VDCF is a management tool for virtualizing and monitoring Solaris environments. It allows centralized installation, operation, migration, monitoring, security, hardening and disaster recovery of Solaris zones, LDoms, and bare metal servers. VDCF provides simplicity, standardization, and high availability for private clouds. It has been in production use since 2006 to virtualize and manage Solaris environments.
The document discusses important show commands for Cisco routers and switches. It provides a cheat sheet of the most useful show commands including show running-config, show version, show ip route, show interfaces, show cdp neighbors, and show clock. Each command is briefly described in terms of the key information it displays about the device, interfaces, configurations, or network.
This document provides a command reference for network management functions on the ZXR10 8900 Series 10G Routing Switch. It describes SNMP, RMON, LLDP, web network management, and cluster management commands. The reference contains descriptions of each command's function and usage, as well as examples. It is intended to help users configure and manage the network management capabilities of the ZXR10 8900 Series switch.
The document provides instructions for configuring an authenticated Samba server with OpenVPN for secure remote access. Key steps include:
1. Installing Samba, CUPS and other required packages. Configuring firewall rules to allow SMB ports and sharing a directory.
2. Editing the Samba configuration file to define the shared directory and users. Starting the Samba and name resolution services.
3. Testing access from Linux and Windows clients.
4. Hardening the server with iptables firewall rules and installing ClamAV for antivirus scanning of the shared directory. Scheduling freshclam and clamscan to run periodically.
This document provides an overview and instructions for setting up the pfSense firewall software on Hacom hardware. It includes sections on introduction, setup and configuration, web administration, backup and restore, firmware updates, and maximum firewall states. The setup and configuration section describes connecting the firewall to the local network and internet, accessing the web-based administration interface, and going through an initial setup wizard to configure basic network and system settings.
PLNOG14: Architektura oraz rozwiązywanie problemów na routerach IOS-XE - Piot...PROIDEA
Piotr Kupisiewicz - Cisco Systems
Language: Polish
Architektura IOS-XE jest implementowana w każdym nowoczesnym routerze Cisco. Mowa tutaj o routerze ASR1000, jak również o seriach 43xx oraz 44xx.
Skoro IOS oraz IOS-XE "wyglądają" tak samo, jaka jest różnica między nimi ?
W jaki sposób efektywnie rozwiązywać problemy z przepływem ruchu poprzez router oparty o IOS-XE ?
Sesja omawiająca architekturę oraz podejście do rozwiązywania problemów (z prawdziwym "live demo"). Aspekty te mogą okazać się bardzo pomocne dla inżynierów sieciowych, jak również dla architektów sieciowych.
Zarejestruj się na kolejną edycję PLNOG: krakow.plnog.pl
This document provides an overview of the SRX JUMP STATION, which is a collection of quick start guides for configuring Juniper SRX firewalls. The purpose is to help users with ScreenOS experience transition to using JUNOS-based SRX firewalls. It assumes some basic JUNOS knowledge and provides examples of commands for common tasks. Navigation links and chapter buttons guide users through topics like login, interfaces, routing, security policies, VPNs, clustering, and more. Additional documentation sources are also referenced for more in-depth information or training.
VDCF is a management tool for virtualizing and monitoring Solaris environments. It allows centralized installation, operation, migration, monitoring, security, hardening and disaster recovery of Solaris zones, LDoms, and bare metal servers. VDCF provides simplicity, standardization, and high availability for private clouds. It has been in production use since 2006 to virtualize and manage Solaris environments.
The document discusses important show commands for Cisco routers and switches. It provides a cheat sheet of the most useful show commands including show running-config, show version, show ip route, show interfaces, show cdp neighbors, and show clock. Each command is briefly described in terms of the key information it displays about the device, interfaces, configurations, or network.
This document provides a command reference for network management functions on the ZXR10 8900 Series 10G Routing Switch. It describes SNMP, RMON, LLDP, web network management, and cluster management commands. The reference contains descriptions of each command's function and usage, as well as examples. It is intended to help users configure and manage the network management capabilities of the ZXR10 8900 Series switch.
The document provides instructions for configuring an authenticated Samba server with OpenVPN for secure remote access. Key steps include:
1. Installing Samba, CUPS and other required packages. Configuring firewall rules to allow SMB ports and sharing a directory.
2. Editing the Samba configuration file to define the shared directory and users. Starting the Samba and name resolution services.
3. Testing access from Linux and Windows clients.
4. Hardening the server with iptables firewall rules and installing ClamAV for antivirus scanning of the shared directory. Scheduling freshclam and clamscan to run periodically.
This document provides an overview and instructions for setting up the pfSense firewall software on Hacom hardware. It includes sections on introduction, setup and configuration, web administration, backup and restore, firmware updates, and maximum firewall states. The setup and configuration section describes connecting the firewall to the local network and internet, accessing the web-based administration interface, and going through an initial setup wizard to configure basic network and system settings.
PLNOG14: Architektura oraz rozwiązywanie problemów na routerach IOS-XE - Piot...PROIDEA
Piotr Kupisiewicz - Cisco Systems
Language: Polish
Architektura IOS-XE jest implementowana w każdym nowoczesnym routerze Cisco. Mowa tutaj o routerze ASR1000, jak również o seriach 43xx oraz 44xx.
Skoro IOS oraz IOS-XE "wyglądają" tak samo, jaka jest różnica między nimi ?
W jaki sposób efektywnie rozwiązywać problemy z przepływem ruchu poprzez router oparty o IOS-XE ?
Sesja omawiająca architekturę oraz podejście do rozwiązywania problemów (z prawdziwym "live demo"). Aspekty te mogą okazać się bardzo pomocne dla inżynierów sieciowych, jak również dla architektów sieciowych.
Zarejestruj się na kolejną edycję PLNOG: krakow.plnog.pl
This document provides an overview of the SRX JUMP STATION, which is a collection of quick start guides for configuring Juniper SRX firewalls. The purpose is to help users with ScreenOS experience transition to using JUNOS-based SRX firewalls. It assumes some basic JUNOS knowledge and provides examples of commands for common tasks. Navigation links and chapter buttons guide users through topics like login, interfaces, routing, security policies, VPNs, clustering, and more. Additional documentation sources are also referenced for more in-depth information or training.
