NAME telnet - user interface to the TELNET protocol. SYNOPSIS telnet [[options ] host [ port ]]
|
|
- Angela Walsh
- 6 years ago
- Views:
Transcription
1 NAME telnet - user interface to the TELNET protocol SYNOPSIS telnet [[options ] host [ port ]] DESCRIPTION telnet is used to communicate with another host using the TELNET protocol. If telnet is invoked without arguments, it enters command mode, indicated by its prompt (telnet>). In this mode, it accepts and executes the commands listed below. If telnet is invoked with arguments, it performs an open command (see below) with those arguments. Once a connection has been opened, telnet enters an input mode. The input mode will be either "character at a time" or "line by line", depending on what the remote system supports. In "character at a time" mode, most text typed is immediately sent to the remote host for processing. In "line by line" mode, all text is echoed locally, and (normally) only completed lines are sent to the remote host. The "local echo character" (initially ˆE) can be used to turn-off and turn-on the local echo (this would mostly be used to enter passwords without the password being echoed). In either mode, if the localchars toggle is TRUE (the default in line mode; see below), the user s quit and intr characters are trapped locally, and sent as TELNET protocol sequences to the remote side. There are options (see toggle autoflush and toggle autosynch below) that cause this action to flush subsequent output to the terminal (until the remote host acknowledges the TELNET sequence) and flush previous terminal input (in the case of quit and intr). While connected to a remote host, telnet command mode can be entered by typing the telnet "escape character" (initially ˆ]). When in command mode, the normal terminal editing conventions are available. telnet supports 8-bit characters when communicating with the server on the remote host. To use eight-bit characters you may need to reconfigure your terminal or the remote host appropriately (see stty (1)). Furthermore, you may have to use the binary toggle to enable an 8-bit data stream between telnet and the remote host. Note: Some remote hosts may not provide the necessary support for eight-bit characters. If, at any time, telnet is unable to read from or write to the server over the connection, the message Connection closed by foreign host. is printed on standard error. telnet then exits with a value of 1. telnet supports the TAC User ID (also known as the TAC Access Control System, or TACACS User ID) option. Enabling the option on a host server allows the user to telnet into that host without being prompted for a second login sequence. The TAC User ID option uses the same security mechanism as rlogin for authorizing access by remote hosts and users. The system administrator must enable the (telnetd) option only on systems, which are designated as participating hosts. The system administrator must also assign to each user of TAC User ID the very same UID on every system for which he is allowed to use the feature. See the telnetd (1M) manpage and the HP-UX System Administrator s Guide. Options The following telnet options are available: -8 Enable cs8 (8 bit transfer) on local tty. -e c Set the telnet command mode escape character to be ˆc instead of its default value of ˆ]. -l Disable the TAC User ID option if enabled on the client, to cause the user to be prompted for login username and password. Omitting the -l option executes the default setting. Kerberos-Specific Options By default, or by use of the -a or the -l option, the Kerberos version of telnet behaves as a client which supports authentication based on Kerberos V5. As a Kerberos client, telnet will authenticate and authorize the user to access the remote system. See the sis(5) manpage for details on Kerberos authentication and authorization. However, it will not support integrity-checked or encrypted sessions. The default Kerberos options for the applications are set in the krb5.conf configuration file. Refer to the appdefaults Section in the krb5.conf (4) manpage for more information. The options -a, -f, and -F described in the subsequent paragraphs, can be set in the krb5.conf file with the tag names HP-UX 11i Version 3: September Hewlett-Packard Company 1
2 autologin, forward, and forwardable respectively. Refer to the appdefaults Section of the krb5.conf (4) manpage for more information. The fallback option can be set in the krb5.conf file within appdefaults Section. If fallback is set to true and the kerberos authentication fails, telnet will use the non-secure mode of authentication. Note: Command line options override configuration file options. The following options are Kerboros-specific: -a This option is applicable only in a secure environment based on Kerberos V5. Attempt automatic login into the Kerberos realm and disable the TAC User ID option. Note: This is the default login mode. Sends the user name via the NAME subnegotiation of the Authentication option. The name used is that of the current user as returned by the USER environment variable. If this variable is not defined, the name used is that returned by getpwnam() (see getpwent (3C)) if it agrees with the current user ID. Otherwise, it is the name associated with the user ID. -P This option is applicable only in a secure environment based on Kerberos V5. Disable use of Kerberos authentication and authorization. When this option is specified, a password is required that is sent across the network in a readable form. See the sis(5) manpage. -f This option is applicable only in a secure environment based on Kerberos V5. Allows local credentials to be forwarded to the remote system. Only one -f or -F option is allowed. They cannot be used together. -F This option is applicable only in a secure environment based on Kerberos V5. Allows local credentials to be forwarded to the remote system including any credentials that have already been forwarded into the local environment. Only