Freenas® 11.2-U4 User Guide

Total Page:16

File Type:pdf, Size:1020Kb

Freenas® 11.2-U4 User Guide FreeNAS® 11.2-U4 User Guide FreeNAS® is © 2011-2019 iXsystems FreeNAS® and the FreeNAS® logo are registered trademarks of iXsystems FreeBSD® is a registered trademark of the FreeBSD Foundation Written by users of the FreeNAS® network-attached storage operating system. Version 11.2 Copyright © 2011-2019 iXsystems (https://www.ixsystems.com/) CONTENTS Welcome ......................................................... 8 Typographic Conventions ................................................ 10 1 Introduction 11 1.1 New Features in 11.2 ............................................... 11 1.1.1 RELEASE-U1 ................................................ 14 1.1.2 U2 ..................................................... 14 1.1.3 U3 ..................................................... 15 1.1.4 U4 ..................................................... 16 1.2 Path and Name Lengths ............................................. 16 1.3 Hardware Recommendations .......................................... 18 1.3.1 RAM .................................................... 18 1.3.2 The Operating System Device ...................................... 19 1.3.3 Storage Disks and Controllers ...................................... 19 1.3.4 Network Interfaces ............................................ 20 1.4 Getting Started with ZFS ............................................. 21 2 Installing and Upgrading 22 2.1 Getting FreeNAS® ................................................. 22 2.2 Preparing the Media ............................................... 22 2.2.1 On FreeBSD or Linux ........................................... 23 2.2.2 On Windows ............................................... 23 2.2.3 On macOS ................................................. 23 2.3 Performing the Installation ............................................ 24 2.4 Installation Troubleshooting ........................................... 31 2.5 Upgrading ..................................................... 32 2.5.1 Caveats .................................................. 32 2.5.2 Initial Preparation ............................................ 32 2.5.3 Upgrading Using the ISO ......................................... 33 2.5.4 Upgrading From the Web Interface ................................... 35 2.5.5 If Something Goes Wrong ........................................ 35 2.5.6 Upgrading a ZFS Pool .......................................... 37 2.6 Virtualization .................................................... 38 2.6.1 VirtualBox ................................................. 39 2.6.2 VMware ESXi ............................................... 49 3 Booting 56 3.1 Obtaining an IP Address ............................................. 57 3.2 Logging In ..................................................... 58 4 Settings 60 4.1 Edit root Account ................................................. 60 4.2 Change Password ................................................. 60 4.3 Preferences .................................................... 60 3 4.3.1 Web Interface Preferences ....................................... 60 4.3.2 Themes .................................................. 61 4.3.2.1 Theme Selector ......................................... 61 4.3.2.2 Create New Themes ....................................... 62 4.4 About ........................................................ 64 4.5 Legacy Web Interface ............................................... 64 5 Accounts 65 5.1 Groups ....................................................... 65 5.2 Users ........................................................ 68 6 System 73 6.1 General ....................................................... 73 6.2 NTP Servers .................................................... 76 6.3 Boot Environments ................................................ 77 6.3.1 Mirroring the Operating System Device ................................ 80 6.4 Advanced ...................................................... 82 6.4.1 Autotune ................................................. 84 6.4.2 Self-Encrypting Drives .......................................... 84 6.4.2.1 Deploying SEDs ......................................... 85 6.4.2.2 Check SED Functionality .................................... 86 6.5 Email ........................................................ 87 6.6 System Dataset .................................................. 89 6.7 Alert Services ................................................... 90 6.8 Alert Settings .................................................... 92 6.9 Cloud Credentials ................................................. 93 6.10 Tunables ...................................................... 