format a20Col table_name format a30Select value from v \\$ parameter where;Exit;End'
If [-z "$ TAB_OWNER"]; thenEcho "no object exists, please check again"Exit 0ElseEcho $ TAB_OWNERFi
Let's first implement similar functions of show alert.We can define an alias at the system level.Alias cdt = 'cd' ksh ~ /Cdt. sh''
$ Pwd/Home/ora11g$ Cdt$ Pwd/U02/dg11g/diag/rdbms/dg11g/DG11G/trace
In this case, you can view the trace logs and alert logs.A few more aliases are used,For example, you need to go to t
downloaded from Ftp: // ftp.navya.com/pub/vikas. The downloaded file is often compressed format (such as: xtacacsd-4_1_2_tar.gz), save the downloaded file to a specific directory, such as/usr, and then decompress.
# Gunzip xtacacsd-4_1_2_tar.gz
# Tar xvf xtacacsd-4_1_2_tar
2. xtacacsd compilation and Installation
First go to the/usr/xtacacsd-4.1.2 directory,
Then, modify the statements in the Makefile file:
......
MYLIBS =-lcrypt
......
BINDIR =/var/adm/tacacs; directory where xtaca
the CLI session, enter [Exit].
>?
Exec commands:
Enable Turn on privileged commands
Exit Exit from the EXEC
Help Description of the interactive help system
Ping Send echo messages
Session Tunnel to module
Show Show running system information
Terminal Set terminal line parameters
> Enable
#
# Conft
Enter configuration commands, one per line. End with CNTL/Z
(Config )#?
Configure commands:
Address-violation Set address violation action
Back-pressure Enable back pressure
Banner Define a login bann
advantage of using snapshots is that you can back up data at any time.8. Local hard disk backup Vs. Network BackupNetwork Backup may put pressure on network I/O devices. Like hard disk I/O devices, using a network to transmit a large amount of data can also cause some problems. When network backup is considered, the backup creation time varies depending on different situations. The best way is to back up the hard disk to the local server. After the backup is complete, copy it to the tape for ar
You may want to reduce the scope of each database by considering caching.Cache is divided into persistent cache, time cache, and dependent cache.1. Persistent cacheif (cache["Cache"]!=null){ }else{Cache.Insert ("Cache", "Test");}2. Time Cache. Time Expiration Cache Auto Emptyif (cache["Cache"]!=null){}else{The third parameter is basically a null time of seconds. The following indicates that the cache is emptied after 10 seconds.Cache.Insert ("Cache", "Test", Null,datetime.now.addseconds (Ten),
to download the entire CRL. is able to receive requests to check certificate revocation status, which increases the speed of certificate revocation status checks, reduces network bandwidth, and enhances scalability and fault tolerance by enabling array configurations for online transponders.
Public key-based applications and services. This is related to applications and services that support public key cryptography, in other words, applications and services must be able to support public key
current configuration information (Information in RAM) 51cto # show startup-config \ view the information of the saved disk (Information in NVRAM) 51cto # show ip route \ view route table information 51cto # show cdp neighbors \ check which cisco devices are connected to this vro 51cto # erase startup-config \ recover the vro to the factory configure 51cto # reload \ restart vro password recovery 1 start up press Ctrl + Break2 run confreg 0x21423 run
Configure snmp for Cisco devices 1. Configure IOS devices (routers) config terminal enter global configuration status Cdp run enable CDPsnmp-server community gsunion ro configure the read-only string of this vro as gsunionsnmp-server community gsunion rw configure the read/write string of this vro as gsunionsnmp-server enable traps allow the router to send all types of SNMP traps to www.2cto.com snmp-server host IP-address-server traps trapcomm. Speci
Arm supports 16 coprocessors. During program execution, each coprocessor ignores commands belonging to the ARM processor and other coprocessors. When a coprocessor hardware cannot execute commands belonging to her coprocessor, an undefined exception interrupt occurs. In the exception Interrupt Processing Program, the hardware operation can be simulated by software. For example, if the system does not contain the vector floating point generator, you can select a floating-point computing software
Access-enable allows the router to create a temporary access list entry in the dynamic access list
Access-group: Apply the access control list (ACL) to the interface.
