Rhcsa 2
Rhcsa 2
RHCSA-2
LOG FILES
Log Files Location And How Do I View Logs Files
Almost all logfiles are located under /var/log directory and its sub
directories on Linux. You can change to this directory using the cd command. You
need be the root user to view or access log files on Linux or Unix like operating
systems. You can use the following commands to see the log files:
less command
more command
cat command
grep command
tail command
zcat command
zgrep command
zmore command
How do I view log files on Linux?
Open the Terminal or login as root user using ssh command. Go to /var/log
directory using the following cd command:
# cd /var/log
To view a common log file called /var/log/messages use any one of the following command:
# less /var/log/messages
# more f /var/log/messages
# cat /var/log/messages
# tail f /var/log/messages
# grep i error /var/log/messages
Common Linux log files names and usage
/var/log/messages : General message and system related stuff
/var/log/auth.log : Authenication logs
/var/log/kern.log : Kernel logs
/var/log/cron.log : Crond logs (cron job)
/var/log/maillog : Mail server logs
/var/log/qmail/ : Qmail log directory (more files inside this directory)
/var/log/httpd/ : Apache access and error logs directory
/var/log/lighttpd/ : Lighttpd access and error logs directory
/var/log/boot.log : System boot log
/var/log/mysqld.log : MySQL database server log file
/var/log/secure or /var/log/auth.log : Authentication log
/var/log/utmp or /var/log/wtmp : Login records file
/var/log/yum.log : Yum command log file.
MONITORING TOOLS
TOP Command
Linux Top command is a performance monitoring program which is used frequently by
many system administrators to monitor Linux performance and it is available under
many Linux/Unix like operating systems. The top command used to dipslay all the
running and active realtime processes in ordered list and updates it regularly. It
display CPU usage, Memory usage, Swap Memory, Cache Size, Buffer Size, Process
PID, User, Commands and much more. It also shows high memory and cpu utilization
of a running processess. The top command is much userful for system administrator
to monitor and take correct action when required. Lets see top command in action.
# top
2. Sorting with O (Uppercase Letter O)
Press (Shift+O) to Sort field via field letter, for example press a letter to sort process with
PID (Process ID).
3. Display Specific User Process
# top u tecmint
4. Highlight Running Process in Top
Press z option in running top command will display running process in color which may
help you to identified running process easily.
5. Shows Absolute Path of Processes
Press c option in running top command, it will display absolute path of running process.
Iostat Command
1. Display CPU and I/O statistics
iostat without arguments displays CPU and I/O statistics of all partitions as shown below.
# iostat
2. Shows only CPU Statistics
iostat with c arguments displays only CPU statistics as shown below.
# iostat c
3. Shows only Disks I/O Statistics
iostat with d arguments displays only disks I/O statistics of all partitions as shown.
# iostat d
4. Shows I/O statistics only of a single device.
By default it displays statistics of all partitions, with p and device name arguments displays only disks I/O
statistics for specific device only as shown.
# iostat p sda
5. Display LVM Statistics
With N (Uppercase) parameter displays only LVM statistics as shown.
# iostat N
6. iostat version.
With V (Uppercase) parameter displays version of iostat as shown.
# iostat V
Note: vmstat and iostat contains number of columns and flags which may not possible to explain in details. If
you want to know more about it you may refer man page of vmstat and iostat.
#iptraf
IP traffic monitor
General interface statistics
Detailed interface statistics
Statistical breakdowns
LAN station monitor
Configure
IPTraf Options
Using iptraf -i will immediately start the IP traffic monitor on a particular interface.
For example, the following command will start the IP traffic on interface eth0. This is
the primary interface card that attached to your system. Else you can also monitor all
your network interface traffic using argument as iptraf -i all.
# iptraf i eth0
IPTraf Eth0 Monitoring
Similarly, you can also monitor TCP/UDP traffic on a specific interface, using the
following command.
# iptraf s eth0
The psacct or acct package provides several features for monitoring process activities.
ac command prints the statistics of user logins/logouts (connect time) in hours.
lastcomm command prints the information of previously executed commands of user.
accton commands is used to turn on/off process for accounting.
sa command summarizes information of previously executed commands.
last and lastb commands show listing of last logged in users.
Using command ac -d will prints out the total login time in hours by daywise.
Using command ac -p will print the total login time of each user in hours.