97 6.11 Update ....................................................... 100 6.11.1 Preparing for Updates .......................................... 100 6.11.2 Updates and Trains ........................................... 100 6.11.3 Checking for Updates .......................................... 100 6.11.4 Saving the Configuration File ...................................... 102 6.11.5 Applying Updates ............................................. 102 6.11.6 Manual Updates ............................................. 103 6.12 CAs ......................................................... 103 6.13 Certificates ..................................................... 107 6.14 Support ....................................................... 111 7 Tasks 113 7.1 Cron Jobs ...................................................... 113 7.2 Init/Shutdown Scripts ............................................... 115 7.3 Rsync Tasks .................................................... 116 7.3.1 Rsync Module Mode ........................................... 118 7.3.2 Rsync over SSH Mode .......................................... 119 7.4 S.M.A.R.T. Tests .................................................. 122 7.5 Periodic Snapshot Tasks ............................................. 123 7.6 Replication Tasks ................................................. 125 7.6.1 Examples: Common Configuration ................................... 125 7.6.1.1 Alpha (Source) .......................................... 125 7.6.1.2 Beta (Destination) ........................................ 126 7.6.2 Example: FreeNAS® to FreeNAS® Semi-Automatic Setup ...................... 126 7.6.3 Example: FreeNAS® to FreeNAS® Dedicated User Replication ................... 129 7.6.4 Example: FreeNAS® to FreeNAS® or Other Systems, Manual Setup ................ 130 7.6.4.1 Encryption Keys ......................................... 131 7.6.5 Replication Options ........................................... 133 7.6.6 Replication Encryption .......................................... 135 7.6.7 Limiting Replication Times ........................................ 135 7.6.8 Troubleshooting Replication ...................................... 136 7.6.8.1 SSH ................................................ 136 7.6.8.2 Compression ........................................... 136 7.6.8.3 Manual Testing .......................................... 136 7.7 Resilver Priority .................................................. 137 7.8 Scrub Tasks .................................................... 138 7.9 Cloud Sync Tasks ................................................. 139 7.9.1 Cloud Sync Example ........................................... 142 8 Network 145 8.1 Global Configuration ............................................... 145 8.2 Interfaces ..................................................... 147 8.3 IPMI ......................................................... 149 8.4 Link Aggregations ................................................. 151 8.4.1 LACP, MPIO, NFS, and ESXi ....................................... 151 8.4.2 Creating a Link Aggregation ....................................... 152 8.4.3 Link Aggregation Options ........................................ 155 8.5 Network Summary ................................................ 156 8.6 Static Routes .................................................... 156 8.7 VLANs ........................................................ 157 9 Storage 159 9.1 Swap Space .................................................... 159 9.2 Pools ........................................................ 159 9.2.1 Creating Pools .............................................. 159 9.2.2 Managing Encrypted Pools ....................................... 162 9.2.3 Adding Cache or Log Devices ...................................... 166 9.2.4 Removing Cache or Log Devices .................................... 166 9.2.5 Adding Spare Devices .......................................... 166 9.2.6 Extending a Pool ............................................. 166 9.2.7 Export/Disconnect a Pool ........................................ 167 9.2.8 Importing a Pool ............................................. 168 9.2.9 Viewing Pool Scrub Status ........................................ 171 9.2.10 Adding Datasets ............................................. 172 9.2.10.1 Deduplication .......................................... 174 9.2.10.2 Compression ........................................... 175 9.2.11 Adding Zvols ............................................... 175 9.2.12 Setting Permissions ........................................... 176 9.3 Snapshots ..................................................... 178 9.3.1 Browsing a Snapshot Collection .................................... 180 9.4 VMware-Snapshots ...............................................