Transparent firewall filtering bridge - pf sense 2.0.2 by william tarrhHichem Chehida
This document provides instructions for setting up a transparent firewall/filtering bridge with pfSense 2.0.2. It details the necessary hardware, initial pfSense setup steps, and configuration of the WAN interface, LAN interface, bridge interface, firewall rules, and other important pfSense settings. Specifically, it explains how to enable the filtering bridge, configure outbound NAT rules, and restrict access to the management interface. The transparent bridge defaults to blocking all traffic unless allowed by firewall rules, so rules must be created to allow outbound traffic from the LAN.
How to assign unowned disk in the netapp cluster 8.3 Saroj Sahu
Here it has been described how to assign the disk which is unowned to the node in the netapp cluster mode 8.3 and how to enable the disk assign option shelf level and stack level
This document provides guidance on diagnosing and addressing CSM storage issues in z/OS. It describes CSM and how it manages storage, symptoms of CSM storage problems like error messages and abends, how to gather diagnostic information like dumps and traces, common causes like insufficient CSM storage parameters, and recommendations such as increasing IVTPRM00 values and CSA allocation.
This log file contains output from an akfiler13 storage system. It shows that a user PHSWA\p375290 repeatedly tried to access the system without permission. It also shows that an RLM firmware upgrade was performed, installing version 4.0 and requiring a reboot. The system configuration was checked after the reboot, showing details of the storage system components.
Free radius billing server with practical vpn exmapleChanaka Lasantha
This document provides instructions for setting up a total site-to-site Linux-based OpenVPN solution with dynamic DNS (DDNS) in 3 pages. It includes steps to install and configure a DDNS client, FreeRADIUS server, MySQL database, OpenVPN server, firewall rules, and a web interface for managing the FreeRADIUS server. The full document contains technical details for installing packages, editing configuration files, testing the setup, and securing the system.
Foreman and Puppet Master Install process - Customer Used Case Kanwar Batra
The above process was used for a Customer to automate and deploy virtual and physical infrastrucutre using Foreman. This document outlines the my Install process of Foreman too
1. This document provides instructions for configuring MAC address authentication using a RADIUS server on an Aruba wireless controller and Amigopod RADIUS server.
2. It describes configuring a firewall policy, user role, RADIUS server, server group, MAC address profile, AAA configuration, SSID, virtual AP, and AP group profile on the controller.
3. It also includes instructions for testing the authentication by adding a MAC address to the RADIUS server and monitoring logs to verify authentication success.
01 ip oc180 e1_1 zxr10 m6000_t8000 basic operation (v1.00.20)legasu zemene
The document discusses the basic configuration and operation of the ZXR10 M6000/T8000 router, including setting the system name and password, configuring interfaces and IP addresses, upgrading firmware, and using commands like show ip interface to view interface status and show version to view system information. Different configuration modes like global, interface, and VLAN configuration are covered, as well as logical interfaces like loopback. Version upgrades can be done via network, hard disk, or patch depending on the scope of changes needed.
This document provides information on advanced root cause analysis techniques for VMware ESX environments. It discusses log file locations and purposes, how to increase logging levels for specific drivers to provide more debug information, listing and setting loadable module parameters, setting up serial logging and remote syslog, and forcing crashes to collect memory dumps. The document aims to equip support engineers with tools and techniques for thorough troubleshooting when initial logs are insufficient.
VMware’s Nathan Small who works as a Staff Engineer at Global Support Services has put together a great presentation about Advanced Root Cause Analysis. The presentation was designed to give you more insight into how a VMware Technical Support Engineer reviews logs, gathers data and performs in-depth analysis. Nathan is hoping to show you the skills they’re using every day to help determine the root cause for an issue in your environment. With this core knowledge, you will become more self-sufficient within your own environment and be able to diagnose an issue as it occurs rather than after the damage has been done.
Backup workflow for SMHV on windows 2008R2 HYPER-VAshwin Pawar
SnapManager for Hyper-V (SMHV) leverages NetApp's Snapshot technology to create backups of virtual machines hosted on Windows 2008 R2 Hyper-V servers. These backups capture point-in-time images of the VMs stored locally on the NetApp storage. The document describes the backup workflow in three levels - high level, low level, and raw, detailing the sequence of actions taken by SMHV, Hyper-V, and the NetApp storage system to back up the VMs using Snapshot technology in a consistent manner.
PFSENSE Load Balance with Fail Over From Version Beta3series09
This document provides instructions for configuring load balancing and failover on a PFsense firewall. It requires at least 3 network interfaces, 2 static IP addresses from the ISP, and 2 ADSL routers connected to 2 telephone lines. The steps include planning the network configuration, setting up the WAN and OPT interfaces with static IPs, creating a load balancing pool, enabling NAT, creating firewall rules for the LAN and interfaces, and configuring the ADSL routers and DHCP server. Troubleshooting involves using ping and traceroute to check connectivity through each interface.
As project associate worked on product development for the automation of the pheromone traps. Integrated with Raspberry Pi (Open source technologies) for the capturing of the insects. Conducted field trails for working of the trap version-1 with battery pack. This is best practice of "Electronics in Extension".
focus Softnet has a rich history of innovation, expansion and growth. Right from its first product (version), the emphasis was always on continuous R&D and team work.
How to shutdown and power up of the netapp cluster mode storage systemSaroj Sahu
This slide will guide you how to shutdown and power up of the Netapp cluster mode storage system in command mode. (It will depict you environmental shutdown process (SAN environment in a DataCenter)
Zenith Networks is a network integration services company headquartered in Philadelphia, PA that has been in business for 25 years. It is a partner of Juniper Networks and provides routing, switching, security and other network services to customers. The document includes details on Zenith Networks and Juniper Networks, as well as examples of Juniper router commands and outputs.
The document describes the configuration of an MPLS VPN network with two VRF instances to provide connectivity between sites. Key steps include:
1. Configuring IS-IS routing in the backbone to establish an MPLS core network.
2. Configuring VRFs and BGP to enable MPLS VPN services between CE routers.
3. Configuring a second VRF to connect additional CE routers and establish routing between them.
Remote VPNs allow secure access to corporate networks from remote locations by establishing an encrypted tunnel over the Internet. They provide secure communications and access rights tailored to individual users, enhancing productivity by extending corporate networks and applications while reducing costs and increasing flexibility. The example configuration shows a remote client (R1) connecting to a VPN server (R3) using IKE and IPsec to securely access resources on R3's network.
Solaris 10 workshop service management facilityBui Van Cuong
This document provides an overview and agenda for a Solaris 10 workshop on Service Management Facility (SMF). It introduces core SMF concepts like services, dependencies, and states. It explains how SMF provides a standardized way to define and manage services compared to previous Solaris methods. The document also outlines administrative SMF commands and how to migrate legacy services to SMF.
