Opengear User Manual 4.4.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Load more

User Manual

ACM5000 Remote Site Managers ACM5500 Management Gateways
ACM7000 Resilience Gateways
IM7200 & IM4200 Infrastructure Managers
CM7100 Console Servers

  • Revision 4.32
  • 2019-4-10

Table of Contents

Safety

Please take care to follow the safety precautions below when installing and operating the console server:

-

Do not remove the metal covers. There are no operator serviceable components inside. Opening or removing the cover may expose you to dangerous voltage which may cause fire or electric shock. Refer all service to Opengear qualified personnel.

--

To avoid electric shock the power cord protective grounding conductor must be connected through to ground.

Always pull on the plug, not the cable, when disconnecting the power cord from the socket.
Do not connect or disconnect the console server during an electrical storm. Also it is recommended you use a surge suppressor or UPS to protect the equipment from transients.

FCC Warning Statement

This device complies with Part 15 of the FCC rules. Operation of this device is subject to the following

conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference that may cause undesired operation.

Proper back-up systems and necessary safety devices should be utilized to protect against injury, death or property damage due to system failure. Such protection is the responsibility of the user.

This console server device is not approved for use as a life-support or medical system. Any changes or modifications made to this console server device without the explicit approval or consent of Opengear will void Opengear of any liability or responsibility of injury or loss caused by any malfunction.

This equipment is for indoor use and all the communication wirings are limited to inside of the building.

2

Data Center and Remote Site Management - User Manual

User Manual

Copyright

© Opengear Inc. 2019. All Rights Reserved. Information in this document is subject to change without notice and does not represent a commitment on the part of Opengear. Opengear provides this document “as is,” without warranty of any kind, expressed or implied, including, but not limited to, the implied warranties of fitness or merchantability for a particular purpose.

Opengear may make improvements and/or changes in this manual or in the product(s) and/or the program(s) described in this manual at any time. This product could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes may be incorporated in new editions of the publication.

Table of Contents

TABLE OF CONTENTS

THIS MANUAL INSTALLATION
12 15 15

16 17 17 18

2.1

2.1.1

Models

ACM5000 kit components
2.1.2 2.1.3 2.1.4 2.1.5 2.1.6 2.1.7
ACM5500 kit components ACM7004-2, ACM7004-5, ACM7008-2 kit components ACM7005-4 Remote Site Gateway kit components IM4208-2, IM4216-2, IM4232-2, IM4248-2 and IM4216-34 kit components IM7208-2, IM7216-2, IM7216-2-24U-DAC, IM7232-2 and IM7248-2 kit components CM7116-2, CM7132-2 and CM7148-2 kit components

Power Connection

18 19 19

20

20 20 21 21

22 23

25 25 26

26 27

28 28 29 29 30 31 31

32 32 32

32 33

35

35 36 36

37

38 39

40

44

45

45 45 46

46

46 48 50 51 52 56

58
2.2

2.2.1 2.2.2 2.2.3 2.2.4
All IM7200, IM4200 and CM7100 -DAC models All ACM5000 and ACM7000 models All ACM5500 models IM7200-DDC and IM4200-DDC power

Network Connection Serial Port Connection
2.3 2.4

  • 2.4.1
  • Opengear Classic RJ45 pinout (option –X0)

Cisco Rolled (Cyclades) RJ45 pinout (option -X1) Cisco RJ45 pinout (option -X2)
2.4.2 2.4.3

2.5 2.6

2.6.1

USB Port Connection Fitting Cellular SIM and Antennas

ACM5004 -G and -L models
2.6.2 2.6.3 2.6.4 2.6.5 2.6.6 2.6.7
ACM5500 -G models ACM5500 -L models ACM7000 -L models IM4200 -G models All IM7200 models IM7200 -L models

  • 2.7
  • Digital I/O and Environmental Sensors

SYSTEM CONFIGURATION 3.1

3.1.1 3.1.2

3.2
Management Console Connection

Connected computer set up Browser connection

Administrator Set up

Change default root System Password Set up a new Administrator Name the System
3.2.1 3.2.2 3.2.3

  • 3.3
  • Network Configuration

  • IPv6 configuration
  • 3.3.1

  • 3.3.2
  • Dynamic DNS (DDNS) configuration

Services and Service Access

Brute Force Protection

Communications Software

SDT Connector

3.4

3.4.1

3.5

3.5.1 3.5.2 3.5.3
PuTTY SSHTerm

  • 3.6
  • Management Network Configuration

Enable the Management LAN Configure the DHCP server
3.6.1 3.6.2 3.6.3 Select Failover or broadband OOB 3.6.4 3.6.5 3.6.6
Aggregating the network ports Wi-Fi Wireless LAN Static routes