Recommended publications
  • Freenas® 11.0 User Guide
    FreeNAS® 11.0 User Guide June 2017 Edition FreeNAS® IS © 2011-2017 iXsystems FreeNAS® AND THE FreeNAS® LOGO ARE REGISTERED TRADEMARKS OF iXsystems FreeBSD® IS A REGISTERED TRADEMARK OF THE FreeBSD Foundation WRITTEN BY USERS OF THE FreeNAS® network-attached STORAGE OPERATING system. VERSION 11.0 CopYRIGHT © 2011-2017 iXsystems (https://www.ixsystems.com/) CONTENTS WELCOME....................................................1 TYPOGRAPHIC Conventions...........................................2 1 INTRODUCTION 3 1.1 NeW FeaturES IN 11.0..........................................3 1.2 HarDWARE Recommendations.....................................4 1.2.1 RAM...............................................5 1.2.2 The OperATING System DeVICE.................................5 1.2.3 StorAGE Disks AND ContrOLLERS.................................6 1.2.4 Network INTERFACES.......................................7 1.3 Getting Started WITH ZFS........................................8 2 INSTALLING AND UpgrADING 9 2.1 Getting FreeNAS® ............................................9 2.2 PrEPARING THE Media.......................................... 10 2.2.1 On FreeBSD OR Linux...................................... 10 2.2.2 On WindoWS.......................................... 11 2.2.3 On OS X............................................. 11 2.3 Performing THE INSTALLATION....................................... 12 2.4 INSTALLATION TROUBLESHOOTING...................................... 18 2.5 UpgrADING................................................ 19 2.5.1 Caveats:............................................
    [Show full text]
  • Iocage Documentation Release 1.2
    iocage Documentation Release 1.2 Brandon Schneider and Peter Toth Sep 26, 2019 Contents 1 Documentation: 3 1.1 Install iocage...............................................3 1.2 Basic Usage...............................................6 1.3 Plugins.................................................. 10 1.4 Networking................................................ 11 1.5 Jail Types................................................. 14 1.6 Best Practices............................................... 15 1.7 Advanced Usage............................................. 16 1.8 Using Templates............................................. 20 1.9 Create a Debian Squeeze Jail (GNU/kFreeBSD)............................ 21 1.10 Known Issues............................................... 22 1.11 FAQ.................................................... 23 1.12 Indices and tables............................................ 24 Index 25 i ii iocage Documentation, Release 1.2 iocage is a jail/container manager written in Python, combining some of the best features and technologies the FreeBSD operating system has to offer. It is geared for ease of use with a simplistic and easy to learn command syntax. FEATURES: • Templates, basejails, and normal jails • Easy to use • Rapid thin provisioning within seconds • Automatic package installation • Virtual networking stacks (vnet) • Shared IP based jails (non vnet) • Dedicated ZFS datasets inside jails • Transparent ZFS snapshot management • Binary updates • Export and import • And many more! Contents 1 iocage Documentation,
    [Show full text]
  • Freebsd's Jail(2) Facility
    Lousy virtualization, Happy users: FreeBSD's jail(2) facility Poul-Henning Kamp [email protected] CHROOT(2) FreeBSD System Calls Manual CHROOT(2) NAME chroot -- change root directory LIBRARY Standard C Library (libc, -lc) SYNOPSIS #include <unistd.h> int chroot(const char *dirname); Calling chroot(2) in ftpd(1) implemented ”anonymous FTP” without the hazzle of file/pathname parsing and editing. ”anonymous FTP” became used as a tool to enhance network security. By inference, chroot(2) became seen as a security enhancing feature. ...The source were not strong in those. Exercise 1: List at least four ways to escape chroot(2). Then the Internet happened, ...and web-servers, ...and web-hosting Virtual hosts in Apache User get their own ”virtual apache” but do do not get your own machine. Also shared: Databases mailprograms PHP/Perl etc. Upgrading tools (PHP, mySQL etc) on virtual hosting machines is a nightmare. A really bad nightmare: Cust#1 needs mySQL version > N Cust#2 cannot use mySQL version <M (unless PHP version > K) Cust#3 does not answer telephone Cust#4 has new sysadmin Cust#5 is just about ready with new version Wanted: Lightweight virtualization Same kernel, but virtual filesystem and network address plus root limitations. Just like chroot(2) with IP numbers on top. Will pay cash. Close holes in chroot(2) Introduce ”jail” syscall + kernel struct Block jailed root in most suser(9) calls. Check ”if jail, same jail ?” in strategic places. Fiddle socket syscall arguments: INADDR_ANY -> jail.ip INADDR_LOOPBACK -> jail.ip Not part of jail(2): Resource restriction Hardware virtualization Covert channel prevention (the hard stuff) Total implementation: 350 changed source lines 400 new lines of code FreeBSD without jail usr Resources of various sorts / home var process process process process process process Kernel FreeBSD with jail usr Resources of various sorts / home var process process process process* process process Kernel error = priv_check_cred( cred, PRIV_VFS_LINK, SUSER_ALLOWJAIL); if (error) return (error); The unjailed part One jailed part of the system.