Consolidating Applications With Solaris Containersvaishal
This document discusses how Solaris containers can be used to consolidate applications by providing isolation and allocating resources. It explains that Solaris containers use zones and resource pools to partition a single Solaris operating system instance. Zones isolate applications by providing separate namespaces, while resource pools allocate CPU resources. The document demonstrates how an email server can be isolated with its own dedicated resource pool, while two web servers share another pool and are further isolated using shares allocated by the fair share scheduler.
solaris 10 administration training | solaris 10 training | solaris 10OnlineOracleTrainings
solaris 10 administration training course explores the key features,the capabilities of the Solaris 10 OS. Get benefits of Solaris 10 training with live example
Solaris 10 Administration Training Course Content
Introduction of Solaris 10 OS Directory Hierarchy
• Describe / (root) subdirectories
• Describe file components
• Describe types of Files
• Use hard links
Managing Local Disk Devices
• Describe the basic architecture of a disk
• Describe the naming conventions for devices
• List devices
• Reconfigure the devices
• Performing hard disk partitioning
• Manage disk labels
• Describing the Solaris Management Console
• Partition a disk by using the Solaris Management Console
Managing Solaris OS File Systems
• Describe Solaris OS file system
• Creating new ufs file system
• Check the file system using the fsck command
• Resolving file system inconsistencies
• Monitor file system use
Performing Mounts & Unmounts
• Identify mounting basics
• Performing mounts & unmounts
• Access a mounted CD ROM
• Restrict access to a mounted CD ROM
• Access a CD ROM without Volume Managements
Transparent firewall filtering bridge - pf sense 2.0.2 by william tarrhHichem Chehida
This document provides instructions for setting up a transparent firewall/filtering bridge with pfSense 2.0.2. It details the necessary hardware, initial pfSense setup steps, and configuration of the WAN interface, LAN interface, bridge interface, firewall rules, and other important pfSense settings. Specifically, it explains how to enable the filtering bridge, configure outbound NAT rules, and restrict access to the management interface. The transparent bridge defaults to blocking all traffic unless allowed by firewall rules, so rules must be created to allow outbound traffic from the LAN.
How to assign unowned disk in the netapp cluster 8.3 Saroj Sahu
Here it has been described how to assign the disk which is unowned to the node in the netapp cluster mode 8.3 and how to enable the disk assign option shelf level and stack level
This document provides guidance on diagnosing and addressing CSM storage issues in z/OS. It describes CSM and how it manages storage, symptoms of CSM storage problems like error messages and abends, how to gather diagnostic information like dumps and traces, common causes like insufficient CSM storage parameters, and recommendations such as increasing IVTPRM00 values and CSA allocation.
This log file contains output from an akfiler13 storage system. It shows that a user PHSWA\p375290 repeatedly tried to access the system without permission. It also shows that an RLM firmware upgrade was performed, installing version 4.0 and requiring a reboot. The system configuration was checked after the reboot, showing details of the storage system components.
Free radius billing server with practical vpn exmapleChanaka Lasantha
This document provides instructions for setting up a total site-to-site Linux-based OpenVPN solution with dynamic DNS (DDNS) in 3 pages. It includes steps to install and configure a DDNS client, FreeRADIUS server, MySQL database, OpenVPN server, firewall rules, and a web interface for managing the FreeRADIUS server. The full document contains technical details for installing packages, editing configuration files, testing the setup, and securing the system.
Foreman and Puppet Master Install process - Customer Used Case Kanwar Batra
The above process was used for a Customer to automate and deploy virtual and physical infrastrucutre using Foreman. This document outlines the my Install process of Foreman too
1. This document provides instructions for configuring MAC address authentication using a RADIUS server on an Aruba wireless controller and Amigopod RADIUS server.
2. It describes configuring a firewall policy, user role, RADIUS server, server group, MAC address profile, AAA configuration, SSID, virtual AP, and AP group profile on the controller.
3. It also includes instructions for testing the authentication by adding a MAC address to the RADIUS server and monitoring logs to verify authentication success.
01 ip oc180 e1_1 zxr10 m6000_t8000 basic operation (v1.00.20)legasu zemene
The document discusses the basic configuration and operation of the ZXR10 M6000/T8000 router, including setting the system name and password, configuring interfaces and IP addresses, upgrading firmware, and using commands like show ip interface to view interface status and show version to view system information. Different configuration modes like global, interface, and VLAN configuration are covered, as well as logical interfaces like loopback. Version upgrades can be done via network, hard disk, or patch depending on the scope of changes needed.
This document provides information on advanced root cause analysis techniques for VMware ESX environments. It discusses log file locations and purposes, how to increase logging levels for specific drivers to provide more debug information, listing and setting loadable module parameters, setting up serial logging and remote syslog, and forcing crashes to collect memory dumps. The document aims to equip support engineers with tools and techniques for thorough troubleshooting when initial logs are insufficient.
VMware’s Nathan Small who works as a Staff Engineer at Global Support Services has put together a great presentation about Advanced Root Cause Analysis. The presentation was designed to give you more insight into how a VMware Technical Support Engineer reviews logs, gathers data and performs in-depth analysis. Nathan is hoping to show you the skills they’re using every day to help determine the root cause for an issue in your environment. With this core knowledge, you will become more self-sufficient within your own environment and be able to diagnose an issue as it occurs rather than after the damage has been done.
Backup workflow for SMHV on windows 2008R2 HYPER-VAshwin Pawar
SnapManager for Hyper-V (SMHV) leverages NetApp's Snapshot technology to create backups of virtual machines hosted on Windows 2008 R2 Hyper-V servers. These backups capture point-in-time images of the VMs stored locally on the NetApp storage. The document describes the backup workflow in three levels - high level, low level, and raw, detailing the sequence of actions taken by SMHV, Hyper-V, and the NetApp storage system to back up the VMs using Snapshot technology in a consistent manner.
PFSENSE Load Balance with Fail Over From Version Beta3series09
This document provides instructions for configuring load balancing and failover on a PFsense firewall. It requires at least 3 network interfaces, 2 static IP addresses from the ISP, and 2 ADSL routers connected to 2 telephone lines. The steps include planning the network configuration, setting up the WAN and OPT interfaces with static IPs, creating a load balancing pool, enabling NAT, creating firewall rules for the LAN and interfaces, and configuring the ADSL routers and DHCP server. Troubleshooting involves using ping and traceroute to check connectivity through each interface.