To get the total login statistics time of user tecmint in hours, use the command as. # ac tecmint
The following command will prints the daywise total login time of user tecmint in hours. # ac
d tecmint
Print All Account Activity Information # sa
Print Individual User Information
# sa u
Print Number of Processes
# sa m
Print Sort by Percentage
# sa c
List Last Executed Commands of User
# lastcomm tecmint
Search Logs for Commands
# lastcomm ls
RPM
RPM (Red Hat Package Manager) utility for Red Hat based systems like (RHEL, CentOS and Fedora).
The tool allows system administrators and users to install, update, uninstall, query, verify and manage
system software packages in Unix/Linux operating systems. The RPM formerly known as .rpm file, that
includes compiled software programs and libraries needed by the packages. This utility only works with
packages that built on .rpm format. is an default open source and most popular package management
Some Facts about RPM (RedHat Package Manager)
Install
Remove
Upgrade
Verify
Query
# rpm -q BitTorrent
6. How to List all files of an installed RPM package
To view all the files of an installed rpm packages, use the -ql (query list) with rpm command.
# rpm qa
9. How to Upgrade a RPM Package
If we want to upgrade any RPM package U (upgrade) option will be used.
One of the major advantages of using this option is that it will not only upgrade
the latest version of any package, but it will also maintain the backup of the
older package so that in case if the newer upgraded package does not run the
previously installed package can be used again.
# rpm -Uvh nx-3.5.0-2.el6.centos.i686.rpm
# rpm -evv nx
11. How to Remove an RPM Package Without Dependencies
The nodeps (Do not check dependencies) option forcefully remove the rpm package from the
system. But keep in mind removing particular package may break other working applications.
# rpm Va
18. How to Import an RPM GPG key
To verify RHEL/CentOS/Fedora packages, you must import the GPG key. To do so, execute the
following command. It will import CentOS 6 GPG key.
# cd /var/lib
# rm __db*
# rpm --rebuilddb
# rpmdb_verify Packages
YUM
YUM (Yellow dog Updater Modified) is an open source command-line as well as
graphical based package management tool for RPM (RedHat Package Manager)
based Linux systems. It allows users and system administrator to easily install, update,
remove or search software packages on a systems. It was developed and released by
Seth Vidal under GPL (General Public License) as an open source, means anyone can
allowed to download and access the code to fix bugs and develop customized
packages. YUM uses numerous third party repositories to install packages
automatically by resolving their dependencies issues.
Syntax
yum [options] [command] [package ...]
repository: A repository is a collection of rpms under some sort of filesystem tree. For
most purposes associated with yum, the repository will have two more important
characteristics. It has had the command createrepo run on the tree, which extracts and
encodes all of the metadata that yum relies on in order to function. Also, the tree, and is
made accessible by URL from a server (which means as one or more of
http://my.web.server/path, ftp://my.ftp.server/path, file://full/file/path to the repository
tree).
what are the drawbacks of this RPM package management and what are the advantage of YUM
S.No
RPM
YUM
Create Repository:
Step:1
# mount 192.168.0.254:/soft /mnt
# cd /mnt
#ls
# df Th
192.168.0.254:/soft
nfs 5.0G 3.6G 1.2G 77% /mnt
#cd /Packages
#rpm ivh vsftpd2.2.211.el6.x86_64.rpm
# cp rvf /mnt/Packages/ /var/ftp/pub/
# ls l /var/ftp/pub/
Step 2:
(i) # rpm -ivh createrepo-0.9.8-5.el6.noarch.rpm
(ii) # rpm -ivh deltarpm-3.5-0.5.20090913git.el6.x86_64.rpm
(iii) # rpm -ivh python-deltarpm-3.5-0.5.20090913git.el6.x86_64.rpm
Note : (ii) & (iii) are the dependence rpm for createrepo
To Create a repo
# createrepo .
(or)
# createrepo -v /var/ftp/pub/
Step 3
Now Crate a repository
# cd /etc/yum.repos.d/
# vim redhat.repo
[redhat]
baseurl=file:///software
enabled=1
gpgcheck=0
:wq!
Note :
enabled =1 ---> get repodata from (1 from local 0 - from web site)
gpgcheck=0 --> Key checking ( 0 - no need key, 1 - need Key)
If the service is not allowed then add it both in the runtime config and the permanent
config.
# firewall-cmd --add-service=ftp
success
# firewall-cmd --add-service=ftp permanent
success
# firewall-cmd --query-service=ftp
yes
# firewall-cmd --query-service=ftp --permanent
yes
You can now test vsftp by going to a remote server and using an ftp client to login
anonymously. ( You can also test it locally ). If you dont have an ftp client you can install a
basic command line one using
#yum install ftp
You should be able to log in anonymous users and see the root directory. ( Which is
chrooted to /var/ftp/ by default).
