while read var
do
..$var..
done < FILE
2.
cat FILE |
while read var
do
..$var..
done
3.
for var in `cat FILE`
do
..$var..
done
while read var
do
..$var..
done < FILE
cat FILE |
while read var
do
..$var..
done
for var in `cat FILE`
do
..$var..
done
sudo apt-get install apache2 snmpd mrtg
vi /etc/snmp/snmpd.conf
--
..
# sec.name source community
#com2sec paranoid default public
com2sec readonly default public
#com2sec readwrite default private
..
# public is the community name set in step 2
cfgmaker public@localhost > /etc/mrtg.cfg
indexmaker /etc/mrtg.cfg > /var/www/mrtg/index.html
vi /root/firewall.start
vi /root/firewall.stop
--
echo "Stopping firewall and allowing everyone..."
iptables -F
iptables -X
iptables -t nat -F
iptables -t nat -X
iptables -t mangle -F
iptables -t mangle -X
iptables -P INPUT ACCEPT
iptables -P FORWARD ACCEPT
iptables -P OUTPUT ACCEPT
sudo /root/firewall.start
sudo sh -c "iptables-save > /etc/iptables.rules"
# restore rules with iptables-restore
# sudo iptables-restore < /etc/iptables.rules
sudo vi /etc/network/if-pre-up.d/iptables
--
#!/bin/sh
# Load iptables rules before interfaces are brought online
# This ensures that we are always protected by the firewall
#
# Note: if bad rules are inadvertently (or purposely) saved it could block
# access to the server except via the serial tty interface.
#
RESTORE=/sbin/iptables-restore
STAT=/usr/bin/stat
IPSTATE=/etc/iptables.rules
test -x $RESTORE || exit 0
test -x $STAT || exit 0
# Check permissions and ownership (rw------- for root)
if test `$STAT --format="%a" $IPSTATE` -ne "600"; then
echo "Permissions for $IPSTATE must be 600 (rw-------)"
exit 0
fi
# Since only the owner can read/write to the file, we can trust that it is
# secure. We need not worry about group permissions since they should be
# zeroed per our previous check; but we must make sure root owns it.
if test `$STAT --format="%u" $IPSTATE` -ne "0"; then
echo "The superuser must have ownership for $IPSTATE (uid 0)"
exit 0
fi
# Now we are ready to restore the tables
$RESTORE < $IPSTATE
sudo chmod 600 /etc/iptables.rules
sudo chmod +x /etc/network/if-pre-up.d/iptables