Wednesday, June 6, 2018

Change Cert mode to Working Mode Alcatel6400

Change Cert mode to Working Mode

copy certified working
reload working no rollback timeout

REBOOT

Tuesday, June 5, 2018

Huawei S5700 Basic Command

:system view

system-view
or
sys

:show all config

dis current-configuration

:create vlan

vlan vlan_number

:show ip interface

display ip interface brief

:add ip route

ip route-static 0.0.0.0 0.0.0.0 Vlanif39 10.10.39.1

: create ip interface

interface vlanif vlan_num
-> ip address x.x.x.x 255.255.255.x

:add vlan member to interface

interface GigabitEthernet0/0/2
-> port link-type access
-> port default vlan 31

or

int gig0/0/2
-> port link-type access
-> port default vlan 31

:Create Port trunk 

interface GigabitEthernet0/0/1
-> port link-type trunk
-> port trunk allow-pass vlan 31 39

or

int Gig0/0/1
-> port link-type trunk
-> port trunk allow-pass vlan 31 39

--add all vlan

interface GigabitEthernet0/0/1
-> port link-type trunk
-> port trunk allow-pass all

or

int Gig0/0/1
-> port link-type trunk
-> port trunk allow-pass vlan all


:create ssh remote

rsa local-key-pair create

user-interface vty 0 4
-> authentication-mode aaa
-> protocol inbound ssh

stelnet server enable

aaa
-> local-user USERNAME password cipher PASSWORD
-> local-user USERNAME privilege level 15
-> local-user USERNAME service-type ssh|telnet|terminal|http

ssh user USERNAME
ssh user USERNAME authentication-type password
ssh user USERNAME service-type stelnet|sftp|all

:enable ip Helper

ENABLED per VLAN interface


dhcp enable

Vlanif2100
 dhcp select relay
 dhcp relay server-ip DHCP_SERVER_IP_ADDRESS

Vlanif2101
 dhcp select relay
 dhcp relay server-ip DHCP_SERVER_IP_ADDRESS

:Huawei S5720 Switch AAA administrator password it gets the error: “the password has appeared in recent 5 times”

aaa
local-aaa-user password policy administrator
password history record number 0

:ospf
Loopback ip 10.9.9.9 

int LoopBack 0
-> ip address 10.9.9.9 255.255.255.255

router id 10.9.9.9
ospf
area 0
network x.x.x.x x.x.x.x <------ wildcard

:disable spaning tree
stp disable

:exit

q

:save config 
save
















Tuesday, April 10, 2018

Huawei S5720 IP helper Configuration

ENABLED by VLAN interface

#
dhcp enable
#
Vlanif2100
 dhcp select relay
 dhcp relay server-ip 10.100.100.10
#
Vlanif2101
 dhcp select relay
 dhcp relay server-ip 10.100.100.10
#
------------ END ------------

Monday, March 19, 2018

Fix Error Ubuntu 'Host SMBus controller bus not enabled', 'no valid rapl domains found in package'

'Piix4_SMBus: 000:00:07.3: Host SMBus controller bus not enabled'
'no valid rapl domains found in package'

mount -o remount,rw /

vi /etc/modprobe.d/blacklist.conf

blacklist intel_rapl
blacklist i2c-piix4

Tuesday, February 27, 2018

VMware PowerCLI : Search VMguest by MAC Address_IP Address

LIST IP VMware Service:
Get-VMHostNetworkAdapter | select ip, name, vmhost, portgroupname

Search VMguest by MAC Address:
Get-VM | Get-NetworkAdapter| Where-Object {$_.MacAddress -eq "00:50:56:8e:fd:4b"}

Search VMguets by IP Address
Get-VM | Where-Object {$_.guest.IPAddress[0] -eq "192.168.1.1"}

Monday, February 26, 2018

BAN ip list by iptables

BAN ip by iptables

-- Create banlist.txt
root@hosting:/home/hunzo/script# more banlist.txt                                           
104.131.147.112
216.244.66.198
216.244.66.239
216.244.66.205
46.229.168.0/24
54.36.148.0/24
54.36.149.0/24
163.172.71.0/24