As project associate worked on product development for the automation of the pheromone traps. Integrated with Raspberry Pi (Open source technologies) for the capturing of the insects. Conducted field trails for working of the trap version-1 with battery pack. This is best practice of "Electronics in Extension".
focus Softnet has a rich history of innovation, expansion and growth. Right from its first product (version), the emphasis was always on continuous R&D and team work.
How to shutdown and power up of the netapp cluster mode storage systemSaroj Sahu
This slide will guide you how to shutdown and power up of the Netapp cluster mode storage system in command mode. (It will depict you environmental shutdown process (SAN environment in a DataCenter)
Zenith Networks is a network integration services company headquartered in Philadelphia, PA that has been in business for 25 years. It is a partner of Juniper Networks and provides routing, switching, security and other network services to customers. The document includes details on Zenith Networks and Juniper Networks, as well as examples of Juniper router commands and outputs.
The document describes the configuration of an MPLS VPN network with two VRF instances to provide connectivity between sites. Key steps include:
1. Configuring IS-IS routing in the backbone to establish an MPLS core network.
2. Configuring VRFs and BGP to enable MPLS VPN services between CE routers.
3. Configuring a second VRF to connect additional CE routers and establish routing between them.
Remote VPNs allow secure access to corporate networks from remote locations by establishing an encrypted tunnel over the Internet. They provide secure communications and access rights tailored to individual users, enhancing productivity by extending corporate networks and applications while reducing costs and increasing flexibility. The example configuration shows a remote client (R1) connecting to a VPN server (R3) using IKE and IPsec to securely access resources on R3's network.
Solaris 10 workshop service management facilityBui Van Cuong
This document provides an overview and agenda for a Solaris 10 workshop on Service Management Facility (SMF). It introduces core SMF concepts like services, dependencies, and states. It explains how SMF provides a standardized way to define and manage services compared to previous Solaris methods. The document also outlines administrative SMF commands and how to migrate legacy services to SMF.
Consolidating Applications With Solaris Containersvaishal
This document discusses how Solaris containers can be used to consolidate applications by providing isolation and allocating resources. It explains that Solaris containers use zones and resource pools to partition a single Solaris operating system instance. Zones isolate applications by providing separate namespaces, while resource pools allocate CPU resources. The document demonstrates how an email server can be isolated with its own dedicated resource pool, while two web servers share another pool and are further isolated using shares allocated by the fair share scheduler.
solaris 10 administration training | solaris 10 training | solaris 10OnlineOracleTrainings
solaris 10 administration training course explores the key features,the capabilities of the Solaris 10 OS. Get benefits of Solaris 10 training with live example
Solaris 10 Administration Training Course Content
Introduction of Solaris 10 OS Directory Hierarchy
• Describe / (root) subdirectories
• Describe file components
• Describe types of Files
• Use hard links
Managing Local Disk Devices
• Describe the basic architecture of a disk
• Describe the naming conventions for devices
• List devices
• Reconfigure the devices
• Performing hard disk partitioning
• Manage disk labels
• Describing the Solaris Management Console
• Partition a disk by using the Solaris Management Console
Managing Solaris OS File Systems
• Describe Solaris OS file system
• Creating new ufs file system
• Check the file system using the fsck command
• Resolving file system inconsistencies
• Monitor file system use
Performing Mounts & Unmounts
• Identify mounting basics
• Performing mounts & unmounts
• Access a mounted CD ROM
• Restrict access to a mounted CD ROM
• Access a CD ROM without Volume Managements
This document provides an overview of the Solaris Service Management Facility (SMF). It describes SMF's motivation as providing a consistent framework for defining, managing, and delivering services. Key concepts discussed include the definition of a service, service states, service dependencies, and service identifiers. The document is divided into multiple parts that will cover SMF fundamentals, usage, advanced features and tools.
Solaris 10 10 08 what's new customer presentationxKinAnx
Solaris 10 10/08 provides several key updates and enhancements including:
1. A tested, integrated update to the operating system.
2. Improved ZFS enterprise features such as root and boot support, filesystem transfer capabilities, and delegated administration.
3. Support for new Intel processors and networking/I/O technologies.
4. Enhanced virtualization capabilities including Solaris Containers, Logical Domains, and support for the Xen hypervisor.
Solaris 10 10 09 what's new customer presentationxKinAnx
Solaris 10 10/09 includes tested updates, improvements to patching and installation speed, and enhancements to ZFS including user and group quotas and L2ARC caching on SSDs. It also features power management improvements through the Power Aware Dispatcher and optimization for Intel Nehalem processors. New in this release are datacenter-grade power management, platform support for additional Intel and AMD processors, and install and maintenance speed improvements.
Don't know if you noticed, but Linkedin has changed a lot lately. Here is a guide on how to master the new Linkedin features.
The full blog post with further details on www.juliussolaris.com
Solaris 10 workshop solaris 10 user commandsBui Van Cuong
This document provides a list of Solaris 10 user commands organized alphabetically from A to Z. It includes brief descriptions of common commands like acctcom, adb, addbib, admin, alias, apropos, ar, as, at, awk, bc, cal, cat, cc, cd, chgrp, chmod, chown, cmp, cp, cpio, csh, date, df, diff, du, echo, ed, env, ex, expand, expr, factor, false, fg, file, find, grep, ls, more, nice, nohup, od, paste, pr, printenv, printf, ps, pwd, rm, sed, sleep, sort, split
The document discusses AdaCore's product categorization and offerings for ARM platforms. It covers their native, safety critical, and cross development products that support various ARM Cortex processors and operating systems like Android and VxWorks. It describes their bareboard runtimes including the Zero Footprint, Ravenscar Small Footprint, and Ravenscar Extended variants. The document also lists the tools included with their ARM products like the IDEs, language interfacing tools, and analysis tools.
This document provides instructions for resetting a forgotten root password on a Solaris 10 server. It outlines booting the server from the CD-ROM and then 15 steps for resetting the password, concluding by rebooting the server after completing the steps. The author's name, MD. Budrul Hasan Bhuhiyan, is repeated between the sections.
This document provides an overview and instructions for installing the Solaris 9 operating system using various methods including the Solaris Web Start program, suninstall program, Custom JumpStart installation, and Solaris Flash installation feature. It covers planning tasks such as allocating disk space, gathering required information, preconfiguring system information, and preparing for network installations. Detailed procedures are provided for setting up installation servers and media, creating and validating Custom JumpStart profiles and rules files, and using Solaris Flash to create and install system archives.