one -f or -F option is allowed. They cannot be used together. -l user This option is applicable only in a secure environment based on Kerberos V5. Attempt automatic login into the Kerberos realm as the specified user and disable the TAC User ID option. The user name specified is sent via the NAME subnegotiation of the Authentication option. Omitting the -l option executes the default setting. Only one -l option is allowed. Commands The following commands are available in command mode. You need to type only sufficient prefix of each command to uniquely identify it (this is also true for arguments to the mode, set, toggle, and display commands). open host [ port ] Open a connection to the named host at the indicated port. If no port is specified, telnet attempts to contact a TELNET server at the standard TELNET port. In the IPv4 environment, hostname can be either the official name or an alias as understood by gethostbyname() (see gethostent (3N)) or an Internet address specified in the dot notation as described in hosts (4). In the IPv6 environment, hostname can be either the official name or an alias as understood by getnameinfo() (see getnameinfo (3N)) or an Internet address specified in the colon notation as described in hosts (4). If no hostname is given, telnet prompts for one. close Close a TELNET session. If the session was started from command mode, telnet returns to command mode; otherwise telnet exits. quit Close any open TELNET session and exit telnet. An end of file (in command mode) will also close a session and exit. z Suspend telnet. Iftelnet is run from a shell that supports job control, (such as csh(1) or ksh(1)), the z command suspends the TELNET session and returns the user to the shell that invoked telnet. Then the job can be resumed by using the fg command (see csh(1) or ksh(1)). mode mode Change telnet s user input mode to mode, which can be character (for "character at a time" mode) or line (for "line by line" mode). The remote host is asked for permission to go into the requested mode. If the remote host is capable of entering that mode, the requested mode is entered. In character mode, telnet sends each character to the remote host as it is typed. In line mode, telnet gathers user input into lines and transmits each line to the remote host when the user types carriage return, linefeed, or 2 Hewlett-Packard Company 2 HP-UX 11i Version 3: September 2010
3 EOF (normally ˆD; see stty (1)). Note: Setting line-mode also sets local echo. Applications that expect to interpret user input character by character (such as more, csh, ksh, and vi) do not work properly in line mode. status Show current status of telnet. telnet reports the current escape character. If telnet is connected, it reports the host to which it is connected and the current mode. If telnet is not connected to a remote host, it reports No connection. Once telnet has been connected, it reports the local flow control toggle value. display [ argument... ] Displays all or some of the set and toggle values (see below).? [ command ] Get help. With no arguments, telnet prints a help summary. If a command is specified, telnet prints the help information available about that command only. Help information is limited to a one-line description of the command.! [ shell_command ] Shell escape. The SHELL environment variable is checked for the name of a shell to use to execute the command. If no shell_command is specified, a shell is started and connected to the user s terminal. If SHELL is undefined, /usr/bin/sh is used. send arguments Sends one or more special character sequences to the remote host. Each argument can have any of the following values (multiple argument s can be specified with each send command): escape Sends the current telnet escape character (initially ˆ]). synch Sends the TELNET SYNCH sequence. This sequence causes the remote system to discard all previously typed (but not yet read) input. This sequence is sent as TCP urgent data (and may not work to some systems -- if it doesn t work, a lower case r may be echoed on the terminal). brk Sends the TELNET BRK (Break) sequence, which may have significance to the remote system. ip Sends the TELNET IP (Interrupt Process) sequence, which should cause the remote system to abort the currently running process. ao Sends the TELNET AO (Abort Output) sequence, which should cause the remote system to flush all output from the remote system to the user s terminal. ayt Sends the TELNET AYT (Are You There) sequence, to which the remote system may or may not choose to respond. ec Sends the TELNET EC (Erase Character) sequence, which should cause the remote system to erase the last character entered. el Sends the TELNET EL (Erase Line) sequence, which should cause the remote system to erase the line currently being entered. ga Sends the TELNET GA (Go Ahead) sequence, which is likely to have no significance to the remote system. nop Sends the TELNET NOP (No OPeration) sequence.? Prints out help information for the send command. set variable_name value Set any of the telnet variables to a specific value. The special value off turns off the function associated with the variable. The values of variables can be shown by using the display command. The following variable_names can be specified: echo This is the value (initially ˆE) which, toggles between doing local echoing of entered characters (for normal processing), and suppressing echoing of entered characters (for entering, for example, a password) in line-by-line mode. HP-UX 11i Version 3: September Hewlett-Packard Company 3