SERIAL PORT, HOST, DEVICE & USER CONFIGURATION

4

Data Center and Remote Site Management - User Manual

User Manual

  • 4.1
  • Configure Serial Ports
  • 58

59 60 66 66 67 67 68 68
4.1.1 4.1.2 4.1.3 4.1.4 4.1.5 4.1.6 4.1.7 4.1.8 4.1.9
Common Settings Console Server Mode SDT Mode Device (RPC, UPS, EMD) Mode Terminal Server Mode Serial Bridging Mode Syslog NMEA Streaming

  • Cisco USB console connection
  • 70

  • 4.1.10 USB   Consoles
  • 71

  • 4.2
  • Add and Edit Users
  • 71

4.2.1 4.2.2

  • Set up new Group
  • 73

  • Set up new Users
  • 74

  • 4.3
  • Authentication
  • 76

4.4 4.5 4.6

  • Network Hosts
  • 76

  • Trusted Networks
  • 77

Serial Port Cascading

Automatically generate and upload SSH keys Manually generate and upload SSH keys Configure the slaves and their serial ports Managing the slaves

78

  • 4.6.1
  • 79

4.6.2 4.6.3 4.6.4
80 81 83

  • 4.7
  • Serial Port Redirection (PortShare)

Managed Devices
83
4.8 4.9
84

  • IPsec VPN
  • 87

  • 87
  • 4.9.1
  • Enable the VPN gateway

  • 4.10 OpenVPN
  • 90

  • 90
  • 4.10.1 Enable   the OpenVPN

4.10.2 Configure   as Server or Client 4.10.3 Windows   OpenVPN Client and Server set up

4.11 PPTP VPN

91 94

99

  • 99
  • 4.11.1 Enable   the PPTP VPN server

  • 4.11.2 Add   a PPTP user
  • 101

101

103

103 104 106

106

107 107 107 108 108 108

109 111 111 112 112

112 115 115 115 116

116

116
4.11.3 Set   up a remote PPTP client

4.12 Call Home

4.12.1 Set   up Call Home candidate 4.12.2 Accept   Call Home candidate as Managed Console Server on CMS 4.12.3 Calling   Home to a generic central SSH server

4.13 IP Passthrough

4.13.1 Downstream   Router Setup 4.13.2 IP   Passthrough Pre-Configuration 4.13.3 IP   Passthrough Configuration 4.13.4 Service   Intercepts 4.13.5 IP   Passthrough Status 4.13.6 Caveats

4.14 Configuration over DHCP (ZTP) 4.15 Enrollment into Lighthouse 5 FIREWALL, FAILOVER & OOB ACCESS 5.1 5.2
Dialup Modem Connection OOB Dial-In Access

  • 5.2.1
  • Configure Dial-In PPP

Using SDT Connector client Set up Windows XP or later client Set up earlier Windows clients Set up Linux clients
5.2.2 5.2.3 5.2.4 5.2.5

5.3

5.3.1

Dial-Out Access

Always-on dial-out

Table of Contents

  • 5.3.2
  • Failover dial-out
  • 117

119 120 122

122 124 126 127 128 128 129 130

132

132 133 135 135

136

138 139 141 143

145 146 147

147 148 149 150 151 152 154 155

156 157 158 160 160 161

161 162

165

165 166

5.4 5.5 5.6
OOB Broadband Ethernet Access Broadband Ethernet Failover Cellular Modem Connection

Connecting to a GSM HSUPA/UMTS carrier network Connecting to a CDMA EV-DO carrier network Connecting to a 4G LTE carrier network Verifying the cellular connection Cellular modem watchdog
5.6.1 5.6.2 5.6.3 5.6.4 5.6.5 5.6.6 5.6.7 5.6.8
Dual SIM failover Automatic SIM Slot Detection Multi-carrier cellular support

  • Cellular Operation
  • 5.7

5.7.1 5.7.2 5.7.3 5.7.4
OOB access set up Cellular failover setup Cellular routing Cellular CSD dial-in setup

  • 5.8
  • Firewall & Forwarding

5.8.1 5.8.2 5.8.3 5.8.4
Configuring network forwarding and IP masquerading Configuring client devices Port / Protocol forwarding Firewall rules

SSH TUNNELS & SDT CONNECTOR 6.1 6.2
Configuring for SSH Tunneling to Hosts SDT Connector Client Configuration

  • 6.2.1
  • SDT Connector client installation

6.2.2 6.2.3 6.2.4 6.2.5 6.2.6 6.2.7 6.2.8
Configuring a new gateway in the SDT Connector client Auto-configure SDT Connector client with the user’s access privileges Make an SDT connection through the gateway to a host Manually adding hosts to the SDT Connector gateway Manually adding new services to the new hosts Adding a client program to be started for the new service Dial in configuration

