Check Module:
Get-Module -Name Microsoft.Online.SharePoint.PowerShell -ListAvailable | Select Name,Version
Install Module:
Install-Module -Name Microsoft.Online.SharePoint.PowerShell
Connect SPO Script
$adminUPN="username@domain.name"
$orgName="nida365"
$userCredential = Get-Credential -UserName $adminUPN -Message "Type the password."
Connect-SPOService -Url https://$orgName-admin.sharepoint.com -Credential $userCredential
Monday, January 7, 2019
Tuesday, October 16, 2018
ENABLE SNMP Alcatel-Lucent Enterprise OS6900-X20 8.5.164.R01 GA
aaa authentication snmp local
snmp security no-security
user MORNITOR_USER password PASSWORD read-only all no auth
snmp community-map "COMUNITY_STRING" user MONITOR_USER enable
snmp community-map mode enable
snmp station IP_ADDRESS 161 v2 enable
write memory
copy running certified
snmp security no-security
user MORNITOR_USER password PASSWORD read-only all no auth
snmp community-map "COMUNITY_STRING" user MONITOR_USER enable
snmp community-map mode enable
snmp station IP_ADDRESS 161 v2 enable
write memory
copy running certified
Thursday, October 11, 2018
RPM package
RPM check package
rpm -q package-name
RPM List All package
rpm -qa
RPM update package
rpm -Uvh package-name
RPM remove package
rpm -evv package-name
RPM install package
rpm -ivh package-name
rpm -q package-name
RPM List All package
rpm -qa
RPM update package
rpm -Uvh package-name
RPM remove package
rpm -evv package-name
RPM install package
rpm -ivh package-name
Wednesday, October 10, 2018
Find Serial Number by SNMPWALK
find snmp OID:
snmpwalk -l noAuthNoPriv -v 1 -c COMUNICATION_STRING -On IP_ADDRESS | grep SERIALNUM
snmpwalk -l noAuthNoPriv -v3 IP_ADDRESS -u user -On
find serial by OID:
snmpwalk -l noAuthNoPriv -v 1 -c COMUNICATION_STRING -On IP_ADDRESS .1.3.6.1.2.1.47.1.1.1.1.11.1
snmpwalk -l noAuthNoPriv -v3 IP_ADDRESS -u user -On .1.3.6.1.2.1.47.1.1.1.1.11.67108867
find by network range:
for i in {1..20}; do echo ip = 192.168.1.$i Serial: ; snmpwalk -l noAuthNoPriv -v 1 -c COMUNICATION_STRING -On 192.168.1.$i .1.3.6.1.2.1.47.1.1.1.1.11.1 | awk '{print $4}'; done
for i in {1..20}; do echo ip = 192.168.2.$i Serial: ; snmpwalk -l noAuthNoPriv -v3 192.168.2.$i -u user -On .1.3.6.1.2.1.47.1.1.1.1.11.67108867 | awk '{print $4}'; done
ALCATEL 6400 Serial OID No. : .1.3.6.1.2.1.47.1.1.1.1.11
HUAWEI S5720 Serial OID No. : .1.3.6.1.2.1.47.1.1.1.1.11.67108867
snmpwalk -l noAuthNoPriv -v 1 -c COMUNICATION_STRING -On IP_ADDRESS | grep SERIALNUM
snmpwalk -l noAuthNoPriv -v3 IP_ADDRESS -u user -On
find serial by OID:
snmpwalk -l noAuthNoPriv -v 1 -c COMUNICATION_STRING -On IP_ADDRESS .1.3.6.1.2.1.47.1.1.1.1.11.1
snmpwalk -l noAuthNoPriv -v3 IP_ADDRESS -u user -On .1.3.6.1.2.1.47.1.1.1.1.11.67108867
find by network range:
for i in {1..20}; do echo ip = 192.168.1.$i Serial: ; snmpwalk -l noAuthNoPriv -v 1 -c COMUNICATION_STRING -On 192.168.1.$i .1.3.6.1.2.1.47.1.1.1.1.11.1 | awk '{print $4}'; done
