited SMTP, POP3,

More information

LAB #7 Linux Tutorial

LAB #7 Linux Tutorial Gathering information: LAB #7 Linux Tutorial Find the password file on a Linux box Scenario You have access to a Linux computer. You must find the password file on the computer. Objective Get a listing

More information

Runecast Analyzer User Guide

Runecast Analyzer User Guide Runecast Analyzer User Guide V1.0 Copyright 2014-2017 Runecast Solutions Ltd. All rights reserved. 2 P a g e Contents 1 Installation and Setup... 5 1.1 System requirements... 5 1.2 Deployment... 6 1.3

More information

List of Linux Commands in an IPm

List of Linux Commands in an IPm List of Linux Commands in an IPm Directory structure for Executables bin: ash cpio false ln mount rm tar zcat busybox date getopt login mv rmdir touch cat dd grep ls perl sed true chgrp df gunzip mkdir

More information

Unix Introduction to UNIX

Unix Introduction to UNIX Unix Introduction to UNIX Get Started Introduction The UNIX operating system Set of programs that act as a link between the computer and the user. Developed in 1969 by a group of AT&T employees Various

More information

Linux crash lecture by Andrey Lukyanenko

Linux crash lecture by Andrey Lukyanenko Linux crash lecture by Andrey Lukyanenko T-110.5102 Laboratory Works in Networking and Security 20.1.2015 Otaniemi based on material of Miika Komu, 2013 Traversing Directories cd Change Directory Change

More information

Installing and Upgrading Cisco Network Registrar Virtual Appliance

Installing and Upgrading Cisco Network Registrar Virtual Appliance CHAPTER 3 Installing and Upgrading Cisco Network Registrar Virtual Appliance The Cisco Network Registrar virtual appliance includes all the functionality available in a version of Cisco Network Registrar

More information

Welcome to getting started with Ubuntu Server. This System Administrator Manual. guide to be simple to follow, with step by step instructions

Welcome to getting started with Ubuntu Server. This System Administrator Manual. guide to be simple to follow, with step by step instructions Welcome to getting started with Ubuntu 12.04 Server. This System Administrator Manual guide to be simple to follow, with step by step instructions with screenshots INDEX 1.Installation of Ubuntu 12.04

More information

Configuring the Cisco NAM 2220 Appliance

Configuring the Cisco NAM 2220 Appliance CHAPTER 5 This section describes how to configure the Cisco NAM 2220 appliance to establish network connectivity, configure IP parameters, and how to perform other required administrative tasks using the

More information

RG-MACC_2.0 Installation Manual

RG-MACC_2.0 Installation Manual RG-MACC_2.0 Installation Manual Ruijie Networks Co., Ltd all rights reserved 1 Copyright Clarify Copyright ownership belongs to Ruijie, shall not be reproduced, copied, or used in other ways without permission.

More information

Zemana Endpoint Security Administration Guide. Version

Zemana Endpoint Security Administration Guide. Version Zemana Endpoint Security Administration Guide Version 1.9.290 Introduction 4 What is Zemana Endpoint Security? 4 What is Zemana Control Center? 4 How do Endpoint Agents and Control Center communicate with

More information

Kerio Connect. Step-by-Step. Kerio Technologies

Kerio Connect. Step-by-Step. Kerio Technologies Kerio Connect Step-by-Step Kerio Technologies 2011 Kerio Technologies s.r.o. All rights reserved. This guide provides detailed description on Kerio Connect, version 7.3. All additional modifications and

More information

Some useful UNIX Commands written down by Razor for newbies to get a start in UNIX

Some useful UNIX Commands written down by Razor for newbies to get a start in UNIX Some useful UNIX Commands written down by Razor for newbies to get a start in UNIX 15th Jan. 2000 / 3:55 am Part 1: Working with files and rights ------------------------------------- cp

More information

Notices Carbonite Move for Linux User's Guide Version 8.1.1, Wednesday, January 31, 2018 If you need technical assistance, you can contact

Notices Carbonite Move for Linux User's Guide Version 8.1.1, Wednesday, January 31, 2018 If you need technical assistance, you can contact Notices Carbonite Move for Linux User's Guide Version 8.1.1, Wednesday, January 31, 2018 If you need technical assistance, you can contact CustomerCare. All basic configurations outlined in the online