Embedded programming in RTOS VxWorks for PROFIBUS VME interface cardRinku Chandolia
A project report submitted by Rutul Shelat B. and Rinku K. Chandolia for award of B.E. degree in Instrumentation and Control at GEC sec.-28 gandhinagar Gujarat (india) in 2013.
This document summarizes Solaris Operating System and virtualization technologies from Sun Microsystems. It discusses Solaris 10 and OpenSolaris releases, features of Solaris containers and logical domains for OS virtualization. It also covers Sun xVM virtualization portfolio including Solaris containers, logical domains, VirtualBox and xVM Server for server and desktop virtualization. xVM Ops Center 2.0 is introduced for managing heterogeneous datacenters.
Virtualization allows consolidation of servers to improve efficiency and reduce costs. It addresses challenges like high server maintenance costs, power and cooling expenses from datacenter sprawl, and limited space for physical expansion. Solaris virtualization technologies like containers, logical domains, and the xVM hypervisor enable consolidation while maintaining performance and security. They provide flexibility to adapt resource allocation to business needs and improve resilience against failures or disasters.
This document provides an overview and summary of the contents of an intermediate system administration training course for the Solaris 10 operating system. The course covers topics such as installing and upgrading Solaris, managing disk devices and file systems, performing package administration and patch management, configuring boot processes, and performing user administration. The document outlines course goals, topics that will and will not be covered, and provides an introduction section to help assess the reader's existing knowledge.
This document provides an overview of a Solaris 10 administration workshop presented by Peter Baer Galvin. The workshop covers a wide variety of Solaris 10 administration topics and is intended for experienced system administrators. It aims to help administrators learn about new features, avoid mistakes, and answer questions. The schedule, topics to be covered, and prerequisites are outlined.
TinyOS is an open source operating system designed for wireless sensor networks. It uses a component-based architecture and event-driven execution model to achieve low power consumption and memory footprint. TinyOS programs are built by wiring together components that provide and use interfaces to communicate through events and commands. It also uses a non-preemptive task scheduler and static memory allocation to improve efficiency for energy constrained sensor nodes. The nesC language extends C to support TinyOS's programming model and execution model.
The document discusses Solaris memory management. It describes Solaris' memory architecture including backing store, virtual memory system, and process memory allocation. It then discusses Solaris' memory management techniques, including swapping and demand paging. Demand paging loads pages of memory on demand to lower memory footprint and startup time, while swapping is used as a last resort. Memory is shared between processes and protected via virtual memory and page protections.
Wireless Communication And Mobile Network - ZigBeeXaver Y.R. Chen
The document discusses Zigbee wireless networks and Wireless Sensor Networks (WSNs). It provides details on:
1) What a WSN is and its applications in monitoring and controlling environments.
2) The technology requirements for WSNs including low cost, small size, low power consumption, and operating in unlicensed radio bands.
3) Standards for WSNs including IEEE 802.15.4, Zigbee, Bluetooth, and WiFi and their differences in features.
Solaris is a version of Unix developed by Sun Microsystems based on System V Unix. It has been widely used in enterprise environments. Learning Solaris involves understanding its design philosophy and basic commands before moving to more advanced topics. Some key commands include ps, df, and uname to check processes, disk space, and the OS version. Directories, files, and permissions can be managed using commands like mkdir, chown, chmod while groups and users are configured with useradd, groupadd, and usermod. Services are managed through SMF tools like svcadm rather than init scripts.
Positive Hack Days. Pavlov. Network Infrastructure Security AssessmentPositive Hack Days
A participant will acquire basic skills of searching for vulnerabilities on switches and routers from various vendors. The masterclass will cover both common network vulnerabilities, and exceptive cases that can be detected in the process of security assessment of real networks.
How To Install and Configure SNMP on RHEL 7 or CentOS 7VCP Muthukrishna
The document provides instructions on how to install and configure SNMP on RHEL 7. It describes downloading the required packages, editing the configuration file, opening the required port in the firewall, and testing SNMP queries locally and remotely. SNMP can be used to monitor devices and retrieve statistics on parameters like performance, usage, and storage. The three main versions of SNMP are also outlined, highlighting their features around security, querying, and remote configuration capabilities.
Firewalld is a system daemon that provides a dynamic firewall configuration for Linux systems. It simplifies firewall management by classifying network traffic into zones. Each network interface or packet source address is associated with a zone, and firewall rules are defined by zone. Firewalld interacts with the Linux netfilter subsystem to implement firewall rules. It supports both IPv4 and IPv6, as well as other protocols like Ethernet bridges. Firewall rules and configurations can be managed through command line tools, configuration files, or a graphical user interface. Firewalld aims to make firewall administration easier compared to lower-level tools like iptables.
Linux internet server security and configuration tutorialannik147
The document provides steps to secure a web server, including:
1. Reducing exposed network services by commenting out unused services in configuration files like /etc/initd.conf and restarting daemons;
2. Configuring firewall rules using iptables or ipchains to block unnecessary ports;
3. Removing unneeded users and network services from startup.
The SaltStack Pub Crawl - Fosscomm 2016effie mouzeli
SaltStack is an open source configuration management and orchestration tool. It allows users to provision, deploy, and manage infrastructure and applications across multiple cloud and virtual systems. SaltStack uses a master-minion architecture with a master server to control and manage minions (agent servers). Key features include remote execution, configuration management, orchestration abilities, and a communication bus to manage infrastructure at scale.
RAC-Installing your First Cluster and DatabaseNikhil Kumar
RAC - Installing your First RAC
Abstract : Oracle Real Application Clusters have been one of the hottest technologies in the market since 2001 prior this is know OPS in 8i. Oracle has brought revolution in the field of database by enhancing RAC technologies in it each version. This presentation will give introduction of RAC and features introduced in each version of RAC. This presentation contains the demo of building Oracle clusterware from the scratch. Also we will discuss the new components and its features during installation. This presentation and demo will be done on version 11GR2. Which will be used as a base for our next presentation Viz. Upgradation of RAC 11GR2 to 12C RAC.
This presentation will give brief insight information of RAC infrastructure setup. Sometimes DBA doesn’t fully aware of prerequisite and verification steps that needs to perform before installing clusterware, So this session will cover thing to consider before installing clusterware and best practices followed during the whole process.
Agenda
Introduction of RAC
Installation of Clusterware.
Creating diskgroup / Adding disk to Diskgroup using ASMCA.
Creation of ACFS Volume.
