Solved

Hard Coding a Port for NIS on Fedora Core2

Posted on 2004-09-21
6
281 Views
Last Modified: 2013-12-15
I want to run NIS between a mail server in my DMZ to a server on my trusted network which runs Fedora Core2.  My firewall requires a pin hold with a static port, but when I reboot my server the NIS turns up on another port.  Is there a way to hard set the NIS communication port on a Server running Fedora Core 2?
0
Comment
Question by:qcomm
  • 2
6 Comments
 
LVL 17

Accepted Solution

by:
owensleftfoot earned 250 total points
ID: 12117223
0
 
LVL 2

Expert Comment

by:fulp02
ID: 12144689
Yes make a startup script an place it in your runlevel that you are using
delete the old NIS script or it may be something with ypserv in it
Anyways make the new script and use the
ypserv -p 500

now the nis server will run on that port

Heres a link if you need help http://www.linuxforum.com/man/ypserv.5.php
0
 

Author Comment

by:qcomm
ID: 12145168
this is a comment to the original question to make it more concise!

I am familiar with NIS and know the howto forward and backward, I will try rewriting the startup script and see if the startup script is the problem.  However, all attempts at this point to set the port have failed.  NIS will not start under two conditions at this point -- 1. if I enter the -p entry in the startup script, and 2. if I run the machine at init level 3.  I really would prefer to run the box at init level 3 rather than init level 5.

0
 
LVL 2

Assisted Solution

by:fulp02
fulp02 earned 250 total points
ID: 12153463
Aight 1 Make sure the RPC portmapper Is running with out it
I am pretty sure Nis Will crash every time , And in your startup after you verify
that the port mapper is runnin Put it at the very end to start so
say the your script was in roots home dir named "NisStart"
in that script there would be the command "ypserv -p 500"
Now copy this to Your run leve and Make it execute last

So I believe that you would do this
cp NisStart /etc/rc.d/rc3/S99NisStart give that a try and let me know how it works out
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

In this tutorial I will explain how to make squid prevent malwares in five easy steps: Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. It reduces bandwidth and improves response times by caching and reusing frequently-…
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now