4 escape This is the telnet escape character (initially ˆ]) that causes entry into telnet command mode (when connected to a remote system). interrupt If telnet is in localchars mode (see toggle localchars below) and the interrupt character is typed, a TELNET IP sequence (see send ip above) is sent to the remote host. The initial value for the interrupt character is taken to be the terminal s intr character. quit If telnet is in localchars mode (see toggle localchars below) and the quit character is typed, a TELNET BRK sequence (see send brk above) is sent to the remote host. The initial value for the quit character is taken to be the terminal s quit character. flushoutput If telnet is in localchars mode (see toggle localchars below) and the flushoutput character is typed, a TELNET AO sequence (see send ao above) is sent to the remote host. The initial value for the flush character is ˆO. erase If telnet is in localchars mode (see toggle localchars below), and if telnet is operating in character-at-a-time mode, then when this character is typed, a TELNET EC sequence (see send ec above) is sent to the remote system. The initial value for the erase character is taken to be the terminal s erase character. kill If telnet is in localchars mode (see toggle localchars below), and if telnet is operating in character-at-a-time mode, then when this character is typed, a TELNET EL sequence (see send el above) is sent to the remote system. The initial value for the kill character is taken to be the terminal s kill character. eof If telnet is operating in line-by-line mode, entering this character as the first character on a line causes this character to be sent to the remote system. The initial value of the eof character is taken to be the terminal s eof character. toggle arguments... Toggle (between TRUE and FALSE ) various flags that control how telnet responds to events. More than one argument can be specified. The state of these flags can be shown by using the display command. Valid arguments are: localchars If TRUE, the flush, interrupt, quit, erase, and kill characters (see set above) are recognized locally, and transformed into appropriate TELNET control sequences (respectively ao, ip, brk, ec, and el; see send above). The initial value for this toggle is TRUE in line-by-line mode, and FALSE in character-at-a-time mode. autoflush If autoflush and localchars are both TRUE, whenever the ao, intr, or quit characters are recognized (and transformed into TELNET sequences see set above for details), telnet refuses to display any data on the user s terminal until the remote system acknowledges (via a TELNET Timing Mark option) that it has processed those TELNET sequences. The initial value for this toggle is TRUE. autologin This flag is available only in a secure environment based on Kerberos V5. Enable or disable automatic login into the Kerberos realm. Using this option yields the same results as using the -a option. The initial value for this toggle is TRUE. autosynch If autosynch and localchars are both TRUE, when either the intr or quit character is typed (see set above for descriptions of the intr and quit characters), the resulting TELNET sequence sent is followed by the TELNET SYNCH sequence. This procedure causes the remote system to begin 4 Hewlett-Packard Company 4 HP-UX 11i Version 3: September 2010
5 discarding all previously typed input until both of the TELNET sequences have been read and acted upon. The initial value of this toggle is FALSE. binary Enable or disable the TELNET BINARY option on both input and output. This option should be enabled in order to send and receive 8-bit characters to and from the TELNET server. crlf If TRUE, end-of-line sequences are sent as an ASCII carriage-return and linefeed pair. If FALSE, end-of-line sequences are sent as an ASCII carriagereturn and NUL character pair. The initial value for this toggle is FALSE. crmod Toggle carriage return mode. When this mode is enabled, any carriage return characters received from the remote host are mapped into a carriage return and a line feed. This mode does not affect those characters typed by the user; only those received. This mode is only required for some hosts that require the client to do local echoing, but output naked carriage returns. The initial value for this toggle is FALSE. echo Toggle local echo mode or remote echo mode. In local echo mode, user input is echoed to the terminal by the local telnet before being transmitted to the remote host. In remote echo, any echoing of user input is done by the remote host. Applications that handle echoing of user input themselves, such as C shell, Korn shell, and vi (see csh(1), ksh(1), and vi(1)), do not work correctly with local echo. options Toggle viewing of TELNET options processing. When options viewing is enabled, all TELNET option negotiations are displayed. Options sent by telnet are displayed as SENT, while options received from the TEL- NET server are displayed as RCVD. The initial value for this toggle is FALSE. netdata Toggles the display of all network data (in hexadecimal format). The initial value for this toggle is FALSE.? Displays the legal toggle commands. RETURN VALUE In the event of an error, or if the TELNET connection is closed by the remote host, telnet returns a value of 1. Otherwise, it returns 0. DIAGNOSTICS The following diagnostic messages are displayed by telnet: Error! Could not retrieve authentication type. There are two authentication mechanisms used by TELNET. One authentication mechanism is based on Kerberos and the other is not. The type of authentication mechanism is obtained from a system file, which is updated by inetsvcs_sec. If the system file on either the local host or the remote host does not contain known authentication types, the above error is displayed. telnet/tcp: Unknown service telnet was unable to find the TELNET service entry in the services (4) database. hostname: Unknown host telnet was unable to map the host name to an Internet address. Your next step should be to contact the system administrator to check whether there is an entry for the remote host in the hosts database (see hosts (4)).?Invalid command An invalid command was typed in telnet command mode. system call>:... An error occurred in the specified system call. See the appropriate manual entry for a description of the error. AUTHOR telnet was developed by the University of California, Berkeley. HP-UX 11i Version 3: September Hewlett-Packard Company 5
