Skip to content

Instantly share code, notes, and snippets.

$ php -r "system('sudo -u root mplayer /tmp/1.wav');";
We trust you have received the usual lecture from the local System
Administrator. It usually boils down to these three things:
#1) Respect the privacy of others.
#2) Think before you type.
#3) With great power comes great responsibility.
[sudo] password for sun:
freenas# df -h
Filesystem Size Used Avail Capacity Mounted on
/dev/ufs/FreeNASs1a 458M 399M 22M 95% /
devfs 1.0K 1.0K 0B 100% /dev
/dev/md0 4.4M 2.3M 1.8M 56% /etc
/dev/md1 686K 8.0K 624K 1% /mnt
/dev/md2 75M 14M 55M 20% /var
/dev/ufs/FreeNASs4 20M 336K 18M 2% /data
/dev/ufs/aviccs 223G 4.0K 205G 0% /mnt/aviccs
freenas#
Dell Inc www.dell.com PowerEdge R310
bIOs version 1.6.4
Service Tag: 66Y9....... Asset Tag:
Boot Settings ...................<Enter>
+------------------------------------------------+ POPupwindow
Boot mode BIOS
Linux www 2.6.18-238.12.1.e15 #1 SMP The May 31.... X86_64
cat ifcfg-eth0:
device=eth0
bootproto=dhcp
hwaddr=mac address
ipv6init=yes
iv6_autoconf=yes
onboot=yes
dhcp_hostname=www
## Last changed: 2011-06-23 22:40:44 UTC
version 10.0R3.10;
system {
root-authentication {
encrypted-password "__is_this_safe_to_provide__?___";
}
name-server {
208.67.222.222;
208.67.220.220;
}
> system-services Type of incoming system-service traffic to accept
[edit]
root@srx210# set security zones security-zone trust interfaces ge-0/0/0 host-inbound-traffic system-services ping
[edit]
root@srx210# commit
[edit security zones security-zone untrust]
'interfaces ge-0/0/0.0'
Interface ge-0/0/0.0 already assigned to another zone
error: configuration check-out failed
Generated Configuration (Route-based):
## Configure interface IP and route for tunnel traffic
set interfaces st0.0 family inet address 192.168.1.0/24
set routing-options static route 192.168.2.0/24 next-hop st0.0
set routing-options static route 192.168.3.0/24 next-hop st0.0
set routing-options static route 192.168.4.0/24 next-hop st0.0
## Configure security zones, assign interfaces to the zones & host-inbound services for each zone
set security zones security-zone vpn interfaces st0.0
Generated Configuration (Route-based):
## Configure interface IP and route for tunnel traffic
set interfaces st0.0 family inet address 10.2.2.2/24
set routing-options static route 192.168.1.0/24 next-hop st0.0
set routing-options static route 192.168.3.0/24 next-hop st0.0
set routing-options static route 192.168.4.0/24 next-hop st0.0
## Configure security zones, assign interfaces to the zones & host-inbound services for each zone
set security zones security-zone vpn interfaces st0.0
Generated Configuration (Route-based):
## Configure interface IP and route for tunnel traffic
set interfaces st0.0 family inet address 10.2.2.2/24
set routing-options static route 192.168.1.0/24 next-hop st0.0
set routing-options static route 192.168.3.0/24 next-hop st0.0
set routing-options static route 192.168.4.0/24 next-hop st0.0
## Configure security zones, assign interfaces to the zones & host-inbound services for each zone
set security zones security-zone vpn interfaces st0.0
http://docs.fedoraproject.org/en-US/Fedora/13/html/Security_Guide/sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration.html
1)
cat /etc/sysconfig/network-scripts/ifcfg-vpn
ONBOOT=yes
IKE_METHOD=PSK
DSTGW=10.2.2.1
SRCGW=10.2.2.1
DSTNET=10.2.2.0/24
SRCNET=10.2.2.1/24