-- Check iptables rules

root@hosting:/home/hunzo/script# iptables -L -v -n
Chain INPUT (policy ACCEPT 322K packets, 19M bytes)
 pkts bytes target     prot opt in     out     source               destination       

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination       

Chain OUTPUT (policy ACCEPT 125K packets, 742M bytes)
 pkts bytes target     prot opt in     out     source               destination       

-- Create Script
root@hosting:/home/hunzo/script# ban=$(more banlist.txt)                                   
root@hosting:/home/hunzo/script# for i in $ban; do echo iptables -A INPUT -s $i -j DROP ; done
iptables -A INPUT -s 104.131.147.112 -j DROP
iptables -A INPUT -s 216.244.66.198 -j DROP
iptables -A INPUT -s 216.244.66.239 -j DROP
iptables -A INPUT -s 216.244.66.205 -j DROP
iptables -A INPUT -s 46.229.168.0/24 -j DROP
iptables -A INPUT -s 54.36.148.0/24 -j DROP
iptables -A INPUT -s 54.36.149.0/24 -j DROP
iptables -A INPUT -s 163.172.71.0/24 -j DROP

-- exec script
root@hosting:/home/hunzo/script# for i in $ban; do iptables -A INPUT -s $i -j DROP ; done       

-- check iptables rules
root@hosting:/home/hunzo/script# iptables -L -v -n                                         
Chain INPUT (policy ACCEPT 322K packets, 19M bytes)
 pkts bytes target     prot opt in     out     source               destination       
    0     0 DROP       all  --  *      *       104.131.147.112      0.0.0.0/0         
    0     0 DROP       all  --  *      *       216.244.66.198       0.0.0.0/0         
    0     0 DROP       all  --  *      *       216.244.66.239       0.0.0.0/0         
    0     0 DROP       all  --  *      *       216.244.66.205       0.0.0.0/0         
    0     0 DROP       all  --  *      *       46.229.168.0/24      0.0.0.0/0         
    0     0 DROP       all  --  *      *       54.36.148.0/24       0.0.0.0/0         
    0     0 DROP       all  --  *      *       54.36.149.0/24       0.0.0.0/0         
    0     0 DROP       all  --  *      *       163.172.71.0/24      0.0.0.0/0         

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination       

Chain OUTPUT (policy ACCEPT 126K packets, 742M bytes)
 pkts bytes target     prot opt in     out     source               destination       
root@hosting:/home/hunzo/script#


@2018-02-26 11:15

root@hosting:/home/hunzo/script# iptables -L -v -n
Chain INPUT (policy ACCEPT 412K packets, 25M bytes)
 pkts bytes target     prot opt in     out     source               destination       
    0     0 DROP       all  --  *      *       104.131.147.112      0.0.0.0/0         
    0     0 DROP       all  --  *      *       216.244.66.198       0.0.0.0/0         
    0     0 DROP       all  --  *      *       216.244.66.239       0.0.0.0/0         
    0     0 DROP       all  --  *      *       216.244.66.205       0.0.0.0/0         
 3502  210K DROP       all  --  *      *       46.229.168.0/24      0.0.0.0/0         
  309 18540 DROP       all  --  *      *       54.36.148.0/24       0.0.0.0/0         
  120  7200 DROP       all  --  *      *       54.36.149.0/24       0.0.0.0/0         
    0     0 DROP       all  --  *      *       163.172.71.0/24      0.0.0.0/0         

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination       

Chain OUTPUT (policy ACCEPT 169K packets, 1024M bytes)
 pkts bytes target     prot opt in     out     source               destinat


-- drop rules

'iptables -D INPUT -s 1.2.3.4 -j DROP'

1.2.3.4 = ip address

Wednesday, February 21, 2018

Display big numbers in SQLPLUS


show num(width)
set num(width) 15

num(width) parameter (2-15)


SQL> show num
numwidth 10

SQL> l
  1  select
  2  current_scn
  3  from
  4* v$database
SQL> /

CURRENT_SCN
-----------
 1.6139E+10


SQL> set num 15
SQL> l
  1  select
  2  current_scn
  3  from
  4* v$database
SQL> /

    CURRENT_SCN
---------------
    16138638611

SQL>

ALCATEL 6900

write memory copy running certified reload from working no rollback-timeout