Installation of RAC Database using DBCA.
The document provides instructions for a lab on Snort and firewall rules. It describes:
1) Setting up the virtual environment and configuring networking on the CyberOps Workstation VM.
2) Explaining the differences between firewall and IDS rules while noting their similarities, such as both having matching and action components.
3) Having students run commands to start a malware server, use Snort to monitor traffic, and download a file from the server to trigger an alert, observing the alert in the Snort log.
This document describes the network configuration and management scripts used in Scientific Linux release 6.1. It discusses the main scripts and files used like /etc/rc.d/init.d/network, /etc/sysconfig/network, and /etc/sysconfig/network-scripts. It provides details on how the network script starts and stops network interfaces, and brings interfaces up at boot time using files in /etc/sysconfig/network-scripts. It also summarizes some of the functions available in the network-functions file.
UKOUG Tech17 - Stay Secure With Oracle SolarisJomaSoft
IT Security is more important than ever. Solaris 11 is installed "Secure by Default". Weak and modified configuration can be detected using the Security Compliance tool.
On SPARC Systems Buffer Overflows can be detected. The Virtualization Features increase the overall Security by Separation of Applications. This Session provides samples to allow you to learn how to use this Security Technologies.
cFrame is an open source automated platform for mobile network performance testing in both real and simulated RF environments. It provides distributed test bed automation allowing for reuse of existing hardware and software resources. The document outlines cFrame's features, test configurations, integration with tools like iPerf, and provides examples of automated test scripts and sample test plans.
The audit report summarizes a security audit performed on May 28, 2014. The audit found 2 vulnerabilities on 1 system, with no critical vulnerabilities. The most common vulnerabilities were related to TCP sequence number approximation and generic ICMP timestamp responses. To address these issues, patches need to be applied to disable ICMP timestamp responses and enable TCP MD5 signatures.
The audit report summarizes the results of a security audit performed on May 28, 2014. The scan found 2 vulnerabilities, with one being severe. The tcp-seq-num-approximation vulnerability was the most common and highest risk. The report provides details on the discovered systems, vulnerabilities found, and recommendations to address the tcp-seq-num-approximation and generic-icmp-timestamp vulnerabilities.
This document discusses performance aware software defined networking (SDN) using sFlow and OpenFlow. It describes how sFlow provides visibility into network performance by exporting packet samples and interface counters. When combined with OpenFlow's programmable control plane, sFlow and OpenFlow enable feedback control applications to monitor and control network performance in real-time. Examples given include using sFlow and OpenFlow for DDoS mitigation and load balancing large flows.
This document describes how to configure an OpenStack environment with Distributed Virtual Router (DVR) functionality using VirtualBox virtual machines. It includes details on setting up 3 VMs for the controller, network, and compute nodes, installing OpenStack using scripts, configuring IP addresses and users, replicating the compute node, and verifying the DVR installation and environment.
This document discusses network considerations for Real Application Clusters (RAC). It describes the different network types used, including public, private, storage, and backup networks. It discusses protocols like TCP and UDP used for different traffic. It also covers concepts like network architecture, layers, MTU, jumbo frames, and tools for monitoring network performance like netstat, ping, and traceroute.
The document discusses four OpenSolaris projects - Network Auto-Magic, Clearview, Brussels, and Crossbow - that aim to simplify and enhance network administration on the Solaris platform. Network Auto-Magic seeks to automate basic network configuration. Clearview aims to unify and enhance features across different network interfaces. Brussels looks to simplify network interface configuration and tuning. Crossbow integrates network interface virtualization and resource management.
The document discusses SUMA, a tool that automates the download of maintenance and technology levels from a fix server on AIX systems. It provides examples of using SUMA to list configuration settings, schedule periodic downloads of the latest fixes, and download specific fixes like APARs or filesets. SUMA allows flexibility in configuring fix types, actions, scheduling, logging and generating reports for download tasks.
This document provides information on configuring network multipathing (IPMP) in Oracle Solaris to provide network interface failover and increased throughput. It describes how IPMP uses multiple network interfaces connected to the same subnet and monitors them to detect failures and reroute traffic to functioning interfaces. The document provides details on IPMP requirements, interface failure detection, and provides steps for configuring IPMP using configuration files and commands like ifconfig to add interfaces to a multipath group and assign test addresses for failure monitoring.
SaltConf14 - Ben Cane - Using SaltStack in High Availability EnvironmentsSaltStack
An overview on the benefits and best practices of using SaltStack for consistency and automation in highly available enterprise environments such as financial services.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
3. Ինչ կստանաք այս դասընթացի արդյունքում
Ինֆորմացիա Solaris10 համակարգի նոր և առաջադեմ
հնարավորությունների մասին
Նոր փորձ
Նոր ծանոթություններ և ընկերներ
3
4. Ինչ նոր գիտելիքներ ձեռք կբերեք
SMF ծառայության հիմունքները Solaris10 համակարգում
Ինչպես միացնել, անջատել և վերաբեռնավորել ծառայությունները
IPMP և Link Aggregation տեխնոլոգիաների մասին սկզբնական
գիտելիքներ
Որ դեպքերում են օգտագործվում այս տեխնոլոգիաները
Ինչպես կոնֆիգուրացնել IPMP և Link Aggregation տեխնոլոգիաները
Solaris Zone-ի առավելությունները
Ինչ խնդիրների լուծման համար կարող է օգտագործվել
Ինչպես ստեղծել և կոնֆիգուրացնել
4
6. SMF Features
Services are represented as first-class objects that can be viewed and managed.
Failed services are automatically restarted in dependency order.
More information is available about misconfigured or misbehaving services.
Problems during the boot process are easier to debug.
Snapshots of service configurations are taken automatically,.
Services can be enabled and disabled using a supported tool.
Administrators can securely delegate tasks to non-root users more easily.
Large systems boot faster by starting services in parallel according to their dependencies.
6
9. Enabling and disabling services
Old method SMF method
mv /etc/rc2.d/S75cron /etc/rc2.d/x.S75cron svcadm disable system/cron:default
edit /etc/inet/inetd.conf, uncomment the finger line svcadm enable network/finger:default
9
Stopping, starting, and restarting services
Old method SMF method
/etc/init.d/sshd stop svcadm disable -t network/ssh:default
/etc/init.d/sshd start svcadm enable -t network/ssh:default
/etc/init.d/sshd stop; /etc/init.d/sshd start svcadm restart network/ssh:default
kill -HUP `cat /var/run/sshd.pid` svcadm refresh network/ssh:default
10. Discovering What's Going Wrong
10
[ network/ntp:default starting (network time protocol (NTP)) ]
Oct 25 13:58:42/49 ERROR: svc:/network/ntp:default:
Method "/lib/svc/method/xntp" failed with exit status 96.
