Examples
Let's login in to the system:
$ ssh root@192.168.8.128
Password:
Last login: Mon Mar 31 11:39:29 2008 Sun Microsystems Inc. SunOS 5.11 snv_70b October 2007
#
Next will be interest to check the user we are:
# id
uid=0(root) gid=0(root)
See where we are (path)
# pwd
/
Check the values of some variables
# echo $PATH "\n" $TERM
/usr/sbin:/usr/bin
cygwin
set the value of variable TERM
# TERM=vt100;export TERM
List the content of current directory
# ls -l
total 346
lrwxrwxrwx 1 root root 9 Nov 1 12:20 bin -> ./usr/bin
drwxr-xr-x 6 root sys 512 Nov 1 13:00 boot
drwxr-xr-x 2 root root 512 Nov 6 11:07 cdrom
drwxr-xr-x 67 root sys 4096 Nov 1 13:31 dev
drwxr-xr-x 2 root sys 512 Mar 31 11:38 devices
drwxr-xr-x 91 root sys 4608 Mar 31 11:40 etc
<SNIP>
drwxr-xr-x 4 root root 512 Nov 1 12:20 system
drwxrwxrwt 6 root sys 299 Mar 31 11:39 tmp
drwxr-xr-x 38 root sys 1024 Nov 1 13:07 usr
drwxr-xr-x 44 root sys 1024 Nov 5 14:35 var
go to directory using absolute path and the relative path
# cd /var/adm
# cd ../tmp
# pwd
/var/tmp
examine the content of file
# cat /etc/nsswitch.conf
# CDDL HEADER START
#
# The contents of this file are subject to the terms of the
# Common Development and Distribution License (the "License").
# You may not use this file except in compliance with the License.
<SNIP>
passwd: files
group: files
hosts: files
dns # Added by DHCP
ipnodes: files
networks: files
protocols: files
netmasks: files
bootparams: files
Let see the IP settings
# ifconfig -a
lo0: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL> mtu 8232 index 1
inet 127.0.0.1 netmask ff000000
e1000g0: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 2
inet 10.0.2.10 netmask ffffff00 broadcast 10.0.2.255
ether 8:0:27:13:f7:38
and routing table
# netstat -rn
Routing Table: IPv4
Destination Gateway Flags Ref Use Interface
-------------------- -------------------- ----- ----- ---------- ---------
default 10.0.2.2 UG 1 0
10.0.2.0 10.0.2.10 U 1 0 e1000g0
224.0.0.0 10.0.2.10 U 1 0 e1000g0
127.0.0.1 127.0.0.1 UH 1 40 lo0
Get the list of opened ports
# netstat -a |grep LISTEN
*.sunrpc *.* 0 0 49152 0 LISTEN
*.ssh *.* 0 0 49152 0 LISTEN
<SNIP>
localhost.32807 *.* 0 0 49152 0 LISTEN
localhost.32808 *.* 0 0 49152 0 LISTEN
localhost.32809 *.* 0 0 49152 0 LISTEN
localhost.32810 *.* 0 0 49152 0 LISTEN
*.ssh *.* 0 0 49152 0 LISTEN
*.32794 *.* 0 0 49152 0 LISTEN
stop the sendmail (because we will not use this server for this purpose)
# svcadm disable sendmail
and check again for daemon listening on port 25
# netstat -an|grep 25|grep tcp
#
Conclusion
Above you see only very brief overview of the functions, commands and details of Solaris operating system. If you need more indeep knowledge go to SUN doc site Solaris 10 Operating System, search for information, spread in Internet. check and apply for courses in your area, play with x86 version, using virtual machine, ask questions.
Subscribe to:
Post Comments (Atom)
Compressed tar archive
There are some cases when you want to create compressed tar archive but you do not have enough disk space to keep original files and tar arc...
-
To build firewall under AIX is sample, but as each host based firewall should be done careful 1. Prerequisites To start firewall in AIX yo...
-
There are some cases when you want to create compressed tar archive but you do not have enough disk space to keep original files and tar arc...
-
4. Its time for some system administrator tasks. Oracle ASM need special mark of disks will work with 4.1. Because of some reason (i don...
No comments:
Post a Comment