    [Show full text]
  • Sandboxing 2 Change Root: Chroot()
    Sandboxing 2 Change Root: chroot() Oldest Unix isolation mechanism Make a process believe that some subtree is the entire file system File outside of this subtree simply don’t exist Sounds good, but. Sandboxing 2 2 / 47 Chroot Sandboxing 2 3 / 47 Limitations of Chroot Only root can invoke it. (Why?) Setting up minimum necessary environment can be painful The program to execute generally needs to live within the subtree, where it’s exposed Still vulnerable to root compromise Doesn’t protect network identity Sandboxing 2 4 / 47 Root versus Chroot Suppose an ordinary user could use chroot() Create a link to the sudo command Create /etc and /etc/passwd with a known root password Create links to any files you want to read or write Besides, root can escape from chroot() Sandboxing 2 5 / 47 Escaping Chroot What is the current directory? If it’s not under the chroot() tree, try chdir("../../..") Better escape: create device files On Unix, all (non-network) devices have filenames Even physical memory has a filename Create a physical memory device, open it, and change the kernel data structures to remove the restriction Create a disk device, and mount a file system on it. Then chroot() to the real root (On Unix systems, disks other than the root file system are “mounted” as a subtree somewhere) Sandboxing 2 6 / 47 Trying Chroot # mkdir /usr/sandbox /usr/sandbox/bin # cp /bin/sh /usr/sandbox/bin/sh # chroot /usr/sandbox /bin/sh chroot: /bin/sh: Exec format error # mkdir /usr/sandbox/libexec # cp /libexec/ld.elf_so /usr/sandbox/libexec # chroot /usr/sandbox
    [Show full text]
  • Trinity Iot Product Catalogue
    IoT Devices TRINITY IOT PRODUCT CATALOGUE Teltonika Device Range 2021 TABLE OF CONTENTS 1 RUT950 27 TRB142 3 RUT955 29 TRB145 5 RUTX09 31 RUTX10 7 RUTX11 33 RUTX12 9 TRB141 35 RUTX08 11 RUT230 37 TRB255 13 RUT240 39 FMB920 15 RUT850 41 RUTXR1 17 RUT900 43 FM130 19 GH5200 45 BLUE SLIM ID 21 TRB245 47 BLUE COIN MAG 23 TSW100 49 BLUE COIN T 25 TRB140 PRODUCT SHEET / RUT950 ROUTER INTRODUCING RUT950 TRINITY APPROVED & SMART™ COMPATIBLE RUT950 is a highly reliable and secure LTE router for professional applications. Router delivers high performance, mission-critical cellular communication. RUT950 is equipped with connectivity redundancy through dual SIM failover. External antenna connectors make it possible to attach desired antennas and to easily find the best signal location. LTE LTE Cat4 Cat4 LTE Cat 4 with Dual SIM – significantly speeds up to 150 Mps reduce roaming costs WANLTE 4 LTEX failoverCat4 Cat4 Automatic switch to available 4x Ethernet ports backup connection with VLAN functionality LTE LTE Cat4 Cat4 Wireless Access Point Linux Powered with Hotspot functionality Simply order, and we’ll take care of the rest Source Import Test ICASA Management Onboarding 24/7 Platform Support www.trinity.co.za 1 PRODUCT SHEET / RUT950 ROUTER LAN Ethernet Ports WAN Ethernet Ports LTE antenna connectors Power socket WiFi antenna SIM card connectors slots Hardware Weight 256 g CPU Atheros Wasp, MIPS 74Kc, 550 MHz Memory 16 MBytes Flash, 128 MBytes DDR2 RAM Ethernet 4 x 10/100 Ethernet ports: 1 x WAN (configurable as LAN), 3 x LAN ports Power supply 9
    [Show full text]
  • Zero Vpn Download Pc Apple App Store Zero VPN Review