  • 6.3
  • SDT Connector to Management Console

6.4 6.5 6.6 6.7 6.8
SDT Connector: telnet or SSH connect to serially attached devices Using SDT Connector for out-of-band connection to the gateway Importing (and exporting) preferences SDT Connector Public Key Authentication Setting up SDT for Remote Desktop access

Enable Remote Desktop on the target Windows computer to be accessed Configure the Remote Desktop Connection client

SDT SSH Tunnel for VNC

6.8.1 6.8.2

6.9

6.9.1 6.9.2
Install and configure the VNC Server on the computer to be accessed Install, configure and connect the VNC Viewer

6.10 Using SDT to IP connect to hosts that are serially attached to the gateway

6.10.1 Establish   a PPP connection between the host COM port and console server 6.10.2 Set   up SDT Serial Ports on console server 6.10.3 Set   up SDT Connector to ssh port forward over the console server Serial Port

6.11 SSH Tunneling using other SSH clients (e.g. PuTTY) ALERTS, AUTO-RESPONSE AND LOGGING
168

168 171 172

172 176 176 178

178 179 179 180 180 181

7.1 7.2
Configure Auto-Response Check Conditions

  • 7.2.1
  • Environmental

7.2.2 7.2.3 7.2.4 7.2.5 7.2.6
Alarms and Digital Inputs UPS/Power Supply UPS Status Serial Login, Signal or Pattern USB Console Status

6

Data Center and Remote Site Management - User Manual

User Manual

7.2.7 7.2.8 7.2.9
ICMP Ping Link Layer Discovery Protocol (LLDP) Cellular Data
181 182 183 183 184 185 185 186 187

188

188 189 189 190 190 190 190

191 191

191 192 194 197

197

197 198 198 199 199

201 201

201 205 205 206

208

208 211 213 213 213 215

217

217 218 221 222 222

224

224 225 225 226

227 227

228 228
7.2.10 Custom   Check 7.2.11 SMS   Command 7.2.12 CLI   Log In/Out Check 7.2.12 Web   UI Log In/Out Check 7.2.13 Network   Interface Event 7.2.14 Routed   Data Usage Check

  • 7.3
  • Trigger Actions

7.3.1 7.3.2 7.3.3 7.3.4 7.3.5 7.3.6 7.3.7
Send Email Send SMS Perform RPC Action Run Custom Script Send SNMP Trap Send Nagios Event Perform Interface Action

Resolve Actions Configure SMTP, SMS, SNMP and/or Nagios service for alert notifications

Send Email alerts

7.4 7.5

7.5.1 7.5.2 7.5.3 7.5.4
Send SMS alerts Send SNMP Trap alerts Send Nagios Event alerts

  • Logging
  • 7.6

7.6.1 7.6.2 7.6.3 7.6.4 7.6.5
Log storage Serial port logging Network TCP and UDP port logging Auto-Response event logging Power device logging

POWER, ENVIRONMENT & DIGITAL I/O 8.1

8.1.1

Remote Power Control (RPC)

RPC connection
8.1.2 8.1.3 8.1.4
RPC access privileges and alerts User power management RPC status

  • 8.2
  • Uninterruptible Power Supply Control (UPS)

Managed UPS connections Remote UPS management Controlling UPS powered computers UPS alerts
8.2.1 8.2.2 8.2.3 8.2.4 8.2.5 8.2.6
UPS status Overview of Network UPS Tools (NUT)

Environmental Monitoring

Connecting the EMD and its sensors Connecting sensors to ACM5000s, ACM5500s, and ACM7000s Adding EMDs and configuring the sensors Environmental alerts

8.3

8.3.1 8.3.2 8.3.3 8.3.4

  • 8.3.5
  • Environmental status

  • Digital I/O Ports
  • 8.4

8.4.1 8.4.2 8.4.3 8.4.4
Digital I/O Output Configuration Digital I/O Input Configuration High Voltage Outputs DIO SNMP status

AUTHENTICATION 9.1

9.1.1 9.1.2

Authentication Configuration

Local authentication TACACS authentication

Table of Contents

9.1.3 9.1.4 9.1.5 9.1.6 9.1.7 9.1.8 9.1.9
RADIUS authentication LDAP authentication
229 230 233 234 235 236 238 239 239 239