# ftp serverX.example.com
CRON
Cron format is a simple, yet powerful and flexible way to define time and frequency of various actions. nnCron make
active use of cron format in both classic and extended modes.
Traditional (inherited from Unix) cron format consists of five fields separated by white spaces:
<Minute> <Hour> <Day_of_the_Month> <Month_of_the_Year> <Day_of_the_Week>
nnCron can use both traditional and "enhanced" version of cron format, which has an additional (6th) field: <Year>
<Minute> <Hour> <Day_of_the_Month> <Month_of_the_Year> <Day_of_the_Week> <Year>
A user can select the format he would like to use by selecting or unselecting the Year field checkbox on General tab in
Options dialog (which can be opened by doublecliking the nnCron icon in system tray). By default, nnCron uses the
enhanced format.
The following graph shows what it consists of:
******
||||||
| | | | | +-Year
(range: 1900-3000)
| | | | +---- Day of the Week
(range: 1-7, 1 standing for Monday)
| | | +------ Month of the Year
(range: 1-12)
| | +-------- Day of the Month
(range: 1-31)
| +---------- Hour
(range: 0-23)
+------------ Minute
(range: 0-59)
Any of these 6 fields may be an asterisk (*). This would mean the entire range of possible values, i.e.
each minute, each hour, etc. In the first four fields, nnCron users can also use "nonstandard"
character ? (question mark), described here.
Any field may contain a list of values separated by commas, (e.g. 1,3,7) or a range of values (two
integers separated by a hyphen, e.g. 1-5).
After an asterisk (*) or a range of values, you can use character / to specify that values are repeated
over and over with a certain interval between them. For example, you can write "0-23/2" in Hour
field to specify that some action should be performed every two hours (it will have the same effect
as "0,2,4,6,8,10,12,14,16,18,20,22"); value "*/4" in Minute field means that the action should be
performed every 4 minutes, "1-30/3" means the same as "1,4,7,10,13,16,19,22,25,28".
In Month and Day of Week fields, you can use names of months or days of weeks abbreviated to
first three letters ("Jan,Feb,...,Dec" or "Mon,Tue,...,Sun") instead of their numeric values.
# crontab -l
MAIL=rahul
0 2 * * * /script/backup.sh
Backup cron to text file:
# crontab -l > cron-backup.txt
# cat cron-backup.txt
MAIL=rahul
0 2 * * * /script/backup.sh
Removing current scheduled cron:
# crontab -r
# crontab -l
no crontab for root
Restore crons from text file:
# crontab cron-backup.txt
# crontab -l
MAIL=rahul
0 2 * * * /script/backup.sh
AT
While working on Linux systems we preferred crontab for scheduling jobs generally. There are another utility
command is very useful for scheduling one time tasks. It reads commands from standard input or
script/file which can be executed later once. But we cant use at command for any recurring tasks. For
recurring tasks use Linux crontab.
At command can be useful for shutdown system at specified time, Taking one time backup, sending email as
reminder at specified time etc. This article will help you to understand the working of at command with
useful examples.
Commands used with at:
at : execute commands at specified time.
atq : lists the pending jobs of users.
atrm : delete jobs by their job number.
1. Schedule first job using at command
Below example will schedule ls l command to be executed on next 9:00 AM once.
# at 9:00 AM
at> ls l
at> ^d
job 3 at 20130323 09:00
Use ^d to exit from at prompt.
2. List the scheduled jobs using atq
When we list jobs by root account using atq , it shows all users jobs in result. But if we execute it from non
root account, it will show only that users jobs.
# atq
3
5
1
Fields description:
First filed: job id
Second filed: Job execution date
third filed: Job execution time
Last field: User name, under which job is scheduled.
3. Remove scheduled job using atrm
You can remove any at job using atrm using their job id.
# atrm 3
# atq
5
20130323 10:00 a rahul
1
20130323 12:00 a root
4. Check the content of scheduled at job
atq command only shows the list of jobs but if you want to check what script/commands are scheduled with that task, below
example will help you.
# at c 5
In above example 5 is the job id.
Examples of at Command:
Example 1: Schedule task at coming 10:00 AM.
# at 10:00 AM
Example 2: Schedule task at 10:00 AM on coming Sunday.
# at 10:00 AM Sun
Example 3: Schedule task at 10:00 AM on coming 25th July.