6 SEE ALSO csh(1), ksh(1), login(1), rlogin(1), stty(1), telnetd(1m), inetsvcs_sec(1m), hosts(4), krb5.conf(4), services(4), sis(5), termio(7). 6 Hewlett-Packard Company 6 HP-UX 11i Version 3: September 2010
D. Borman, Editor Cray Research, Inc. August 1989
Network Working Group Request for Comments: 1116 Internet Engineering Task Force Telnet Linemode Working Group D. Borman, Editor Cray Research, Inc. August 1989 Telnet Linemode Option Status of this Memo
More informationOctober Telnet Linemode Option. Status of this Memo
Network Working Group Request for Comments: 1184 Obsoletes: RFC 1116 Telnet Working Group D. Borman, Editor Cray Research, Inc. October 1990 Telnet Linemode Option Status of this Memo This memo describes
More informationNetwork Working Group Request for Comments: 854 ISI Obsoletes: NIC May 1983
Network Working Group J. Postel Request for Comments: 854 J. Reynolds ISI Obsoletes: NIC 18639 May 1983 TELNET PROTOCOL SPECIFICATION This RFC specifies a standard for the ARPA Internet community. Hosts
More informationVirtual Terminal Apps telnet/rlogin
Virtual Terminal Apps telnet/rlogin TCP/IP class 1 outline intro telnet architecture nvt option negotiation rlogin what else? 2 intro - network terminals telnet - TCP/IP classic application, RFC 854, 1983
More informationConfiguring Dial-In Terminal Services
Configuring Dial-In Terminal Services This chapter describes how to configure support for asynchronous character stream calls running Telnet, rlogin, local-area transport (LAT), XRemote, or TN3270. It
More informationStudy Guide Linux Terminals
Study Guide Linux Terminals Q1 - Keyboard shortcuts Match the following actions or meanings to the corresponding keyboard shortcuts. # Actions # Shortcuts 1 Interrupt the currently executing program 1
More informationTable of Contents 1 Commands for Access Controller Switch Interface Board 1-1
Table of Contents 1 Commands for Access Controller Switch Interface Board 1-1 Commands for Access Controller and Access Controller Switch Interface Board 1-1 acl (user interface view) 1-1 activation-key
More informationSymbols INDEX. <cr> baud rates? command xiv. transmit line speed, configuring. buffers. XRemote size TR-224 busy-message command
INDEX Symbols B xv baud rates? command xiv transmit line speed, configuring TR-208 buffers A XRemote size TR-224 busy-message command TR-17 absolute-timeout command TR-2 access-class (LAT) command
More informationInternet Fundamentals
Internet Fundamentals Lecture-16 TELNET NVT Chapter 18 Remote Login: Telnet Objectives Upon completion you will be able to: Understand how TELNET works Understand the role of NVT in a TELNET communication
More informationChapter 1 Configuring TCP/IP
Chapter 1 Configuring TCP/IP 1 This chapter describes the TCP/IP protocol, and specifically, how Cisco Systems implements this protocol on its protocol translators. Topics in this chapter include: Configuring
More informationConfiguring TACACS+ Information About TACACS+ Send document comments to CHAPTER
4 CHAPTER This chapter describes how to configure the Terminal Access Controller Access Control System Plus (TACACS+) protocol on NX-OS devices. This chapter includes the following sections: Information
More informationIntroduction p. 1 Who Should Read This Book? p. 1 What You Need to Know Before Reading This Book p. 2 How This Book Is Organized p.
Introduction p. 1 Who Should Read This Book? p. 1 What You Need to Know Before Reading This Book p. 2 How This Book Is Organized p. 2 Conventions Used in This Book p. 2 Introduction to UNIX p. 5 An Overview
More informationMANAGING THE NONUNIFORM BEHAVIOUR OF TERMINALS AND KEYBOARDS. : WHEN THINGS GO WRONG
MANAGING THE NONUNIFORM BEHAVIOUR OF TERMINALS AND KEYBOARDS. : WHEN THINGS GO WRONG Terminals and keyboards have no uniform behavioral pattern. Terminal settings directly impact the keyboard operation.
More informationThe Compact Single-Port Terminal Server User s Guide
The Compact Single-Port Terminal Server User s Guide Black Box Corporation 1000 Park Drive Lawrence, PA 15055 Document Number: LE995A-R4 Printed in the United States of America. i Notices All rights reserved.
More informationExamples of Cisco APE Scenarios
CHAPTER 5 This chapter describes three example scenarios with which to use Cisco APE: Access to Asynchronous Lines, page 5-1 Cisco IOS Shell, page 5-3 Command Authorization, page 5-5 Note For intructions
More informationPerforming Basic System Management
This module describes the basic tasks that you can perform to manage the general system features of the Cisco IOS software--those features that are generally not specific to a particular protocol. Finding
More informationData Structure Mapping
This appendix provides information about the data objects that are migrated, partially migrated, and not migrated from Cisco Secure ACS, Release 5.5 or 5.6 to Cisco ISE, Release 2.0., page 1 Migrated Data
More informationConfiguring TACACS+ About TACACS+
This chapter describes how to configure the Terminal Access Controller Access Control System Plus (TACACS+) protocol on Cisco NX-OS devices. This chapter includes the following sections: About TACACS+,
More informationData Structure Mapping
This appendix provides information about the data objects that are migrated, partially migrated, and not migrated from Cisco Secure ACS, Release 5.5 or later to Cisco ISE, Release 2.1., page 1 Migrated
More informationlsx [ls_options ] [names]
NAME ls, lc, l, ll, lsf, lsr, lsx - list contents of directories SYNOPSIS ls [-abcdefgilmnopqrstuxacfhlr1] [names] lc [-abcdefgilmnopqrstuxacfhlr1] [names] l [ls_options ] [names] ll [ls_options ] [names]
More informationConfiguring the Management Interface and Security
CHAPTER 5 Configuring the Management Interface and Security Revised: February 15, 2011, Introduction This module describes how to configure the physical management interfaces (ports) as well as the various
More informationConfiguring Kerberos