    zero vpn download pc Apple App Store Zero VPN Review. By forming a private network through a public internet connection, a Virtual Private Network (VPN) provides you online privacy to surf the internet. This is done by masking your IP address. There are many VPN services now available in the market for a price subscription as well as for free. Zero VPN is a completely free online security provider available only for Android devices. The app was developed by TNTAPP in the Netherlands. It gives you the freedom to visit the websites and social media networks that are restricted and blocked in your region. However, Zero VPN holds a lot of poor reviews compared to the rest in the market. The VPN is rated with 4.1 stars. Anyways, let us find out the truth behind this by experiencing it on our own. Keep reading. Warning: Zero VPN seems to either be a botnet or is running malicious code on users’ devices. You should not install Zero VPN on your device. You should instead choose a legitimate and proven VPN like ExpressVPN. Pros: No registration needed No visible DNS leaks. Cons: Privacy is at stake No customer support Many gray areas to doubt on No updates over a year No special features that stand out for the VIP version. Installation of Zero VPN. Zero VPN is compatible with Android, Windows, and Mac. It is disappointing that there is no IOS version available. Besides, you cannot install Zero VPN on Amazon Fire TV, or to a router. When installing in your phone, it is the usual routine that you follow to download in Android.
    [Show full text]
  • April 2006 Volume 31 Number 2
    APRIL 2006 VOLUME 31 NUMBER 2 THE USENIX MAGAZINE OPINION Musings RIK FARROW OpenSolaris:The Model TOM HAYNES PROGRAMMING Code Testing and Its Role in Teaching BRIAN KERNIGHAN Modular System Programming in MINIX 3 JORRIT N. HERDER, HERBERT BOS, BEN GRAS, PHILIP HOMBURG, AND ANDREW S. TANENBAUM Some Types of Memory Are More Equal Than Others DIOMEDIS SPINELLIS Simple Software Flow Analysis Using GNU Cflow CHAOS GOLUBITSKY Why You Should Use Ruby LU KE KANIES SYSADMIN Unwanted HTTP:Who Has the Time? DAVI D MALONE Auditing Superuser Usage RANDOLPH LANGLEY C OLUMNS Practical Perl Tools:Programming, Ho Hum DAVID BLANK-EDELMAN VoIP Watch HEISON CHAK /dev/random ROBERT G. FERRELL STANDARDS USENIX Standards Activities NICHOLAS M. STOUGHTON B O OK REVIEWS Book Reviews ELIZABETH ZWICKY, WITH SAM STOVER AND RI K FARROW USENIX NOTES Letter to the Editor TED DOLOTTA Fund to Establish the John Lions Chair C ONFERENCES LISA ’05:The 19th Large Installation System Administration Conference WORLDS ’05: Second Workshop on Real, Large Distributed Systems FAST ’05: 4th USENIX Conference on File and Storage Technologies The Advanced Computing Systems Association Upcoming Events 3RD SYMPOSIUM ON NETWORKED SYSTEMS 2ND STEPS TO REDUCING UNWANTED TRAFFIC ON DESIGN AND IMPLEMENTATION (NSDI ’06) THE INTERNET WORKSHOP (SRUTI ’06) Sponsored by USENIX, in cooperation with ACM SIGCOMM JULY 6–7, 2006, SAN JOSE, CA, USA and ACM SIGOPS http://www.usenix.org/sruti06 MAY 8–10, 2006, SAN JOSE, CA, USA Paper submissions due: April 20, 2006 http://www.usenix.org/nsdi06 2006
    [Show full text]
  • TELTONIKA RUTX10 Industrial VPN Wifi Router Datasheet