240 241 245 245 246

246 247 248 248 249 250

251

251 254 254 255 256

259 259 260 261 262 264 266 268 268 269 270 271 271

272 274

275 275 276 276

276 278

279 280 280

282 285 286 287 288 289 290
RADIUS/TACACS user configuration Group support with remote authentication Remote groups with RADIUS authentication Remote groups with LDAP authentication Remote groups with TACACS+ authentication
9.1.10 Idle   timeout 9.1.11 Kerberos   authentication 9.1.12 Authentication   testing

9.2 9.3
PAM (Pluggable Authentication Modules) SSL Certificate
NAGIOS INTEGRATION 10.1 Nagios Overview 10.2 Configuring Nagios distributed monitoring

10.2.1 Enable   Nagios on the console server 10.2.2 Enable   NRPE monitoring 10.2.3 Enable   NSCA monitoring 10.2.4 Configure   selected Serial Ports for Nagios monitoring 10.2.5 Configure   selected Network Hosts for Nagios monitoring 10.2.6 Configure   the upstream Nagios monitoring host

10.3 Advanced Distributed Monitoring Configuration

10.3.1 Sample   Nagios configuration 10.3.2 Basic   Nagios plug-ins 10.3.3 Additional   plug-ins 10.3.4 Number   of supported devices 10.3.5 Distributed   Monitoring Usage Scenarios

SYSTEM MANAGEMENT 11.1 System Administration and Reset 11.2 Upgrade Firmware 11.3 Configure Date and Time 11.4 Configuration Backup 11.5 Delayed Configuration Commit 11.6 FIPS Mode STATUS REPORTS 12.1 Port Access and Active Users 12.2 Statistics 12.3 Support Reports 12.4 Syslog 12.5 Dashboard

12.5.1 Configuring   the Dashboard 12.5.2 Creating   custom widgets for the Dashboard

MANAGEMENT 13.1 Device Management 13.2 Port and Host Logs 13.3 Terminal Connection

13.3.1 Web   Terminal 13.3.2 SDT   Connector access

13.4 Power Management CONFIGURATION FROM THE COMMAND LINE 14.1 Accessing config from the command line

14.1.1 Serial   Port configuration 14.1.2 Adding   and removing Users 14.1.3 Adding   and removing user Groups 14.1.4 Authentication 14.1.5 Network   Hosts 14.1.6 Trusted   Networks 14.1.7 Cascaded   Ports

Recommended publications
  • Prebrane Zo Stranky

    Prebrane Zo Stranky

    Manuál pre začiatočníkov a používateľov Microsoft Windows Galadriel 1.7.4 Manuál je primárne tvorený pre Ubuntu 7.04 Feisty Fawn. Dá sa však použiť aj pre Kubuntu, Xubuntu, Edubuntu, Ubuntu Studio a neoficiálne distribúcie založené na Ubuntu. Pokryté verzie: 7.10, 7.04, 6.10, 6.06 a 5.10 (čiastočne) Vypracoval Stanislav Hoferek (ICQ# 258126362) s komunitou ľudí na stránkach: linuxos.sk kubuntu.sk ubuntu.wz.cz debian.nfo.sk root.cz 1 Začíname! 5 Pracovné prostredie 9 Live CD 1.1 Postup pre začiatočníkov 5.1 Programové vybavenie 9.1 Vysvetlenie 1.2 Zoznámenie s manuálom 5.1.1 Prvé kroky v Ubuntu 9.2 Prístup k internetu 1.3 Zoznámenie s Ubuntu 5.1.2 Základné programy 9.3 Pripojenie pevných diskov 1.3.1 Ubuntu, teší ma! 5.1.3 Prídavné programy 9.4 Výhody a nevýhody Live CD 1.3.2 Čo tu nájdem? 5.2 Nastavenie jazyka 9.5 Live CD v prostredí Windows 1.3.3 Root 5.3 Multimédia 9.6 Ad-Aware pod Live CD 1.4. Užitočné informácie 5.3.1 Audio a Video Strana 48 1.4.1 Odkazy 5.3.2 Úprava fotografii 1.4.2 Slovníček 5.4 Kancelária 10 FAQ 1.4.3 Ako Linux funguje? 5.4.1 OpenOffice.org 10 FAQ 1.4.4 Spúšťanie programov 5.4.2 PDF z obrázku Strana 50 1.5 Licencia 5.4.3 Ostatné Strana 2 5.5 Hry 11 Tipy a triky 5.6 Estetika 11.1 Všeobecné rady 2 Linux a Windows 5.7 Zavádzanie systému 11.2 Pokročilé prispôsobenie systému 2.1 Porovnanie OS 5.7.1 Zavádzač 11.3 Spustenie pri štarte 2.2 Náhrada Windows Programov 5.7.2 Prihlasovacie okno 11.4 ALT+F2 2.3 Formáty 5.7.3 Automatické prihlásenie 11.5 Windows XP plocha 2.4 Rozdiely v ovládaní 5.8 Napaľovanie v Linuxe Strana 55 2.5 Spustenie programov pre Windows 5.9 Klávesové skratky 2.6 Disky 5.10 Gconf-editor 12 Konfigurácia 2.7 Klávesnica Strana 27 12.1 Nástroje na úpravu konfigurákov Strana 12 12.2 Najdôležitejšie konf.
  • Brewer Mkiv Spectrophotometer