Configuring Kerberos Last Updated: January 26, 2012 Finding Feature Information, page 1 Information About Kerberos, page 1 How to Configure Kerberos, page 5 Kerberos Configuration Examples, page 13 Additional
More informationManaging GSS User Accounts Through a TACACS+ Server
4 CHAPTER Managing GSS User Accounts Through a TACACS+ Server This chapter describes how to configure the GSS, primary GSSM, or standby GSSM as a client of a Terminal Access Controller Access Control System
More informationManaging GSS User Accounts Through a TACACS+ Server
CHAPTER 4 Managing GSS User Accounts Through a TACACS+ Server This chapter describes how to configure the GSS, primary GSSM, or standby GSSM as a client of a Terminal Access Controller Access Control System
More informationData Structure Mapping
This appendix provides information about the data objects that are migrated, partially migrated, and not migrated from Cisco Secure ACS, Release 5.5 or 5.6 to Cisco ISE, Release 1.4., page 1 Migrated Data
More informationIntroduction to UNIX. Logging in. Basic System Architecture 10/7/10. most systems have graphical login on Linux machines
Introduction to UNIX Logging in Basic system architecture Getting help Intro to shell (tcsh) Basic UNIX File Maintenance Intro to emacs I/O Redirection Shell scripts Logging in most systems have graphical
More informationData Structure Mapping
This appendix provides information about the data objects that are migrated, partially migrated, and not migrated from, Release 5.5 or later to Cisco ISE, Release 2.3., page 1 Supported Data Objects for
More informationData Structure Mapping
This appendix provides information about the data objects that are migrated, partially migrated, and not migrated from Cisco Secure ACS, Release 5.5 or later to Cisco ISE, Release 2.3., on page 1 Supported
More informationHP-UX TN3270 Users Guide
HP-UX TN3270 Users Guide Edition 1 HP Part Number J2656-90030 J2656-90030 HP 9000 Networking E03/98 Printed in: United States Copyright 1998 Hewlett-Packard Company, 1998. All rights reserved Legal Notices
More informationHP 5120 SI Switch Series
HP 5120 SI Switch Series Network Management and Monitoring Configuration Guide Part number: 5998-1813 Software version: Release 1505 Document version: 6W102-20121111 Legal and notice information Copyright
More informationNetwork Working Group. NIC: June 1973
Network Working Group E. Faeh Request for Comments: 437 Computer Systems Laboratory, UCSB NIC: 13701 30 June 1973 DATA RECONFIGURATION SERVICE AT UCSB This purpose of this RFC is to announce the availability
More informationIOLAN. DS1/TS2 Command Line Interface Reference Guide. Version 3.4 Part #
IOLAN DS1/TS2 Command Line Interface Reference Guide Version 3.4 Part #5500208-11 January 2008 Copyright Statement This document must not be reproduced in any way whatsoever, either printed or electronically,
More informationTerminal Services Commands translate lat
translate lat translate lat To translate a connection request to another protocol connection type when receiving a local-area transport (LAT) request, use the translate lat command in global configuration
More informationTACACS+ Configuration Mode Commands
Important TACACS Configuration Mode is available in releases 11.0 and later. This chapter describes all commands available in the TACACS+ Configuration Mode. TACACS+ (Terminal Access Controller Access-Control
More informationConfiguring Switch-Based Authentication
CHAPTER 7 This chapter describes how to configure switch-based authentication on the switch. Unless otherwise noted, the term switch refers to a standalone switch and to a switch stack. This chapter consists
More informationChapter 6 Global CONFIG Commands
Chapter 6 Global CONFIG Commands aaa accounting Configures RADIUS or TACACS+ accounting for recording information about user activity and system events. When you configure accounting on an HP device, information
More information5/20/2007. Touring Essential Programs
Touring Essential Programs Employing fundamental utilities. Managing input and output. Using special characters in the command-line. Managing user environment. Surveying elements of a functioning system.
More informationivu Plus BCR Communications Instruction Manual
ivu Plus BCR Communications Instruction Manual Original Instructions B_3084221 Rev. C 18 March 2014 Contents 1 Introduction... 3 2 ivu Plus Communication Summary of Ethernet and Serial... 4 2.1 Communication
More informationTelnet Server Application note for W5200
Telnet Server Application note for W5200 Version 1.0 2011 WIZnet Co., Inc. All Rights Reserved. For more information, visit our website at http://www.wiznet.co.kr Copyright 2011 WIZnet Co., Inc. All rights
More informationJanuary Sender is willing to send list of supported 3270 Regimes in a subsequent sub-negotiation.
Network Working Group Request For Comments: 1041 J. Rekhter T.J. Watson Research Center, IBM January 1988 Telnet 3270 Regime Option STATUS OF THIS MEMO This RFC specifies a proposed standard for the Internet
More informationNetwork Working Group Request for Comments: 1576 Category: Informational January 1994
Network Working Group J. Penner Request for Comments: 1576 DCA, Inc. Category: Informational January 1994 Status of this Memo TN3270 Current Practices This memo provides information for the Internet community.
More informationMost of the work is done in the context of the process rather than handled separately by the kernel
Process Control Process Abstraction for a running program Manages program s use of memory, cpu time, and i/o resources Most of the work is done in the context of the process rather than handled separately
More informationData Structure Mapping
This appendix provides information about the data objects that are migrated, partially migrated, and not migrated from Cisco Secure ACS, Release 5.5 or later to Cisco ISE, Release 2.2., page 1 Supported
More informationAppendix A GLOSSARY. SYS-ED/ Computer Education Techniques, Inc.