Access-List defines a standard IP ACL
Access-template manually replaces the temporary access list entry on the connected vro
Appn sends commands to the Appn Subsystem
ATM sig executes ATM signaling commands
B. Manually boot the Operating System
Bandwidth: Set the bandwidth of the interface.
Banner motd
Bfe emergency manual mode
Boo
high. The advantage of using snapshots is that you can back up data at any time.
8. Local hard disk backup Vs. Network BackupNetwork Backup may put pressure on network I/O devices. Like hard disk I/O devices, using a network to transmit a large amount of data can also cause some problems. When network backup is considered, the backup creation time varies depending on different situations. The best way is to back up the hard disk to the local server. After the backup is complete, copy it to the
state active bridge 0x0 stp IBM
Set vlan 1003 name token-ring-default type trcrf mtu 1500 said 101003 state active parent 0 ring 0x0 mode rbaremaxhop 7 stemaxhop 7
!
# Set boot command
Set boot config-register 0x102
Set boot system flash bootflash: cat5000-sup3.4-3-1a.bin
!
# Module 1: 2-port 1000 BaseLX Supervisor
Set module name 1
Set vlan 1 1/1-2
Set port enable 1/1-2
!
# Module 2: empty
!
# Module 3: 24-port 10/100 BaseTX Ethernet
Set module name 3
Set module enable 3
Set vlan 1 3/1-22
Set
continue tracing as follows:
Ipv9se> (enable) show cdp nei 3/11*-Indicates vlan mismatch.#-Indicates duplex mismatch.Port Device-ID Port-ID Platform----------------------------------------------------------------------------3/11 Cisco2924 GigabitEthernet1/1 cisco WS-C2924M-XL
This command shows that the Peer device is a Cisco2924 device. If it is not displayed, it indicates that the device is connected to another manufacturer and may need to be trace
Pen name is also large, the motto of the gameToday it is the command of the Cisco switch which is the practice of the work operation, I feel that sometimes it may be necessary to trace the port of which the MAC address belongs to the switching device, and to determine the object quickly, I share my exercise to the lovers who need it.The first thing you need to know is the IP address and account password of the core switch device of your organization.Example: Core switch ip:192.168.11.1, Account:
port of the switch is PORT5650) this.width=650; "src=" Http://s1.51cto.com/wyfs02/M01/7C/EF/wKiom1bcwEiyhtt7AAAiOYuh6w0678.png "title=" Qq20160307074019.png "alt=" Wkiom1bcweiyhtt7aaaioyuh6w0678.png "/>3. Query the device to which the interface is docked according to GIGABITETHERNET0/5Run Switch#show CDP neighbors gigabitethernet 0/5Show more detailed information: Switch#show CDP neighbors gigabitethernet
br972 # port no Mac addr is local? Ageing Timer # 2 00:02:b3:ce:f6:0f no 11.69 # 1 00:04:23:ab:99:d8 Yes 0.00 # 2 00:04:23:ab:99:d9 Yes 0.00 # 1 00:0a:8b:bf:70:40 No 1 1.69 # you ' re moreor less done with the Linux side of things.
Now # You can set up your firewall rules.
--------Cisco IOS config bits (in were wondering):----------conf t vlan 970-973! int GI3/1 No IP address switchport switchport trunk encapsulation dot1q switchport trunk allowed VLAN 970,972 SWITCHP
ORT mode
node
i2c6@50{
compatible = "SAMSUNG,XXXX-I2C";
reg=Interrupts=};
(vi) Property
Selection of MSM Device tree
High-throughput platform DTS has two very important IDs, one is the Msm-id configuration chipset ID, the ID is after the boot
The XBL is read by the hardware register.
The other is Board-id, which is used to represent platform and subtype.
PLATFORM_ID:
Bits 31-24 = Platform subtype ID
Bits 23-16 = Platform Version (Major)
Bits 15-8 = Platform Version (Minor)
Bits 7-0 = Pla
Java.util.Iterator;
public class Datagramrecvsender_b extends DataswaplisteneradapterImplements Runnable {public static final int datagramport = 10698;Private Java.net.DatagramSocket Road;Private InetAddress IA;Datagrampacket DP;public static final int datagram_length = 8192;Private Datapacket CDP;Private Boolean ishandling = true;
Dataswapevent dsevent;/*** This constructor is used to receive datagrams.*/Public Datagramrecvsender_b () {try {System.o
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.