    Brewer Mkiv Spectrophotometer

    BREWER MKII Spectrophotometer Operator's Manual BREWER MKIV SPECTROPHOTOMETER OPERATOR'S MANUAL OM-BA-C231 REV B, August 15, 1999 SCI-TEC Instruments Inc. 1503 Fletcher Road Saskatoon, Sask. , Canada S7M 5S5 Phone 306-934-0101 Fax 306-978-2339 Email: [email protected] Web site: www.sci-tec.com BREWER MKII Spectrophotometer Operator's Manual This Page is Intentionally left Blank TABLE OF CONTENTS 1 SYSTEM OVERVIEW..................................................................................................................................1 2 SYSTEM DESCRIPTION .............................................................................................................................3 2.1 SPECTROPHOTOMETER ......................................................................................................................4 2.2 SOLAR TRACKING..............................................................................................................................16 2.3 COMPUTER EQUIPMENT ...................................................................................................................17 3 BREWER SYSTEM SETUP........................................................................................................................19 3.1 SPECTROPHOTOMETER UNPACKING AND SETUP........................................................................21 3.2 TRIPOD UNPACKING AND SETUP ....................................................................................................21 3.3 AZIMUTH TRACKER UNPACKING AND SETUP..............................................................................21
  • Using and Administering Linux: Volume 2 Zero to Sysadmin: Advanced Topics

    Using and Administering Linux: Volume 2 Zero to Sysadmin: Advanced Topics

    Using and Administering Linux: Volume 2 Zero to SysAdmin: Advanced Topics David Both Using and Administering Linux: Volume 2 David Both Raleigh, NC, USA ISBN-13 (pbk): 978-1-4842-5454-7 ISBN-13 (electronic): 978-1-4842-5455-4 https://doi.org/10.1007/978-1-4842-5455-4 Copyright © 2020 by David Both This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Trademarked names, logos, and images may appear in this book. Rather than use a trademark symbol with every occurrence of a trademarked name, logo, or image we use the names, logos, and images only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made.
  • Deploying Avaya Diagnostic Server R3.2

    Deploying Avaya Diagnostic Server R3.2

    Deploying Avaya Diagnostic Server Release 3.2 Issue 2 April 2021 © 2013-2021, Avaya Inc. documentation does not expressly identify a license type, the All Rights Reserved. applicable license will be a Designated System License as set forth below in the Designated System(s) License (DS) section as Notice applicable. The applicable number of licenses and units of capacity While reasonable efforts have been made to ensure that the for which the license is granted will be one (1), unless a different information in this document is complete and accurate at the time of number of licenses or units of capacity is specified in the printing, Avaya assumes no liability for any errors. Avaya reserves documentation or other materials available to You. “Software” means the right to make changes and corrections to the information in this computer programs in object code, provided by Avaya or an Avaya document without the obligation to notify any person or organization Channel Partner, whether as stand-alone products, pre-installed on of such changes. hardware products, and any upgrades, updates, patches, bug fixes, or modified versions thereto. “Designated Processor” means a single Documentation disclaimer stand-alone computing device. “Server” means a set of Designated “Documentation” means information published in varying mediums Processors that hosts (physically or virtually) a software application which may include product information, operating instructions and to be accessed by multiple users. “Instance” means a single copy of performance specifications that are generally made available to users the Software executing at a particular time: (i) on one physical of products. Documentation does not include marketing materials.
  • KDE 2.0 Development