Appendix A GLOSSARY SYS-ED/ Computer Education Techniques, Inc. $# Number of arguments passed to a script. $@ Holds the arguments; unlike $* it has the capability for separating the arguments. $* Holds
More informationUnix Scripts and Job Scheduling. Overview. Running a Shell Script
Unix Scripts and Job Scheduling Michael B. Spring Department of Information Science and Telecommunications University of Pittsburgh spring@imap.pitt.edu http://www.sis.pitt.edu/~spring Overview Shell Scripts
More informationUnix Introduction to UNIX
Unix Introduction to UNIX Get Started Introduction The UNIX operating system Set of programs that act as a link between the computer and the user. Developed in 1969 by a group of AT&T employees Various
More informationVISUDO(8) System Manager s Manual VISUDO(8)
NAME visudo - edit the sudoers file SYNOPSIS visudo [-chqsv] [-f sudoers] [-x output_file] DESCRIPTION visudo edits the sudoers file in a safe fashion, analogous to vipw(8). visudo locks the sudoers file
More informationConfiguring Secure Shell (SSH)
Prerequisites for Configuring Secure Shell, page 1 Restrictions for Configuring Secure Shell, page 2 Information About Configuring Secure Shell, page 2 How to Configure Secure Shell, page 4 Monitoring
More informationCCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols
CCNA Exploration Network Fundamentals Chapter 03 Application Functionality and Protocols Updated: 27/04/2008 1 3.1 Applications: The Interface Between Human and Networks Applications provide the means
More informationII I, F/6B7/ BOLT BERANEK AND NEWMAN INC CAMBRI06E MA PLURIBJS TIP USERS' BUIDE.(U) JAN 81 N W MIMNOE W HISCOX DCAIII-77-C-0616.
AD-AO9g 936 AUN-CLASSIFIED BB-41 3 5 F/6B7/ BOLT BERANEK AND NEWMAN INC CAMBRI06E MA PLURIBJS TIP USERS' BUIDE.(U) JAN 81 N W MIMNOE W HISCOX DCAIII-77-C-0616 ML II I, I Bolt Beranek and Newman Inc Iml71
More informationConfiguring TACACS+ Finding Feature Information. Prerequisites for TACACS+
Finding Feature Information, page 1 Prerequisites for TACACS+, page 1 Information About TACACS+, page 3 How to Configure TACACS+, page 7 Monitoring TACACS+, page 16 Finding Feature Information Your software
More informationOverview of the Cisco NCS Command-Line Interface
CHAPTER 1 Overview of the Cisco NCS -Line Interface This chapter provides an overview of how to access the Cisco Prime Network Control System (NCS) command-line interface (CLI), the different command modes,
More informationNortel Unified Communications Management. Fundamentals. Release: 1.0 Document Revision: NN
Release: 1.0 Document Revision: 01.01 www.nortel.com NN48014-100. Release: 1.0 Publication: NN48014-100 Document release date: All Rights Reserved. Printed in Canada NORTEL, the globemark design, and the
More informationLezione 8. Shell command language Introduction. Sommario. Bioinformatica. Mauro Ceccanti e Alberto Paoluzzi
Lezione 8 Bioinformatica Mauro Ceccanti e Alberto Paoluzzi Dip. Informatica e Automazione Università Roma Tre Dip. Medicina Clinica Università La Sapienza Sommario Shell command language Introduction A
More informationCSCI 2132 Software Development. Lecture 3: Unix Shells and Other Basic Concepts
CSCI 2132 Software Development Lecture 3: Unix Shells and Other Basic Concepts Instructor: Vlado Keselj Faculty of Computer Science Dalhousie University 10-Sep-2018 (3) CSCI 2132 1 Introduction to UNIX
More informationConfiguring Management Access
37 CHAPTER This chapter describes how to access the ASA for system management through Telnet, SSH, and HTTPS (using ASDM), how to authenticate and authorize users, how to create login banners, and how
More informationChapter 1 TCP/IP Configuration and Management
Chapter 1 TCP/IP Configuration and Management 1 This chapter describes how to configure the TCP/IP protocol, and specifically, how Cisco Systems implements this protocol on its protocol translators. You
More informationIOLAN. DS1/TS2 Command Line Interface Reference Guide. Version 4.9 Part # (Rev B)
IOLAN DS1/TS2 Command Line Interface Reference Guide Version 4.9 Part #5500208-46 (Rev B) February 2017 Copyright Statement This document must not be reproduced in any way whatsoever, either printed or
More information11/3/71 SYS MOUNT (II) sys mount; special; name / mount = 21.; not in assembler
11/3/71 SYS MOUNT (II) SYNOPSIS mount -- mount file system sys mount; special; name / mount = 21.; not in assembler mount announces to the system that a removable file system has been mounted on special
More informationVISUDO(8) System Manager s Manual VISUDO(8)
NAME visudo - edit the sudoers file SYNOPSIS visudo [-chqsv] [-f sudoers] [-x output_file] DESCRIPTION visudo edits the sudoers file in a safe fashion, analogous to vipw(8). visudo locks the sudoers file
More informationTrueSight Capacity Optimization 10.x - LDAP Integration with Microsoft Active Directory. January 2017
TrueSight Capacity Optimization 10.x - LDAP Integration with Microsoft Active Directory January 2017 If you plan to use Capacity Views, or other views provided by TrueSight Presentation Server, don t waste
More informationUNIX: Using PICO on Central UNIX
Using PICO on Central UNIX SYNOPSIS This chapter provides a summary of the basic pico commands. Basic operations such as cursor movement, inserting and deleting text, and searches are covered to give the
More information12.1 UNDERSTANDING UNIX SHELL PROGRAMMING LANGUAGE: AN INTRODUCTION Writing a Simple Script Executing a Script
12 Shell Programming This chapter concentrates on shell programming. It explains the capabilities of the shell as an interpretive high-level language. It describes shell programming constructs and particulars.
