Fulltext results:
- lxd
- d: "true" linux.kernel_modules: openvswitch,nbd,ip_tables,ip6_tables devices: eth0: mtu: "9000" name: eth0 nictype: bridged parent: br... ork show br0 lxc network edit br0 </code> static IP container <code> istance=c1 lxc stop $instance l... add remote server <code> lxc remote add myserver <ip address or DNS> </code> run command <code> lxc e
- proxmox
- le option for a template qm set $VMID --ipconfig0 ip=dhcp qm set $VMID --ipconfig1 ip=dhcp # qm set 203 --ipconfig0 ip=10.1.109.203/24,gw=10.1.109.1 # (Optional but recommended) Set a DN... 9000 $i --name k$i --full qm set $i --ipconfig0 ip=10.1.109.$i/24,gw=10.1.109.1 qm set $i --ipconfi
- onvif
- =GetDeviceInformation QUERY=GetSystemDateAndTime IP=10.220.1.7 curl -s http://$IP/onvif/device_service \ -d '<s:Envelope xmlns:s="http://www.w3.org/200... elope>' \ | xmllint --format - </code> <code> IP=10.220.1.7 curl -s http://$IP/onvif/device_service \
- networknamespaces @tips:linux
- s chmod +x /bin/nets </code> uncomment "net.ipv4.ip_forward=1" in /etc/sysctl.d/99-sysctl.conf enabl... e> bash prompt, add to .bashrc <code> _ns_name=$(ip netns identify 2>/dev/null) PS1=${_ns_name:+(${_n... ode> netns 0 exec </code> permit routing <code> ip netns exec netns0 sysctl -w net.ipv4.ip_forward=1 iptables -t nat -A POSTROUTING -o tun0 -j MASQUERAD
- openvpn @tips:vpn
- port in mikrotik ca.crt and after ca.key </code> ip pool <code> /ip pool add name=ovpn-pool ranges=10.15.32.34-10.15.32.38 </code> profile and vpn user ... =yes keepalive-timeout=disabled max-mtu=1500 mode=ip netmask=29 \ port=1194 require-client-certificate... /etc/openvpn/up.sh (chmod +x) <code> #!/bin/sh ip route add 10.90.0.0/16 via 10.15.32.33 </code> /
- fail2ban
- send -g --format markdown "`uname -n`: [Fail2Ban] IP <ip> è stato bannato dopo <failures> tentativi falliti dalla jail <name>" actionunban = [Init] init
- jibri
- stom_router] option forwardfor header X-Real-IP default_backend bk_http_default frontend ft_... n h2,http/1.1 option forwardfor header X-Real-IP option httpchk use_backend %[lua.custom_r
- postgres @tips:db
- : admin@admin * pass: admin@admin set static IP on containers <code> /var/lib/lxd/networks/lxdbr... 2/pip/pgadmin4-4.2-py2.py3-none-any.whl # define ip binding CONFIG=/usr/local/lib/python3.5/dist-pack
- agid
- vi di rete stessi, registrando almeno l'indirizzo IP. **Inventario dei software autorizzati e non aut
- audio
- m.pa> load-module module-native-protocol-tcp auth-ip-acl=127.0.0.1;192.168.0.0/16 load-module module-z
- ftp
- /Bind </code> ==== passive mode ==== Use public IP of natted ftp server and open 29799-29899 port ra
- mopidy
- t.pa> load-module module-native-protocol-tcp auth-ip-acl=127.0.0.1 </file> ===== UPNP ===== <code
- adb @tips:android
- ===== <code bash> adb -d tcpip 5555 adb connect <ip> </code> ====== Packages ====== ===== Install =
- gianomobile @tips:android
- In questa categoria di dati rientrano l’indirizzo IP o il nome a dominio del dispositivo da Lei utiliz
- xenial @tips:ubuntu
- eys but mikrotik > 6.31 has to be enabled <code> /ip ssh set strong-crypto=yes </code> ===== Maintena