# at 10:00 AM July 25
Example 4: Schedule task at 10:00 AM on coming 22nd June 2015.
# at 10:00 AM 6/22/2015
# at 10:00 AM 6.22.2015
NTP
NTP Server
PORT NUMBER: 123
Definition: In computer networking, NTP is a system to synchronize time
of day computer clocks across the Internet.
a) The NTP system is based on Internet time servers, computers with
access to atomic clocks such as those operated by the U.S.
government. These NTP servers run a software service that provides
the clock's time of day to client computers over UDP port 123. NTP
supports a hierarchy of multiple server levels to handle a large load of
client requests.
b) The protocol includes algorithms to accurately adjust the time of day
being reported to account for Internet network transmission delays.
c) Computers running Windows, Mac OS X and Linux operating
systems can be configured to use an NTP server. Starting with Linux
OS, for example, on terminal type system-config-date option
contains an NTP server, which allows choosing an NTP server and
turning time synchronization on or off.
NTP CLIENT
USING TEXT METHOD:
# yum install chrony* y
# vim /etc/chrony.conf
server classroom.example.com iburst
# systemctl restart chronyd.service
# firewallcmd permanent addservice=ntp
# firewallcmd reload
# chronyc sources v
# timedatectl
# chronyc tracking
LDAP
LDAP PORT NUMBER: 389
LDAPS PORT NUMBER: 636
Global Catalog is available by default on ports 3268, and 3269 for
LDAPS.
LDAP stands for Lightweight Directory Access Protocol. As the name
suggests, it is a lightweight protocol for accessing directory services,
specifically X.500based directory services. LDAP runs over TCP/IP or
other connection oriented transfer services.
What kind of information can be stored in the directory? The LDAP
information model is based on entries. An entry is a collection of
attributes that has a globallyunique Distinguished Name (DN). The DN
is used to refer to the entry unambiguously. Each of the entry's
attributes has a type and one or more values. The types are typically
mnemonic strings, like "cn" for common name, or "mail" for email
address. The syntax of values depend on the attribute type.
LDAP CLIENT
USING GRAPHICAL METHOD:
# yum install sssd* authconfig* autofs* y
# systemctl enable sssd.service
# systemctl start sssd.service
>sssd is not active now
# authconfiggtk
User account database
: LDAP
Ldap Search base DN
: dc=example,dc=com
Ldap server
: ldaps://classroom.example.com
Use TLS to encrypted connection
>Tick it
>Click Download certicficate
url: http://classroom.example.com/pub/EXAMPLECACERT
Authendication method : LDAP password
# systemctl restart sssd.service
# firewallcmd permanent addservice=sssd
# firewallcmd reload
AUTO MOUNT:
# vim /etc/auto.master
/misc /etc/auto.misc
/home/guests /etc/auto.misc
# vim /etc/auto.misc
ldapuserX
rw,soft,intr classroom.example.com:/home/guests/ldapuserX
User Information
Authentication
[ ] Cache Informaon
[*] Use MD5 Passwords
[*] Use LDAP
[*] Use Shadow Passwords
[ ] Use NIS
[*] Use LDAP Authentication
[ ] Use IPAv2
[ ] Use Kerberos
[ ] Use Winbind
[ ] Use Fingerprint reader
[ ] Use Winbind Authentication
[*] Local authorization is sufficient
Cancel
Next
>PRESS NEXT
Server: ldaps://classroom.example.com
> PRESS OK
> PRESS OK
# cd /etc/openldap/cacerts/
# wget http://172.25.254.100/pub/EXAMPLECACERT
# systemctl restart sssd.service
# firewallcmd permanent addservice=sssd
# firewallcmd reload
# getent passwd ldapuserX
AUTO MOUNT:
# vim /etc/auto.master
/misc /etc/auto.misc
/home/guests /etc/auto.misc
# vim /etc/auto.misc
ldapuserX
rw,soft,intr classroom.example.com:/home/guests/ldapuserX
Virtualization
Virtualization is the creation of a virtual (rather than actual) version of
something, such as an operating, a server, a storage device or network
resources.
Why should we use virtualization
Consolidation It means combining multiple software workloads on one
computer system. You can run various virtual machines in order to save
money and power (electricity).
Testing You can test various configuration. You can create less resource
hungry and low priority virtual machines (VM). Often, I test new Linux
distro inside VM. This is also good for students who wish to learn new
operating systems and programming languages / database without making
any changes to working environment. At my work place I give developers
virtual test machines for testing and debugging their software.