More informationConfiguring Kerberos
Kerberos is a secret-key network authentication protocol, developed at the Massachusetts Institute of Technology (MIT), that uses the Data Encryption Standard (DES) cryptographic algorithm for encryption
More informationNetwork Working Group Request for Comments: 1053 Minnesota Supercomputer Center April 1988
Network Working Group Request for Comments: 1053 S. Levy T. Jacobson Minnesota Supercomputer Center April 1988 Telnet X.3 PAD Option Status of this Memo This RFC proposes a new option to Telnet for the
More informationThe Discovery Wizard now provides the ability to create SNMP Setups that can be selected for individual discoveries. An SNMP Setup specifies:
Using Discovery Using Discovery Open the Discovery application by clicking Discovery in the Task Bar, selecting Discovery from the Applications menu, or by clicking the Discovery icon in the Topology Toolbar.
More informationLezione 8. Shell command language Introduction. Sommario. Bioinformatica. Esercitazione Introduzione al linguaggio di shell
Lezione 8 Bioinformatica Mauro Ceccanti e Alberto Paoluzzi Esercitazione Introduzione al linguaggio di shell Dip. Informatica e Automazione Università Roma Tre Dip. Medicina Clinica Università La Sapienza
More informationNortel Unified Communications Management. Fundamentals. Release: 1.0 Document Revision: NN
Release: 1.0 Document Revision: 01.02 www.nortel.com NN48014-100. Release: 1.0 Publication: NN48014-100 Document release date: All Rights Reserved. Printed in Canada The information in this document is
More informationXML Transport and Event Notifications
CHAPTER 13 This chapter contains these sections: TTY-Based Transports, page 13-129 Dedicated Connection Based Transports, page 13-131 SSL Dedicated Connection based Transports, page 13-133 TTY-Based Transports
More informationOmniVista 3.5 Discovery Help
Using Discovery Open the Discovery application by clicking Discovery in the Task Bar, selecting Discovery from the Applications menu, or by clicking the Discovery icon in the Topology Toolbar. The Discovery
More informationTELNET is short for Terminal Network Enables the establishment of a connection to a remote system, so that the local terminal appears to be the
Telnet/SSH TELNET is short for Terminal Network Enables the establishment of a connection to a remote system, so that the local terminal appears to be the terminal at the remote location. Usually establishes
More informationEDIT - DOS/65 EDITOR VERSION 2.1
EDIT - DOS/65 EDITOR (Copyright) Richard A. Leary 180 Ridge Road Cimarron, CO 81220 This documentation and the associated software is not public domain, freeware, or shareware. It is still commercial documentation
More informationBEAWebLogic RFID. Edge Server. Using the Administration Console
BEAWebLogic RFID Edge Server Using the Administration Console Version 2.1 Revised: June 29, 2006 Contents 1. Introduction and Roadmap Document Scope and Audience.............................................
More informationManaging Connections Menus and System Banners
Managing Connections Menus and System Banners Management of connections to other hosts, banner messages for router users, and creation of menus for specific user tasks consists of many optional features
More informationUnix Shells and Other Basic Concepts
CSCI 2132: Software Development Unix Shells and Other Basic Concepts Norbert Zeh Faculty of Computer Science Dalhousie University Winter 2019 Shells Shell = program used by the user to interact with the
More informationUsing the Command Line Interface
CHAPTER 2 Using the Command Line Interface 2.1 Commonly Used Commands This section documents the Cisco Broadband Operating System (CBOS) commands and command arguments that manage the Cisco 67x. CBOS runs
More informationSUDO(8) System Manager s Manual SUDO(8)
NAME sudo, sudoedit - execute a command as another user SYNOPSIS sudo -h -K -k -V sudo -v [-AknS] [-a type] [-g group] [-h host] [-p prompt] [-u user] sudo -l [-AknS] [-a type] [-g group] [-h host] [-p
More informationConfiguring Security with Passwords, Privileges, and Logins
Configuring Security with Passwords, Privileges, and Logins Cisco IOS based networking devices provide several features that can be used to implement basic security for CLI sessions using only the operating
More informationBashed One Too Many Times. Features of the Bash Shell St. Louis Unix Users Group Jeff Muse, Jan 14, 2009
Bashed One Too Many Times Features of the Bash Shell St. Louis Unix Users Group Jeff Muse, Jan 14, 2009 What is a Shell? The shell interprets commands and executes them It provides you with an environment
More informationVi & Shell Scripting
Vi & Shell Scripting Comp-206 : Introduction to Week 3 Joseph Vybihal Computer Science McGill University Announcements Sina Meraji's office hours Trottier 3rd floor open area Tuesday 1:30 2:30 PM Thursday
More informationApplication Level Protocols
Application Level Protocols 2 Application Level Protocols Applications handle different kinds of content e.g.. e-mail, web pages, voice Different types of content require different kinds of protocols Application
More informationPersistent Data Transfer Procedure
This chapter describes exporting and importing Cisco Secure ACS, Release 5.5 or 5.6 data into Cisco ISE, Release 1.4 system using the migration tool. Exporting Data from Cisco Secure ACS, page 1 Analyzing
More informationRelease Notes: Version G Operating System for the HP Procurve Switch 4108GL. Caution: Archive Pre-G Configuration Files
Release Notes: Version G.04.05 Operating System for the HP Procurve Switch 4108GL These release notes include information on the following: Downloading switch software and Documentation from the Web Friendly
More informationData Structure Mapping
This appendix provides information about the data objects that are migrated, partially migrated, and not migrated from Cisco Secure ACS, Release 5.5 or later to Cisco ISE, Release 2.1., on page 1 Migrated
More informationCustomer Tips. AIX PCL Printing. for the user. Purpose. Creating a New Print Queue. Xerox Multi-function Device. dc04cc0351.