Oct 25 13:58:42 svc.startd[4]: svc:/network/ntp:default:
Method "/lib/svc/method/xntp" failed with exit status 96.
[ network/ntp:default misconfigured (see 'svcs -x' for details) ]
# svcs -x
svc:/network/ntp:default (Network Time Protocol (NTP).)
State: maintenance since Mon Oct 18 13:58:42 2004
Reason: Start method exited with $SMF_EXIT_ERR_CONFIG.
See: http://sun.com/msg/SMF-8000-KS
See: ntpq(1M)
See: ntpdate(1M)
See: xntpd(1M)
Impact: 0 services are not running.
11. Log Files
The log files are located in /var/svc/log/ directory.
The log file name is based on the short form of FMRI, with “/”s replaced by “-”s.
Example:
Log file for the svc:/network/ntp:default is var/svc/log/network-ntp:default
12. Observing Services
12
% svcs -p network/smtp:sendmail
STATE STIME FMRI
online 18:20:30 svc:/network/smtp:sendmail
18:20:30 655 sendmail
18:20:30 657 sendmail
% ps –fp 655,657
UID PID PPID C STIME TTY TIME CMD
root 655 1 0 18:21:05 ? 0:00 /usr/lib/sendmail -bd -q15m
smmsp 657 1 0 18:21:05 ? 0:00 /usr/lib/sendmail -Ac -q15m
The "-p" option shows all the processes associated with a service:
13. Observing Services
13
The "-d" option shows what other services this service depends on, and the "-D" option shows
what other services depend on this service:
% svcs -d network/smtp:sendmail
STATE STIME FMRI
online 18:20:14 svc:/system/identity:domain
online 18:20:26 svc:/network/service:default
online 18:20:27 svc:/system/filesystem/local:default
online 18:20:27 svc:/milestone/name-services:default
online 18:20:27 svc:/system/system-log:default
online 18:20:30 svc:/system/filesystem/autofs:default
% svcs -D network/smtp:sendmail
STATE STIME FMRI
online 18:20:32 svc:/milestone/multi-user:default
15. IPMP Features
Eliminates a single network adapter as a single point of failure in case of:
Network adapter failure
Network link failure
Enables interfaces to fail over within approximately 10
Can be configured by adjusting the parameters in the
/etc/default/mpathd file
Can be configured for use with both IPv4 and IPv6
Enables interfaces to be configured as standby interfaces
15
16. IPMP Failure Detection
Probe based failure detection:
Detects network error by sending ICMP ECHO_REQUEST messages
Link based failure detection:
Detects network error by checking the IFF_RUNING
16
17. Probe Based IPMP Requirements
17
Probe Based
IPMP
The Solaris 8 10/00
OS, as a minimum,
must be installed.
Unique MAC
addresses must be
configured on each
network interface.
Multiple network
adapter interfaces
must be connected on
each subnet.
An IPMP group
name must be
assigned to the
group of interfaces.
A test address is
assigned to an
interface.
Additional hosts or
devices must exist on
the same subnet.
18. Configuring Probe-Based IPMP
18
1 • Verify the Solaris OS release.
2 • Configure unique MAC addresses.
3 • Configure IP addresses.
4 • Configure one interface as part of an IPMP group.
5 • Configure a test address for the first interface.
6 • Configure a second interface as part of the same IPMP group.
7 • Configure a test address for the second interface.
8 • View the interface configuration.
19. Configuring Probe-Based IPMP
19
# cat /etc/release
Solaris 10 11/06 s10s_u3wos_10 SPARC
Copyright 2006 Sun Microsystems, Inc. All Rights Reserved.
Use is subject to license terms.
Assembled 14 November 2006
# eeprom "localmacaddress?=true”
# ifconfig eri0 10.5.0.11 netmask + broadcast + up
# ifconfig eri0 group mptest1
# ifconfig eri0 addif 10.5.0.61 netmask + broadcast + -failover deprecated up
# ifconfig qfe2 10.5.0.21 netmask + broadcast + group mptest1 up
# ifconfig qfe2 addif 10.5.0.71 netmask + broadcast + -failover deprecated up
# ifconfig -a
20. Configuring Probe-Based IPMP using
configuration files
20
# cat /etc/hostname.eri0
10.5.0.11 netmask + broadcast + group mptest1 up
addif 10.5.0.61 netmask + broadcast + -failover
deprecated up
# cat /etc/hostname.qfe2
10.5.0.21 netmask + broadcast + group mptest1 up
addif 10.5.0.71 netmask + broadcast + -failover
deprecated up
# init 6
21. Link-Based IPMP Requirements
21
Link-Based
IPMP
Solaris 9 12/02
OS, at a minimum,
must be installed.
Network interfaces
must use any of the
following drivers:
hme, eri, ce, ge,
bge, qfe, dmfe
Unique MAC
addresses must be
configured on each
of the interfaces.
An IPMP group
name must be
assigned to
interfaces
22. Configuring Link-Based IPMP
22
1 • Verify the Solaris OS release.
2 • Configure unique MAC addresses.
3 • Define IP addresses.
4 • Configure the interfaces.
5 • View the interface configuration
23. Configuring Link-Based IPMP
23
# cat /etc/release
Solaris 10 11/06 s10s_u3wos_10 SPARC
Copyright 2006 Sun Microsystems, Inc. All Rights Reserved.
Use is subject to license terms.
Assembled 14 November 2006
# eeprom "localmacaddress?=true”
# ifconfig eri0 10.5.0.11 netmask + broadcast + group lgrp up
# ifconfig hme0 10.5.0.21 netmask + broadcast + group lgrp up
# ifconfig -a
24. Configuring Link-Based IPMP Using
Configuration Files
24
# cat /etc/hostname.eri0
10.5.0.11 netmask + broadcast + group mptest1 up
# cat /etc/hostname.hme0
10.5.0.21 netmask + broadcast + group mptest1 up
# init 6
25. Configuring IPMP Parameters
25
# cat /etc/default/mpathd
#pragma ident "@(#)mpathd.dfl 1.2 00/07/17 SMI"
#
# Time taken by mpathd to detect a NIC failure in ms. The minimum time
# that can be specified is 100 ms.
#
FAILURE_DETECTION_TIME=10000
#
# Failback is enabled by default. To disable failback turn off this
option
#
FAILBACK=yes
#
# By default only interfaces configured as part of multipathing groups
# are tracked. Turn off this option to track all network interfaces
# on the system
#
TRACK_INTERFACES_ONLY_WITH_GROUPS=yes
27. Features of Link Aggregations
Increased bandwidth – The capacity of multiple links is combined into one logical link
Automatic failover/failback – Traffic from a failed link is failed over to working links in
the aggregation
Load balancing – Both inbound and outbound traffic is distributed according to user
selected load-balancing policies, such as source and destination MAC or IP addresses
Support for redundancy – Two systems can be configured with parallel aggregations.