    RUTX10 Copyright © 2021, TELTONIKA NETWORKS. Specifications and information given in this document are subject to change by TELTONIKA NETWORKS without prior notice. DATASHEET // RUTX10 HARDWARE FRONT VIEW Power Reset LAN Ethernet WAN LEDs socket button ports Power WiFi band LAN LEDs WAN Ethernet LED LEDs port BACK VIEW WiFi antenna WiFi antenna Bluetooth antenna connector connector connector Grounding USB port screw POWER SOCKET PINOUT Power / Red wire Ground / Black wire Input / Green wire Output / White wire Copyright © 2021, TELTONIKA NETWORKS. Specifications and information given in this document are subject to change by TELTONIKA NETWORKS without prior notice. 2 DATASHEET // RUTX10 FEATURES ETHERNET 1 x WAN port (can be configured as LAN) 10/100/1000 Mbps, compliance with IEEE 802.3, IEEE 802.3u, 802.3az standards, WAN supports auto MDI/MDIX crossover 3 x LAN ports, 10/100/1000 Mbps, compliance with IEEE 802.3, IEEE 802.3u, 802.3az standards, supports auto MDI/MDIX LAN crossover WIRELESS 802.11b/g/n/ac Wave 2 (WiFi 5) with data transmission rates up to 867 Mbps (Dual Band, MU-MIMO), 802.11r fast transition, Wireless mode Access Point (AP), Station (STA) WiFi security WPA3-EAP, WPA3-SAE, WPA2-Enterprise-PEAP, WPA2-PSK, WEP; AES-CCMP, TKIP, Auto Cipher modes, client separation ESSID ESSID stealth mode WiFi users up to 150 simultaneous connections Wireless Hotspot Captive portal (Hotspot), internal/external Radius server, built in customizable landing page BLUETOOTH Bluetooth 4.0 Bluetooth low energy (LE) for short range communication
    [Show full text]
  • AMD EPYC™ Performance. Rack Mountable Appliance, the Full Package at an Affordable Price
    OPNsense® Rack Security Appliance DEC3800 Series (c) 2021 Deciso B.V., All Rights Reserved. [rev.300821] (c) 2021 Deciso B.V., AMD EPYC™ Performance. Rack mountable appliance, the full package at an affordable price. Exceptional performance for businesses & enterprises. Guard Web Access 17Gbps Throughput Filtering (SSL) Proxy 1.5 Mega Packets per Second Captive Portal with Voucher support 512GB SSD ~2Gbps Inline Intrusion Prevention Offering Sufficient Space for Logging & Reporting Fast Filtering System wide two-factor Up to 50.000 Connections per authentication. Second Compatible with Google Authenticator. Hardware Assisted Encryption 2.5Gbps IPsec (AES256GCM16) Securing Networks™ DATASHEET Deciso Sales B.V. • +31 187 744 020 • [email protected] • www.deciso.com CERTIFIED HARDWARE FROM THE DEVELOPERS - MADE IN THE NETHERLANDS DEC3800 SERIES Bundled with a free year OPNsense® Business Edition √ Commercial firmware repository √ Free GeoIP database √ Official OPNsense Open Virtualization Image √ Free professional plugins (OPNcentral, Proxy Access) √ Free E-Book ( English & German ) Securing Networks™ Deciso Sales B.V. • +31 187 744 020 • [email protected] • www.deciso.com SOFTWARE VERSATILE - OPEN SOURCE - FULLY FEATURED OPNsense is Deciso’s fast growing open source firewall and security platform released under an Open Source Initiative approved license. Its rich feature set is combined with the benefits of open and verifiable sources. All features can be used from within the easy to use graphical interface, equipped with a build-in search feature for quick navigation. Protecting your network has never been this easy with features such as; the integrated intrusion prevention system and two-factor authentication for safely connecting mobile users. OPNsense® Secure Your Network With Ease™ Businesses Protect your business network and secure your connections.