    KDE 2.0 Development

    00 8911 FM 10/16/00 2:09 PM Page i KDE 2.0 Development David Sweet, et al. 201 West 103rd St., Indianapolis, Indiana, 46290 USA 00 8911 FM 10/16/00 2:09 PM Page ii KDE 2.0 Development ASSOCIATE PUBLISHER Michael Stephens Copyright © 2001 by Sams Publishing This material may be distributed only subject to the terms and conditions set ACQUISITIONS EDITOR forth in the Open Publication License, v1.0 or later (the latest version is Shelley Johnston presently available at http://www.opencontent.org/openpub/). DEVELOPMENT EDITOR Distribution of the work or derivative of the work in any standard (paper) book Heather Goodell form is prohibited unless prior permission is obtained from the copyright holder. MANAGING EDITOR No patent liability is assumed with respect to the use of the information con- Matt Purcell tained herein. Although every precaution has been taken in the preparation of PROJECT EDITOR this book, the publisher and author assume no responsibility for errors or omis- Christina Smith sions. Neither is any liability assumed for damages resulting from the use of the information contained herein. COPY EDITOR International Standard Book Number: 0-672-31891-1 Barbara Hacha Kim Cofer Library of Congress Catalog Card Number: 99-067972 Printed in the United States of America INDEXER Erika Millen First Printing: October 2000 PROOFREADER 03 02 01 00 4 3 2 1 Candice Hightower Trademarks TECHNICAL EDITOR Kurt Granroth All terms mentioned in this book that are known to be trademarks or service Matthias Ettrich marks have been appropriately capitalized. Sams Publishing cannot attest to Kurt Wall the accuracy of this information.
  • Die UNIX-Shell

    Die UNIX-Shell

    Die UNIX-Shell H. Todt, M. Wendt (UP) Computational Physics - Einführung WiSe 2020/21, 30.6.2021 1 / 91 Wiederholung und Ergänzung: Linux H. Todt, M. Wendt (UP) Computational Physics - Einführung WiSe 2020/21, 30.6.2021 2 / 91 Literatur zu Linux & Shell Linux / Die wichtigsten Befehle kurz & gut; Daniel J. Barrett, Kathrin Lichtenberg, Thomas Demmig Linux in a Nutshell; Ellen Siever, Stephen Figgins, Robert Love Unix in a Nutshell; Arnold Robbins Linux-Server / Das umfassende Handbuch; Dirk Deimeke, Stefan Kania, Daniel van Soest, Peer Heinlein, Axel Miesen Bash - kurz & gut; Karsten Günther H. Todt, M. Wendt (UP) Computational Physics - Einführung WiSe 2020/21, 30.6.2021 3 / 91 Wiederholung: LinuxI Linux ist ein freies UNIX-Betriebssystem. Seine wesentlichen Komponenten: Kernel Programm zur Ansteuerung der Hardware, Verwaltung von Dateien, Netzwerk, etc. liegt als Datei unter /boot/vmlinuz Programme Z.B. zum Editieren von Textdateien (vi); Systemdienste Shell Benutzerschnittstelle, Eingabe von Befehlen, z.B. bash X/X11 Grafisches System für Fenster, Mausunterstützung etc. X11-Programme: gv, xemacs X11-Umgebungen: GNOME, KDE H. Todt, M. Wendt (UP) Computational Physics - Einführung WiSe 2020/21, 30.6.2021 4 / 91 Wiederholung: LinuxII Arbeiten mit der Shell, Eingabe von Befehlen: Befehle meist Programmnamen gefolgt von Optionen und Argumenten, z.B. ls -hl /etc/ einige Befehle sind auch in die Shell eingebaut, z.B. set, export Optionen und Argumente sind nicht standardisiert: ls -h -l ! h für human readable ps -h ! h für header Tipp: In der bash zeigt der Befehl type befehl, um welche Art von Befehl es sich bei befehl handelt (eingebaut, Programm, Alias oder Funktion).
  • COMPSCI 105: Lecture #7 Introduction to UNIX Styles Of

    COMPSCI 105: Lecture #7 Introduction to UNIX Styles Of

    1/19/2020 Styles of Operating Systems • Operating Systems come in two styles: – Command‐Line Interfaces (CLI) COMPSCI 105: Lecture #7 – Graphical User Interfaces (GUI) • CLIs Introduction to UNIX – Earliest form of computer command interface – Commands (verbs) are typed in first, then options (nouns) ©2014‐2020 Dr. William T. Verts – Difficult to learn: Users have to remember what to type • GUIs – Items (nouns) are selected, then actions (verbs) applied – Easy to learn: Users select options from a menu ©2014 Dr. William T. Verts Operating Systems UNIX • CLI • Dates from early 1970s – UNIX • Used in academia ever since – MS‐DOS (original IBM‐PC and later clones) • Used today in many servers on the Internet • GUI • Variations include Linux – Microsoft Windows • The Web server for our class runs it, and is: – Apple Mac interface (but under‐layer is UNIX) – Physically located in the CMPSCI Building – Accessible only through the Internet – Through Host Address: elsrv3.cs.umass.edu ©2014 Dr. William T. Verts ©2014 Dr. William T. Verts Our UNIX Server, elsrv3.cs.umass.edu Internet Tools • Telnet – Connect over the Internet to remote server for the purpose of giving it commands – Original version was unencrypted – Modern versions are encrypted • FTP (File‐Transfer‐Protocol) – Connect over the Internet to copy files between remote machines – Original version was unencrypted – Modern versions are encrypted ©2017 Dr. William T. Verts ©2014 Dr. William T. Verts 1 1/19/2020 Modern Tools Student Accounts • Encrypted Telnets: • Usernames are the same as UMail usernames. – Microsoft Windows: PuTTY (download from UK) • Passwords are initially ELxxxaaa,wherexxx is the last three digits of the SPIRE ID number, and – Apple Mac: ssh from Terminal (built‐in standard) aaa is the first three letters of the username • Encrypted FTP: (lower case).
  • Magazyn Dragonia