More information

Version Double-Take Move for Linux User's Guide

Version Double-Take Move for Linux User's Guide Version 8.0.1 Double-Take Move for Linux User's Guide Notices Double-Take Move for Linux User's Guide Version 8.0.1, January 18, 2018 Check your service agreement to determine which updates and new releases

More information

Appliance Installation Guide

Appliance Installation Guide Appliance Installation Guide GWAVA 5 Copyright 2009. GWAVA Inc. All rights reserved. Content may not be reproduced without permission. http://www.gwava.com 1 Contents Overview... 2 Minimum System Requirements...

More information

CounterACT Macintosh/Linux Property Scanner Plugin

CounterACT Macintosh/Linux Property Scanner Plugin CounterACT Macintosh/Linux Property Scanner Plugin Version 7.0.1 and Above Table of Contents About the Macintosh/Linux Property Scanner Plugin... 4 Requirements... 4 Supported Operating Systems... 4 Accessing

More information

MDaemon Vs. SmarterMail Enterprise Edition

MDaemon Vs. SmarterMail Enterprise Edition Comparison Guide Vs. Enterprise Edition The following chart is a side-by-side feature comparison of Email Server and Enterprise Edition. Flex Licensing û Maximum Accounts Unlimited Unlimited SMTP, POP3,

More information

Solution Integration Guide for Multimedia Communication Server 5100/WLAN/Blackberry Enterprise Server

Solution Integration Guide for Multimedia Communication Server 5100/WLAN/Blackberry Enterprise Server Solution Integration Guide for Multimedia Communication Server 5100/WLAN/Blackberry Enterprise Server NN49000-302 Document status: Standard Document version: 0101 Document date: 24 May 2007 All Rights

More information

Lab 8: Firewalls ASA Firewall Device

Lab 8: Firewalls ASA Firewall Device Lab 8: Firewalls ASA Firewall Device 8.1 Details Aim: Rich Macfarlane 2015 The aim of this lab is to investigate a Cisco ASA Firewall Device, its default traffic flows, its stateful firewalling functionality,

More information

CUSTOMER CONTROL PANEL... 2 DASHBOARD... 3 HOSTING &

CUSTOMER CONTROL PANEL... 2 DASHBOARD... 3 HOSTING & Table of Contents CUSTOMER CONTROL PANEL... 2 LOGGING IN... 2 RESET YOUR PASSWORD... 2 DASHBOARD... 3 HOSTING & EMAIL... 4 WEB FORWARDING... 4 WEBSITE... 5 Usage... 5 Subdomains... 5 SSH Access... 6 File

More information

SA3 E7 Advanced Linux System Administration III Internet Network Services and Security

SA3 E7 Advanced Linux System Administration III Internet Network Services and Security SA3 E7 Advanced Linux System Administration III Internet Network Services and Security Synopsis: This is a fast paced, level 3, advanced class for experienced administrators of Linux based hosts on a network

More information

Spam Quarantine. Overview of the Spam Quarantine. This chapter contains the following sections:

Spam Quarantine. Overview of the Spam Quarantine. This chapter contains the following sections: This chapter contains the following sections: Overview of the, page 1 Local Versus External, page 2 Setting Up the Local, page 2 Setting Up the Centralized, page 3 Edit Page, page 6 Using Safelists and

More information

XPress-I/O Device Server Command Reference

XPress-I/O Device Server Command Reference XPress-I/O Device Server Command Reference Part Number 900-464 Revision B July 2007 Copyright & Trademark Contacts 2006, 2007, Lantronix. All rights reserved. No part of the contents of this book may be

More information

User Manual op5 System 3.1

User Manual op5 System 3.1 User Manual op5 System 3.1 Table of Contents 1 Introduction... 2 2 Fundamentals... 2 2.1 op5 System... 2 2.2 System access... 2 2.2.1 The portal page... 2 2.2.2 Console and SSH access... 3 2.3 System accounts...