    [Show full text]
  • Netnotes.Pdf
    Downloaded from https://www.cambridge.org/core NetNotes Bob Price University of South Carolina School of Medicine [email protected] . IP address: Selected postings are from recent discussion threads included in NA, for example, a 40× NA 1.4 objective compared to 63× NA 1.4? 170.106.202.8 the Microscopy (http://www.microscopy.com), Confocal Microscopy Confocal.nl stated this is in a recent webinar and on their website: “A (https://lists.umn.edu/cgi-bin/wa?A0=​confocalmicroscopy), and 3DEM lower magnification allows for a larger field of view and brighter images, (https://mail.ncmir.ucsd.edu/mailman/listinfo/3dem) listservers. since light intensity is inversely proportional to the magnification squared.” , on Postings may have been edited to conserve space or for clarity. Complete (https://www.confocal.nl/#rcm2). I would think that this is caused by less 27 Sep 2021 at 13:46:36 listings and subscription information can be found at the above websites. light going through the smaller back focal aperture when the illumination is held constant? Most of the light is clipped as explained in figure 1 of https://www.nature.com/articles/s41596-020-0313-9. So, the microscope Zemax Simulations and Microscope Objectives manufacturer could adjust the illumination beam path and laser powers Confocal Listserver to best suit the objective? Or are lower magnification objectives really To enable Zemax simulations for a customized two-photon microscope brighter? The field of view will obviously be larger for the 40× objective, but , subject to the Cambridge Core terms of use, available at (university research application), I am looking for the prescription for the I am more interested in understanding the claimed benefit in brightness.
    [Show full text]
  • Manual De Usuario Router Altronics-201 N
    Manual de Usuario Router Altronics-201 N Rev0 – 02/2019 1 Indice 1.- Descripción General ......................................................................................................................3 2.- Instalación .....................................................................................................................................4 3.- Configuración ................................................................................................................................4 3.1.- Ingresar a la Interfaz de Configuración vía WEB .....................................................................4 3.2.- Cambiar la Contraseña por defecto........................................................................................7 4.- Acceso vía SSH...............................................................................................................................9 5.- Respaldo de la Configuración ......................................................................................................10 6.- Restablecer la configuración de fábrica ......................................................................................10 7.- Configuración SDN Zerotier .........................................................................................................11 8.- Ejemplo de Aplicación con Zerotier .............................................................................................12 9.- Configuración de VPN OpenVPN .................................................................................................18
    [Show full text]
  • List of TCP and UDP Port Numbers from Wikipedia, the Free Encyclopedia
    List of TCP and UDP port numbers From Wikipedia, the free encyclopedia This is a list of Internet socket port numbers used by protocols of the transport layer of the Internet Protocol Suite for the establishment of host-to-host connectivity. Originally, port numbers were used by the Network Control Program (NCP) in the ARPANET for which two ports were required for half- duplex transmission. Later, the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) needed only one port for full- duplex, bidirectional traffic. The even-numbered ports were not used, and this resulted in some even numbers in the well-known port number /etc/services, a service name range being unassigned. The Stream Control Transmission Protocol database file on Unix-like operating (SCTP) and the Datagram Congestion Control Protocol (DCCP) also systems.[1][2][3][4] use port numbers. They usually use port numbers that match the services of the corresponding TCP or UDP implementation, if they exist. The Internet Assigned Numbers Authority (IANA) is responsible for maintaining the official assignments of port numbers for specific uses.[5] However, many unofficial uses of both well-known and registered port numbers occur in practice. Contents 1 Table legend 2 Well-known ports 3 Registered ports 4 Dynamic, private or ephemeral ports 5 See also 6 References 7 External links Table legend Official: Port is registered with IANA for the application.[5] Unofficial: Port is not registered with IANA for the application. Multiple use: Multiple applications are known to use this port. Well-known ports The port numbers in the range from 0 to 1023 are the well-known ports or system ports.[6] They are used by system processes that provide widely used types of network services.
    [Show full text]