    Magazyn Dragonia

    Numer 27 – 2008 Bash Prompt HOWTO, czyli czarowanie znaku zachęty Artykuł przedstawia sposoby na two- rzenie ciekawych znaków zachęty w konsoli oraz xtermach wykorzystu- jących powłokę Bash. Ciekawych to mało, ale również kolorowych! Całość na stronie7 Z YouTube na dysk Serwisy typu YouTube miały zawsze jedną wadę – przy słabym łączu oglą- danie czegokolwiek staje się koszma- rem. Próżno szukać opcji umożliwiają- cych zapisanie filmów na dysku, takie działanie jest bowiem sprzeczne z in- teresami właścicieli serwisu. Artykuł przedstawia kilka sposobów na ścią- gnięcie naszych ulubionych filmów. Całość na stronie 35 Pdftk – PDF Toolkit O tym jak łączyć i dzielić pliki PDF; jak je zaszyfrować, odszyfrować; jak do- dać znak wodny lub załącznik do pli- ku PDF za pomocą narzędzia Pdftk. Całość na stronie 23 Wstępniak Spis treści Drodzy Czytelnicy System Przekazujemy do Waszych rąk świąteczny Cyfrowa farma, czyli co wybrać?............................3 numer Dragonii. To już trzeci taki numer Bash Prompt HOWTO, czyli czarowanie znaku zachęty.....................7 w naszej historii. Dzięki Wam chcemy wciąż Wstęp do Debiana................................. 14 pisać dla Was, z Was rekrutuje się nasza re- Zarządzanie pakietami w Debianie............................ 16 dakcja. Dziękuję Wam, że jesteście. W numerze dwa artykuły o Debianie, Konkurs czyli jak dobrze zacząć, by nie móc z nim Software skończyć. Dla pewności będziemy w tym LATEXowanie w GTK+ – krótki przegląd edytorów....................... 20 utwierdzani w kolejnych numerach. Pdftk – PDF Toolkit................................. 23 Obok innych artykułów polecam prze- System dla początkujących użytkowników Olá! Dom 6.06 A gląd edytorów do LTEX-a, tak byście mogli – odtwarzanie muzyki i filmów............................. 25 wybrać któryś dla siebie. Niebawem wracają JPC – Java PC (x86) Emulator............................
  • Zero to Sysadmin: Advanced Topics — David Both Using and Administering Linux: Volume 2 Zero to Sysadmin: Advanced Topics

    Zero to Sysadmin: Advanced Topics — David Both Using and Administering Linux: Volume 2 Zero to Sysadmin: Advanced Topics

    Using and Administering Linux: Volume 2 Zero to SysAdmin: Advanced Topics — David Both Using and Administering Linux: Volume 2 Zero to SysAdmin: Advanced Topics David Both Using and Administering Linux: Volume 2 David Both Raleigh, NC, USA ISBN-13 (pbk): 978-1-4842-5454-7 ISBN-13 (electronic): 978-1-4842-5455-4 https://doi.org/10.1007/978-1-4842-5455-4 Copyright © 2020 by David Both This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Trademarked names, logos, and images may appear in this book. Rather than use a trademark symbol with every occurrence of a trademarked name, logo, or image we use the names, logos, and images only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made.
  • Trend Micro™ Serverprotect™ for Linux™ Getting Started Guide