Improved administration – All interfaces are administered as a single unit
Less drain on the network address pool – The entire aggregation can be assigned
one IP address
27
28. Link Aggregation Basics
For systems that run an application with distributed heavy traffic
For sites with limited IP address space that nevertheless require large amounts of
bandwidth
For sites that need to hide the existence of internal interfaces
28
You may use link aggregation in the following situations:
30. Policies and Load Balancing
L2 – Determines the outgoing link by hashing the MAC (L2) header of
each packet
L3 – Determines the outgoing link by hashing the IP (L3) header of
each packet
L4 – Determines the outgoing link by hashing the TCP, UDP, or other
ULP (L4) header of each packet
30
31. Requirements for Link Aggregation
31
Link
Aggregation
You must use the
dladm command to
configure
aggregations.
An interface that has
been plumbed
cannot become a
member of an
aggregation.
Interfaces must be
of the GLDv3 type:
xge, e1000g, nge,
rge, ixrgb and bge. All interfaces in the
aggregation must
run at the same
speed and in full-
duplex mode.
You must set the
value for MAC
addresses to “true”
in the EEPROM
parameter local-
mac-address?
32. How to Create a Link Aggregation
32
1
• Assume the Primary Administrator role, or become superuser.
2
• Determine which interfaces are currently installed on your system.
3
• Determine which interfaces have been plumbed.
4
• Create an aggregation.
5
• Configure and plumb the newly created aggregation.
6
• Check the status of the aggregation you just created.
33. How to Create a Link Aggregation
33
% su root
# dladm show-link
ce0 type: legacy mtu: 1500 device: ce0
ce1 type: legacy mtu: 1500 device: ce1
bge0 type: non-vlan mtu: 1500 device: bge0
bge1 type: non-vlan mtu: 1500 device: bge1
bge2 type: non-vlan mtu: 1500 device: bge2
# ifconfig -a
lo0: flags=2001000849 <UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL> mtu
8232 index 1
inet 127.0.0.1 netmask ff000000
ce0: flags=1000843 <UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 2
inet 192.168.84.253 netmask ffffff00 broadcast
192.168.84.255 ether 0:3:ba:7:84:5e
# dladm create-aggr -d bge0 -d bge1 1
# ifconfig aggr1 plumb 192.168.84.14 up
34. How to Create a Link Aggregation(continuing)
34
# dladm show-aggr
device address speed duplex link state
bge0 0:3:ba:7:b5:a7 1000 Mbps full up attached
bge1 0:3:ba:8:22:3b 0 Mbps unknown down standby
key: 1 (0x0001) policy: L4 address: 0:3:ba:7:84:5e (auto)
# ifconfig -a
lo0: flags=2001000849 <UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL> mtu 8232
index 1
inet 127.0.0.1 netmask ff000000
ce0: flags=1000843 <UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 2
inet 192.168.84.253 netmask ffffff00 broadcast
192.168.84.255 ether 0:3:ba:7:84:5e
aggr1: flags=1000843 <UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 3
inet 192.168.84.14 netmask ff000000 broadcast
192.255.255.255
ether 0:3:ba:7:84:5e
36. Zones Overview
The Solaris Zones partitioning technology is used to:
• Virtualize operating system services
• Provide an isolated and secure environment for running applications.
A zone is:
• A virtualized operating system environment created within a single
instance of the Solaris10 OS.
• An application execution environment in which processes are
isolated from the rest of the system.
Isolation prevents processes that are running in one zone
from monitoring or affecting processes that are running in
other zones.
36
38. Two Types of Zones
Global Zone
Is assigned ID 0 by the system
Provides the single instance of the Solaris kernel
Contains a complete installation of the Solaris system software packages
Can contain additional software packages or additional software
Holds configuration information specific to the global zone only
Is the only zone that is aware of all devices and all file systems
Is the only zone with knowledge of non-global zone existence and configuration
Is the only zone from which a non-global zone can be configured, installed,
managed, or uninstalled
38
39. Two Types of Zones
Non-Global Zone
Is assigned a zone ID by the system when the zone is booted
Shares operation under the Solaris kernel booted from the global zone
Contains an installed subset of the complete Solaris10 OS software
packages
Can contain additional installed software packages
Is not aware of the existence of any other zones
Cannot install, manage, or uninstall other zones, including itself
Has configuration information specific to that non-global zone only
Can have its own time zone setting
39
40. Creating а New Zone
1
• Enter the zone configuration tool by using the zonecfg command.
2
• Create a new zone definition with the create command.
3
• Assign the zone to a file system, using the set zonepath command.
4
• Use set autoboot command to make zone boot automatically.
5
• Configure networking parameters, using the add net command and its subcommands.
6
• Verify the configuration is syntactically correct, using the verify command.
7
• Write the in-memory configuration to stable memory, using the commit command.
8
• Install the zone, using the zoneadm command.
9
• Boot the zone, using the zoneadm boot command.
10
• Log on to the zone Console using the zlogin command
40
41. Creating а New Zone
41
# zonecfg -z email-zone
email-zone: No such zone configured
Use 'create' to begin configuring a new zone.
zonecfg:email-zone> create
zonecfg:email-zone> set zonepath=/export/home/zones/email-zone
zonecfg:my-zone> set autoboot=true
zonecfg:email-zone> add net
zonecfg:email-zone:net> set address=10.0.0.1
zonecfg:email-zone:net> set physical=eri0
zonecfg:email-zone:net> end
zonecfg:email-zone> verify
zonecfg:email-zone> commit
zonecfg:email-zone> exit
# zoneadm -z email-zone install
Preparing to install zone email-zone
Creating list of files to copy from the global zone.
[Some output was omitted here for brevity]
Zone email-zone is initialized.
# zoneadm -z email-zone boot
# zlogin -C email-zone