More information

Critical Analysis and last hour guide for RHCSA/RHCE Enterprise 7

Critical Analysis and last hour guide for RHCSA/RHCE Enterprise 7 Critical Analysis and last hour guide for RHCSA/RHCE Enterprise 7 Disclaimer: I haven t gone through RHCSA/RHCE EL 7. I am preparing for upgrade of my RHCE certificate from RHCE EL4 to RHCE EL7. I don

More information

Available Commands CHAPTER

Available Commands CHAPTER CHAPTER 2 This chapter contains the Cisco IPS 6.2 commands listed in alphabetical order. It contains the following sections:. anomaly-detection load, page 2-4 anomaly-detection save, page 2-5 banner login,

More information

Linux Interview Questions and Answers

Linux Interview Questions and Answers Linux Interview Questions and Answers You need to see the last fifteen lines of the files dog, cat and horse. What command should you use? tail -15 dog cat horse The tail utility displays the end of a

More information

Ciphermail Webmail Messenger Administration Guide

Ciphermail Webmail Messenger Administration Guide CIPHERMAIL EMAIL ENCRYPTION Ciphermail Webmail Messenger Administration Guide October 27, 2017, Rev: 8630 Copyright 2013-2017, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Admin login

More information

Shell Programming Overview

Shell Programming Overview Overview Shell programming is a way of taking several command line instructions that you would use in a Unix command prompt and incorporating them into one program. There are many versions of Unix. Some

More information

Perform Backup and Restore

Perform Backup and Restore , page 1 You can schedule periodic backups using the Cisco Prime Collaboration Assurance user interface, or run backup commands manually by logging in to the system as an admin user (CLI user). However,

More information

Troubleshooting IMAP Clients and ViewMail for Outlook

Troubleshooting IMAP Clients and ViewMail for Outlook Troubleshooting IMAP Clients and ViewMail for Outlook, page 1 Troubleshooting Problems with Changing Passwords When users change their Cisco Personal Communications Assistant (PCA) password in the Messaging

More information

Perform Backup and Restore

Perform Backup and Restore , page 1 You can schedule periodic backups using the Cisco Prime Collaboration user interface, or run backup commands manually by logging in to the system as an admin user (CLI user). However, you must

More information

Linux Essentials Objectives Topics:

Linux Essentials Objectives Topics: Linux Essentials Linux Essentials is a professional development certificate program that covers basic knowledge for those working and studying Open Source and various distributions of Linux. Exam Objectives

More information

Licensing the Application CHAPTER

Licensing the Application CHAPTER CHAPTER 5 Licensing Application, Configuring E-mail, Cisco.com, Proxy Settings, RCP, SCP Settings, Security, Backup, Authentication Settings and Idle Timeout Settings, Browser and Server Security Mode

More information

Intrusion Detection and Prevention IDP 4.1r4 Release Notes

Intrusion Detection and Prevention IDP 4.1r4 Release Notes Intrusion Detection and Prevention IDP 4.1r4 Release Notes Build 4.1.134028 September 22, 2009 Revision 02 Contents Overview...2 Supported Hardware...2 Changed Features...2 IDP OS Directory Structure...2

More information

Optional Labs. 0Handouts: 2002 ProsoftTraining All Rights Reserved. Version 3.07

Optional Labs. 0Handouts: 2002 ProsoftTraining All Rights Reserved. Version 3.07 0Handouts: Optional Lab 1-1: Understanding the /etc/securetty file In this lab, you will examine a PAM component, the /etc/securetty file. 1. Boot into Linux as root. Open a Telnet client and attempt to

More information

vcenter Server Appliance Configuration Modified on 17 APR 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7

vcenter Server Appliance Configuration Modified on 17 APR 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7 vcenter Server Appliance Configuration Modified on 17 APR 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Console Management Guide (Version 5.0.5)

Console Management Guide (Version 5.0.5) Console Management Guide (Version 5.0.5) Important Notice Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented without warranty of

More information

IBM Remote Support Manger for Storage

IBM Remote Support Manger for Storage IBM Remote Support Manger for Storage Installation Hints and Tips Version 4.273, December 1, 2011 This document is updated frequently. If viewing a hardcopy version of this document, please visit the RSM

More information

CLI COMMAND SUMMARY BY MODE

CLI COMMAND SUMMARY BY MODE CLI COMMAND SUMMARY BY MODE DDoS Module Configuration Mode Commands 267 (config-ddos) disable-as 269 (config-ddos) dproxy 271 (config-ddos) enable 273 (config-ddos) global-domain 275 (config-ddos) max-database-entries

