HP Visualize J210XC IRIX to HP-UX Migration Guide - Page 67

Enabling bootp and tftp

Page 67 highlights

Configuring TCP/IP 3. Make sure /etc/inetd.conf is owned by user root and group other, and make sure its permissions are set to 0444 (r--r--r--). For more information, type man 4 inetd.conf or man 1M inetd. Editing the /var/adm/inetd.sec File The /var/adm/inetd.sec file is a security file that inetd reads to determine which remote hosts are allowed access to the services on your host. The inetd.sec file is optional; you do not need it to run the Internet Services. You can use either a text editor or SAM to edit the inetd.sec file. 1. If the /var/adm/inetd.sec file does not exist on your host, copy /usr/newconfig/var/adm/inetd.sec to /var/adm/inetd.sec. Create one line in inetd.sec for each service to which you want to restrict access. Do not create more than one line for any service. Each line in the /var/adm/inetd.sec file has the following syntax: service_name {allow | deny} host_specifier [host_specifier...] where service_name is the first field in an entry in the /etc/inetd.conf file, and host_specifier is a host name, IP address, IP address range, or the wildcard character (*). 2. Make sure the /var/adm/inetd.sec file is owned by user root and group other, and make sure its permissions are set to 0444 (-r--r--r--). The following are example lines from an inetd.sec file: login allow 10.* shell deny vandal hun tftp deny * The first example allows access to rlogin from any IP address beginning with 10. The second example denies access to remsh and rcp from hosts vandal and hun. The third example denies everyone access to tftp. Only the services configured in /etc/inetd.conf can be configured in /var/adm/inetd.sec. Enabling bootp and tftp 1. Start SAM: # sam 2. Select Networking and Communications. 3. Select Network Services. 4. Select Bootp. 5. Choose Actions->Enable. 6. Select TFTP. 7. Choose Actions->Enable. 62

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125

Configuring TCP/IP
62
3.
Make sure
/etc/inetd.conf
is owned by user
root
and group
other
, and make sure its permissions are
set to
0444
(r--r--r--).
For more information, type
man 4 inetd.conf
or
man 1M inetd
.
Editing the /var/adm/inetd.sec File
The
/var/adm/inetd.sec
file is a security file that
inetd
reads to determine which remote hosts are allowed
access to the services on your host. The
inetd.sec
file is optional; you do not need it to run the Internet
Services.
You can use either a text editor or SAM to edit the
inetd.sec
file.
1.
If the
/var/adm/inetd.sec
file does not exist on your host, copy
/usr/newconfig/var/adm/inetd.sec
to
/var/adm/inetd.sec
.
Create one line in
inetd.sec
for each service to which you want to restrict access. Do not create more
than one line for any service. Each line in the
/var/adm/inetd.sec
file has the following syntax:
service_name
{allow | deny}
host_specifier
[
host_specifier
...]
where
service_name
is the first field in an entry in the
/etc/inetd.conf
file, and
host_specifier
is a host
name, IP address, IP address range, or the wildcard character (
*
).
2.
Make sure the
/var/adm/inetd.sec
file is owned by user
root
and group
other
, and make sure its
permissions are set to
0444
(-r--r--r--).
The following are example lines from an
inetd.sec
file:
login allow 10.*
shell deny vandal hun
tftp deny *
The first example allows access to
rlogin
from any IP address beginning with
10
. The second example
denies access to
remsh
and
rcp
from hosts
vandal
and
hun
. The third example denies everyone access to
tftp
. Only the services configured in
/etc/inetd.conf
can be configured in
/var/adm/inetd.sec
.
Enabling bootp and tftp
1.
Start SAM:
# sam
2.
Select
Networking and Communications
.
3.
Select
Network Services
.
4.
Select
Bootp
.
5.
Choose
Actions->Enable
.
6.
Select
TFTP
.
7.
Choose
Actions->Enable
.