Security and Isolation If mail server or any other app gets cracked, only
that VM will be under control of the attacker. Also, isolation means
misbehaving apps (e.g. memory leaks) cannot bring down whole server
KernelBased
Virtual Machine (KVM)
To check whether your CPU supports the hardware virtualization, execute the
following command.
# egrep '(vmx|svm)' /proc/cpuinfo
Install KVM packages using your distro specific package management tool (for
example, yum on RedHat and CentOS).
# yum install kvm
Once you install the main kvm package, install the following KVM related packages
that will help you to manage the VMs on your system.
# yum install qemukvm pythonvirtinst libvirt libvirtpython virtmanager libguestfs
tools
virtinstall tool is used to create the VM. This tool can be used in both interactive or
noninteractive mode.
service libvirtd start
location=http://.com/pub/rhel6/x86_64/ \
network bridge:br0
KVM Migrations
Creating a Copy of the Virtual Server
To find the correct LV that needs being backed up, you can use lvdisplay in
SSH on the source node:
# lvdisplay
Shutdown the source VPS either using SolusVM or the command line:
#virsh shutdown <servername>
Create the backup:
#dd if=/dev/vps/kvm101_img | gzip | dd of=/home/kvm101_backup.gz
bs=4096
Transfer to the Destination Node
On the destination node we need to create a logical volume the same size
as the original one:
#lvcreate n kvm101_img size 10G /dev/vps
Transfer the backup to the destination server:
#scp C /home/kvm101_backup.gz [email protected]:/home/
VNC
Virtual Network Computing
VNC by default uses TCP port 5900+N, where N is
the display number (usually :0 for a physical
display). Several implementations also start a
basic HTTP server on port 5800+N to provide a
VNC viewer as a Java applet, allowing easy
connection through any Javaenabled web
browser.
VNC 6
SERVER:
# yum install tigervnc* y
# vim /etc/sysconfig/vncservers
GO LAST LINE
VNCSERVERS="2:username1 3:username2"
# useradd username1
# useradd username2
# passwd username1
# passwd username2
# su username1
$ vncpasswd
$ logout
# su username2
$ vncpasswd
$ logout
# service vncserver restart
CLIENT:
# yum install tigervnc* y
# vncviewer
VNC server: serverip:2 [OR] 3
Password:
[OR]
# vncviewer SERVERIP:2 [OR] 3
IF YOU WANT TO TAKE ROOT IN VNC DO FOLLOWING STEPS IN SERVER:
GO SYSTEM > PREFERENCES > REMOTE DESKTOP
TICK ALLOW OTHER USERS TO VIEW YOUR DESKTOP ETC.,
WE CAN SET THE PASSWORD FOR AUTHENTICATION.
VNC 7
SERVER:
# yum install tigervnc* y
# systemctl enable [email protected]
# vim /etc/sysconfig/vncservers
THIS FILE HAS BEEN REPLACED BY
/lib/systemd/system/[email protected]
# cp rvf /lib/systemd/system/[email protected]
/lib/systemd/system/[email protected]
# cp rvf /lib/systemd/system/[email protected]
/lib/systemd/system/[email protected]
# vim /lib/systemd/system/[email protected]
LINE NO: 40 AND 41
REPLACE <USER> AS USERNAME
# vim /lib/systemd/system/[email protected]
LINE NO: 40 AND 41
REPLACE <USER> AS USERNAME
#
#
#
#
useradd username1
useradd username2
passwd username1
passwd username2
#
$
$
#
$
$
#
#
#
#
#
#
#
su username1
vncpasswd
logout
su username2
vncpasswd
logout
systemctl daemonreload
systemctl enable [email protected]
systemctl enable [email protected]
systemctl restart vncserver_username1@:1.service
systemctl restart vncserver_username2@:2.service
firewallcmd permanent addservice=vncserver
firewallcmd reload
CLIENT:
# yum install tigervnc* y
# vncviewer
VNC server: serverip:2 [OR] 3
Password:
[OR]
# vncviewer SERVERIP:2 [OR] 3
TELNET
Telnet( Text-based network):
port-23
TELNET 6
SERVER:
#yum install telnet telnetserver y
#vi /etc/xinetd.d/telnet
disable
= no
#vim /etc/securetty
pts/1
pts/2
pts/3
etc.,
#vi /etc/sysconfig/iptables
A INPUT p tcp m state state NEW dport 23 j ACCEPT
#useradd user1
#echo "redhat" | passwd stdin user1
#service xinetd start
#chkconfig telnet on
#chkconfig xinetd on
CLIENT:
#yum install telnet y
#telnet ServerIP
[OR]
#telnet ServerIP portNo(using this step we can know this port is opened or
not)
#username
#password
TELNET 7
SERVER:
#yum install telnet telnetserver y
#systemctl enable telnet.service
#systemctl start telnet.service
#vi /etc/xinetd.d/telnet
disable
= no
#vim /etc/securetty
pts/1
pts/2
pts/3
etc.,
[Optional]
#useradd user1
#echo "redhat" | passwd stdin user1
#systemctl restart telnet.service
#firewallcmd permanent addport=23/tcp
#firewallcmd reload
CLIENT:
#yum install telnet y
#telnet ServerIP
[OR]
#telnet ServerIP portNo(using this step we can know this port is opened or not)
#username
#password
FTP
FTP PORT NUMBER:20
SFTP PORT NUMBER: 21
Definition: FTP allows you to transfer files between two
computers on the Internet. FTP is a simple network protocol
based on Internet Protocol and also a term used when
referring to the process of copying files when using FTP
technology.