    Trend Micro™ Serverprotect™ for Linux™ Getting Started Guide

    TREND MICROTM ServerProtectTM 2 Stops Viruses from Spreading through Linux Servers for Linux TM Getting Started Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files, release notes and the latest version of the Getting Started Guide, which are available from Trend Micro’s Web site at: http://www.trendmicro.com/download/documentation NOTE: A license to the Trend Micro Software usually includes the right to product updates, pattern file updates, and basic technical support for one (1) year from the date of purchase only. Maintenance must be reviewed on an annual basis at Trend Micro’s then-current Maintenance fees. Trend Micro, the Trend Micro t-ball logo, InterScan VirusWall, MacroTrap, ServerProtect, ScriptTrap, and TrendLabs are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. All other brand and product names are trademarks or registered trademarks of their respective companies or organizations. Copyright© 1997-2006 Trend Micro Incorporated. All rights reserved. No part of this publication may be reproduced, photocopied, stored in a retrieval system, or transmitted without the express prior written consent of Trend Micro Incorporated. Document Part No. SPEM22345/50715 Release Date: April 2006 Protected by U.S. Patent No. 5,951,698 The Getting Started Guide for Trend Micro™ ServerProtect™ for Linux™ is intended to introduce the main features of the software and installation instructions for your production environment. You should read through it prior to installing or using the software.
  • Split Point Lighthouse, Aireys Inlet, Victoria, Australia <../../> Home

    Split Point Lighthouse, Aireys Inlet, Victoria, Australia <../../> Home

    Split Point Lighthouse, Aireys Inlet, Victoria, Australia <../../> Home <../../> About <../../about.htm> Gallery <../../gallery> Tips Download <../../download.htm> Release Notes <../../release-lhp.htm> Hints and Tips for Lighthouse Pup <#Acronyms>Acronyms <#Acronyms>| System Requirements <#requirements> | Installation <#Installation> | GRUB Bootloader <#GRUB> | Troubleshooting <#Troubleshooting> | Keep VirtualBox or Wine from filling up your save file <#f-s> Display drivers in Lighthouse64 <http://www.murga-linux.com/puppy/viewtopic.php?p=662949#662949> | Uninstallation/Upgrade <#Uninstallation> | SFS Add-ons <#sfs> | Automount <#automount> | Desktop <#Desktop> | Command Line <#CL> Release notes <../../release-lhp.htm>| Flash Version <http://www.adobe.com/software/flash/about/> | Compiz-Fusion <../../c-f.htm> | Cairo-Dock <../../sfs/503/Cairo-Dock.html> <c-f.htm> If you're updating your existing Lighthouse to a new version, please start a 'clean boot' from the CD-ROM by typing at the boot menu puppy pfix=ram and make a back-up copy of your pupsave* file e.g., LHPsave.3fs.bak before booting LighthousePup. (If booting with GRUB, at the boot menu, press 'e' to editthe kernel line, add pfix=ram, then Enter and 'b' to boot.) * As of Lighthouse 5.00 G, the pupsave filename begins with LHPsave. With Lighthouse 64 the save file begins with L64save. Acronyms Used Here LHP <../../about.htm>= Lighthouse PupLinux JWM <http://en.wikipedia.org/wiki/JWM> = Joe's Window Manager IceWM <http://www.icewm.org/> = Ice Window Manager L64 = Lighthouse 64-bit KDE <http://kde.org> = 'K' Desktop Environment LXDE <http://lxde.org/> = Lightweight X11 DesktopEnvironment SFS <#sfs> = Squash File System Xfce <http://www.xfce.org/>= Lightweight & full-featured desktop Fusion = Compiz <http://www.lhpup.org/c-f.htm>stand-alone with ROX desktop NLS <http://wiki.linuxquestions.org/wiki/Native_Language_Support>= Native Language Support, a.k.a.
  • Topaccess Guide

    Topaccess Guide

    MULTIFUNCTIONAL DIGITAL SYSTEMS TopAccess Guide ©2008 - 2011 TOSHIBA TEC CORPORATION All rights reserved Under the copyright laws, this manual cannot be reproduced in any form without prior written permission of TTEC. No patent liability is assumed, however, with respect to the use of the information contained herein. Preface Thank you for purchasing TOSHIBA Multifunctional Digital Systems or Multifunctional Digital Color Systems. This manual explains the instructions for administrators to set up and manage the Multifunctional Digital Systems or Multifunctional Digital Color Systems using TopAccess. Read this manual before using your Multifunctional Digital Systems or Multifunctional Digital Color Systems. Keep this manual within easy reach, and use it to configure an environment that makes best use of the e-STUDIO’s functions. The e-STUDIO455 Series and the e-STUDIO855 Series provide the scanning function as an option. However, this optional scanning function is already installed in some models. How to read this manual Symbols in this manual In this manual, some important items are described with the symbols shown below. Be sure to read these items before using this equipment. Indicates a potentially hazardous situation which, if not avoided, could result in death, serious injury, or serious damage, or fire in the equipment or surrounding objects. Indicates a potentially hazardous situation which, if not avoided, may result in minor or moderate injury, partial damage to the equipment or surrounding objects, or loss of data. Indicates information to which you should pay attention when operating the equipment. Other than the above, this manual also describes information that may be useful for the operation of this equipment with the following signage: Describes handy information that is useful to know when operating the equipment.