More information

Perl and R Scripting for Biologists

Perl and R Scripting for Biologists Perl and R Scripting for Biologists Lukas Mueller PLBR 4092 Course overview Linux basics (today) Linux advanced (Aure, next week) Why Linux? Free open source operating system based on UNIX specifications

More information

User and System Administration

User and System Administration CHAPTER 2 This chapter provides information about performing user and system administration tasks and generating diagnostic information for obtaining technical assistance. The top-level Admin window displays

More information

Linux Fundamentals (L-120)

Linux Fundamentals (L-120) Linux Fundamentals (L-120) Modality: Virtual Classroom Duration: 5 Days SUBSCRIPTION: Master, Master Plus About this course: This is a challenging course that focuses on the fundamental tools and concepts

More information

Chapter-3. Introduction to Unix: Fundamental Commands

Chapter-3. Introduction to Unix: Fundamental Commands Chapter-3 Introduction to Unix: Fundamental Commands What You Will Learn The fundamental commands of the Unix operating system. Everything told for Unix here is applicable to the Linux operating system

More information

Comodo Dome Antispam Software Version 6.0

Comodo Dome Antispam Software Version 6.0 St rat Comodo Dome Antispam Software Version 6.0 Admin Guide Guide Version 6.7.073118 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Dome Anti-spam...5

More information

IPMI Configuration Guide

IPMI Configuration Guide IPMI Configuration Guide 1. Introduction of IPMI Server Manager... 2 2. IPMI Server Manager GUI Overview... 3 1 1. Introduction of IPMI Server Manager IPMI Server Manager allows remote access of computers

More information

Help for System Administrators

Help for System Administrators Help for System Administrators Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2018 SmarterTools Inc. Help for System Administrators

More information

Comodo Dome Antispam Software Version 6.0

Comodo Dome Antispam Software Version 6.0 St rat Comodo Dome Antispam Software Version 6.0 Admin Guide Guide Version 6.6.051117 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Dome Anti-spam...

More information

Bitnami MariaDB for Huawei Enterprise Cloud

Bitnami MariaDB for Huawei Enterprise Cloud Bitnami MariaDB for Huawei Enterprise Cloud First steps with the Bitnami MariaDB Stack Welcome to your new Bitnami application running on Huawei Enterprise Cloud! Here are a few questions (and answers!)

More information

American Dynamics RAID Storage System iscsi Software User s Manual

American Dynamics RAID Storage System iscsi Software User s Manual American Dynamics RAID Storage System iscsi Software User s Manual Release v2.0 April 2006 # /tmp/hello Hello, World! 3 + 4 = 7 How to Contact American Dynamics American Dynamics (800) 507-6268 or (561)

More information

Comodo Antispam Gateway Software Version 2.12

Comodo Antispam Gateway Software Version 2.12 Comodo Antispam Gateway Software Version 2.12 User Guide Guide Version 2.12.112017 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Antispam Gateway...3

More information

Administering vrealize Log Insight. September 20, 2018 vrealize Log Insight 4.7

Administering vrealize Log Insight. September 20, 2018 vrealize Log Insight 4.7 Administering vrealize Log Insight September 20, 2018 4.7 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation,

More information

SOLUTION MANAGEMENT GROUP

SOLUTION MANAGEMENT GROUP InterScan Messaging Security Virtual Appliance 8.0 Reviewer s Guide February 2011 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 T 800.228.5651 / 408.257.1500 F 408.257.2003 www.trendmicro.com

More information

Comodo Comodo Dome Antispam MSP Software Version 2.12

Comodo Comodo Dome Antispam MSP Software Version 2.12 Comodo Comodo Dome Antispam MSP Software Version 2.12 User Guide Guide Version 2.12.111517 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Dome

More information

AccessEnforcer Version 4.0 Features List

AccessEnforcer Version 4.0 Features List AccessEnforcer Version 4.0 Features List AccessEnforcer UTM Firewall is the simple way to secure and manage your small business network. You can choose from six hardware models, each designed to protect

More information

KYOCERA Net Admin User Guide

KYOCERA Net Admin User Guide KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information