42%
30.11.2025
).
Figure 13: These settings prevent the computer with the IP address of 192.168.1.66 from accessing TCP port 22 – that is, the SSH service.
You need to watch out for two pitfalls here: Because
42%
30.11.2025
Scenarios:
21 cucumber /usr/lib/nagios/plugins/cucumber-nagios/checks/features/www.xing.com/startpage.feature:4 # Scenario: Visiting home page
22
23 1 scenario (1 failed)
24 4 steps (1 failed, 3 skipped)
25 0
42%
30.11.2025
rhcsNodename: iscsi1
15 rhcsCluster-id: 46516
16 cn: cman
17 objectclass: rhcsCman
18
19 dn: cn=clusternodes,name=cluster,dc=tuxgeek,dc=de
20 cn: clusternodes
21 objectclass: nsContainer
22
23 dn: cn
42%
30.11.2025
capture or display filters. The capture filter would look like this:
port 22
Then start capturing, initiate an SSH login at the console, and in the Analyze
menu, select Follow TCP Stream
. The result
42%
30.11.2025
17
18
19
20
21
22
23
This example also
42%
30.11.2025
to popular ports, such as 80 (HTTP) or 22 (SSH), and pings. If Portbunny does not register a response to a port request, but the trigger packet reaches the target, it tags the port as filtered. Using Portbunny
42%
30.11.2025
As of kernel 2.4.x
As of kernel 2.2.x
Asianux/Red Flag, CentOS, Debian, Novell OES, Red Hat, SUSE, Ubuntu
BSD
–
FreeBSD, NetBSD, OpenBSD
No
No
Free
42%
30.11.2025
]
13 rw=randread
14 runtime=60
15
16 [sequentialread]
17 stonewall
18 rw=read
19 runtime=60
20
21 [randomwrite]
22 stonewall
23 rw=randwrite
24 runtime=60
25
26 [sequentialread]
27 stonewall
28 rw
42%
30.11.2025
}
19
20 -re "($|%|>) " { interact }
21
22 timeout {
23 send_tty "No response from $host\n"
24 exit
25 }
26 }
The script begins as usual by saving its arguments into variables
42%
30.11.2025
# stmfadm create-tg myfcserver
19 # stmfadm add-tg-member -g myfcserver wwn.10000000c93805a6
20 # stmfadm create-hg myfcclient
21 # stmfadm add-hg-member -g myfcclient wwn.50060b0000c26204
22 # svcadm enable