for i in {1..20}; do echo ip = 192.168.2.$i Serial: ; snmpwalk -l noAuthNoPriv -v3 192.168.2.$i -u user -On .1.3.6.1.2.1.47.1.1.1.1.11.67108867 | awk '{print $4}'; done
ALCATEL 6400 Serial OID No. : .1.3.6.1.2.1.47.1.1.1.1.11
HUAWEI S5720 Serial OID No. : .1.3.6.1.2.1.47.1.1.1.1.11.67108867
Wednesday, September 12, 2018
How to find USER exec DDL on Oracle OBJECT using DBA_AUDIT_TRAIL
set:sqlplus parameter
SET LINESIZE 200
col OBJ_NAME format a20
col OS_USERNAME format a20
set:time format
alter session set nls_date_format='YYYY-MM-DD HH24:MI:SS';
exec sql:
select
USERNAME, OBJ_NAME, ACTION_NAME, TIMESTAMP,OS_USERNAME,SESSIONID
from
DBA_AUDIT_TRAIL
where
OBJ_NAME like 'OBJECT_NAME'
SET LINESIZE 200
col OBJ_NAME format a20
col OS_USERNAME format a20
set:time format
alter session set nls_date_format='YYYY-MM-DD HH24:MI:SS';
exec sql:
select
USERNAME, OBJ_NAME, ACTION_NAME, TIMESTAMP,OS_USERNAME,SESSIONID
from
DBA_AUDIT_TRAIL
where
OBJ_NAME like 'OBJECT_NAME'
Friday, June 8, 2018
Create SNMP v3 Huawei S5700 Switch noAUTH
:edit default acl allow any host
acl 2000
rule 1 permit source any
:create snmp agent
snmp-agent
snmp-agent acl 2000
snmp-agent local-engineid 800007DB035C546D0F51F0
snmp-agent sys-info contact email_address
snmp-agent sys-info location BUILDING_NAME
snmp-agent sys-info version all
snmp-agent group v3 GROUP_NAME noauthentication
snmp-agent usm-user v3 USERNAME
snmp-agent usm-user v3 USERNAME group GROUP_NAME
snmp-agent usm-user v3 USERNAME acl 2000
snmp-agent trap disable
:Test smpwalk
snmpwalk -l noAuthNoPriv -v3 xxx.xxx.xxx.xxx -u user
acl 2000
rule 1 permit source any
:create snmp agent
snmp-agent
snmp-agent acl 2000
snmp-agent local-engineid 800007DB035C546D0F51F0
snmp-agent sys-info contact email_address
snmp-agent sys-info location BUILDING_NAME
snmp-agent sys-info version all
snmp-agent group v3 GROUP_NAME noauthentication
snmp-agent usm-user v3 USERNAME
snmp-agent usm-user v3 USERNAME group GROUP_NAME
snmp-agent usm-user v3 USERNAME acl 2000
snmp-agent trap disable
:Test smpwalk
snmpwalk -l noAuthNoPriv -v3 xxx.xxx.xxx.xxx -u user
Wednesday, June 6, 2018
Change Cert mode to Working Mode Alcatel6400
Change Cert mode to Working Mode
copy certified working
reload working no rollback timeout
copy certified working
reload working no rollback timeout
REBOOT
Subscribe to:
Posts (Atom)
ALCATEL 6900
write memory copy running certified reload from working no rollback-timeout
-
SET LLDP System NAME: system name ALL-Uplink system location SIAM-FL11 SHOW LLDP Configure: show lldp config or show lldp local-syste...
-
grant execute on utl_http to wc grant execute on dbms_lock to wc; BEGIN DBMS_NETWORK_ACL_ADMIN.create_acl ( acl => ...
-
:system view system-view or sys :show all config dis current-configuration :create vlan vlan vlan_number :show ip interface ...