FTP supports two modes of data transfer: plain text (ASCII),
and binary. You set the mode in the FTP client. A common
error when using FTP is attempting to transfer a binary file
(such as a program or music file) while in text mode,
causing the transferred file to be unusable.
Also Known As: File Transfer Protocol
Client Server2
Client Server1
FTP Server
Client Mobile2
Client Mobile1
Client System1
Client System2
Downloading Configuration
1) Configuration file
/etc/vsftpd/vsftpd.conf
2) Downloading configuration
anonymous_enable=YES
// anonymous users
local_enable=YES
// local users
write_enable=YES
3) Service restart
#service vsftpd restart
4) Testing on Linux
#lftp ftpserver
#lftp u username ftpserver
5) Testing on windows
Use FileZilla tools
// 600
FTP
SERVER:
# yum install ftp.x86_64 vsftpd.x86_64 y
# systemctl enable vsftpd.service
# systemctl start vsftpd.service
# vim /etc/vsftpd/vsftpd.conf
LINE NO: 12,16 (CHECK)
anonymous_enable=YES (IF YOU WANT TO DENY ANONYMOUS USER LOGIN,
REPLACE "YES" TO "NO")
local_enable=YES
LINE NO: 125,126 (CHECK)
pam_service_name=vsftpd
userlist_enable=YES
# getsebool a | grep ftp
CLIENT:
# yum install ftp.x86_64 vsftpd.x86_64 y
# ftp 172.25.X.11
Name (172.25.X.11:root):
Password:
ftp>
.
.
[HERE WE CAN USE PUT AND GET COMMAND FOR
UPLOAD AND DOWNLOAD]
.
ftp>bye
SELINUX CONCEPT
SELINUX
CONFIGURATION
Hard Links:
Issue the ln [original filename] [link name] command to create a hard link
Original File and Hard Linked file contain the same inode value
Creates a mirror copy of the file
Any changes to either original file or hard linked file are reflected in the other file
Benefit more flexible and remain linked if either the original or hard linked file is
moved
Negative unable to cross different file systems
Soft Links:
Issue the ln -s [original filename] [link name] command to create a soft link
Similar to shortcut feature in Windows Operating system
Original File and Hard Linked file contain different inode values
Each soft link file points to the original files inode
Any changes to either original file or soft linked file are reflected in the other file
Benefit soft linked file can cross different file systems
Negative if original file is deleted or moved, the soft link is broken (hanging link)
IPTABLES
# Modify this file accordingly for your specific requirement.
# http://www.thegeekstuff.com
# 1. Delete all existing rules
iptables F
# 2. Set default chain policies
iptables P INPUT DROP
iptables P FORWARD DROP
iptables P OUTPUT DROP
# 3. Block a specific ipaddress
#BLOCK_THIS_IP="x.x.x.x"
#iptables A INPUT s "$BLOCK_THIS_IP" j DROP
# 4. Allow ALL incoming SSH
#iptables A INPUT i eth0 p tcp dport 22 m state state NEW,ESTABLISHED j ACCEPT
#iptables A OUTPUT o eth0 p tcp sport 22 m state state ESTABLISHED j ACCEPT
# 5. Allow incoming SSH only from a sepcific network
#iptables A INPUT i eth0 p tcp s 192.168.200.0/24 dport 22 m state state NEW,ESTABLISHED j
ACCEPT
#iptables A OUTPUT o eth0 p tcp sport 22 m state state ESTABLISHED j ACCEPT