Xerox Multi-function Device Customer Tips January 14, 2005 AIX PCL Printing for the user Purpose The Xerox AIX print driver uses Postscript (instead of PCL) for print formatting. This document describes
More informationHP Load Balancing Module
HP Load Balancing Module System Management Configuration Guide Part number: 5998-4216 Software version: Feature 3221 Document version: 6PW100-20130326 Legal and notice information Copyright 2013 Hewlett-Packard
More information-1- csh cd. cd alias!! ; set prompt=" pwd % " 16 cd. 17 cd.. 18 his /home% set prompt. alias. yasuoka : root :
-1- csh 4 root root prompt set prompt pwd % prompt alias alias pwd % alias cd \!\! ; set prompt=" pwd % " pwd % cd. cd.. his 9 set prompt= pwd % 10 cd 11 set prompt=" pwd % " 12 cd.. 13 set prompt= pwd
More informationLab 5.6b Configuring AAA and RADIUS
Lab 5.6b Configuring AAA and RADIUS Learning Objectives Install CiscoSecure ACS Configure CiscoSecure ACS as a RADIUS server Enable AAA on a router using a remote RADIUS server Topology Diagram Scenario
More informationLinux System Administration
System Processes Objective At the conclusion of this module, the student will be able to: Describe and define a process Identify a process ID, the parent process and the child process Learn the PID for
More informationKerberos-enabled applications. Core services for UNIX shell programs and applications. Kerberos environment. Centrify DirectControl Service Library
Understanding Centrify DirectControl Agents The Centrify DirectControl Agent makes a UNIX, Linux, or Mac OS X computer look and behave like a Windows client computer to Active Directory. The Centrify DirectControl
More informationHP-UX Software and Patching Management Using HP Server Automation
HP-UX Software and Patching Management Using HP Server Automation Software Version 7.84, released August 2010 Overview... 2 Patch Management for HP-UX Prerequisites... 2 HP-UX Patching Features... 2 Importing
More informationWhat is the Shell. Whenever you login to a Unix system you are placed in a program called the shell. All of your work is done within the shell.
What is the Shell Whenever you login to a Unix system you are placed in a program called the shell. All of your work is done within the shell. The shell is your interface to the operating system. It acts
More informationControl Device Administration Using TACACS+
Device Administration, page 1 Device Administration Work Center, page 3 Data Migration from Cisco Secure ACS to Cisco ISE, page 3 Device Admin Policy Sets, page 3 TACACS+ Authentication Settings, page
More informationCSE II-Sem)
1 2 a) Login to the system b) Use the appropriate command to determine your login shell c) Use the /etc/passwd file to verify the result of step b. d) Use the who command and redirect the result to a file
More informationSoftware Update C.09.xx Release Notes for the HP Procurve Switches 1600M, 2400M, 2424M, 4000M, and 8000M
Software Update C.09.xx Release Notes for the HP Procurve Switches 1600M, 2400M, 2424M, 4000M, and 8000M Topics: TACACS+ Authentication for Centralized Control of Switch Access Security (page 7) CDP (page
More informationConfiguring Lock-and-Key Security (Dynamic Access Lists)
Configuring Lock-and-Key Security (Dynamic Access Lists) Feature History Release Modification Cisco IOS For information about feature support in Cisco IOS software, use Cisco Feature Navigator. This chapter
More informationConfiguring a Terminal/Comm Server
Configuring a Terminal/Comm Server Document ID: 5466 Introduction Prerequisites Requirements Components Used Conventions Cabling Design Strategy Configure Network Diagram Configurations Command Summary
More informationAdvanced Unix Concepts. Satyajit Rai
Advanced Unix Concepts Advanced Unix Concepts Satyajit Rai March 17, 2003 March 22, 2003 KReSIT, IIT Bombay 1 Contents Contents Advanced Unix Concepts.......... 1 Contents.................. 2 Process Creation..............
More informationUnix Internal Assessment-2 solution. Ans:There are two ways of starting a job in the background with the shell s & operator and the nohup command.
Unix Internal Assessment-2 solution 1 a.explain the mechanism of process creation. Ans: There are three distinct phases in the creation of a process and uses three important system calls viz., fork, exec,
More informationTresorit Active Directory Connector V2.0. User s Guide
Tresorit Active Directory Connector V2.0 User s Guide Copyright by Tresorit 2018 Contents About Tresorit Active Directory Connector... 4 Features... 4 Synchronization logic... 5 About managed users and
More information