Solved

How to backup and restore the DHCP configuration on Solaris 9

Posted on 2010-11-11
7
67 Views
Last Modified: 2016-05-28
I would like to know how to backup and restore the DHCP configuration on Solaris 9. What kind of steps are required for this.
0
Comment
Question by:emulyaw1
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
7 Comments
 
LVL 3

Expert Comment

by:big_one01
ID: 34121310
0
 

Author Comment

by:emulyaw1
ID: 34127220
The solution is too generic. Could you please elaborate more on DCHP specifically eg. what kind of files in which directory need to be backed up and restored? As well as do the DHCP service need to be suspended?
0
 
LVL 16

Accepted Solution

by:
Joseph Gan earned 500 total points
ID: 34129446
DHCP packages and configurations will be under in /var, DHCP commands will be under /usr, DHCP startup/stop scripts will be under /etc.

So basically you need to backup root, /usr and /var filesystems.
0
Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
LVL 38

Expert Comment

by:yuzh
ID: 34133169
It depands on why kind of backup you want, and how your dhcp server was configured.

If you want to backup the dhcp configuration and the dhcp tables only, eg you store all your dhcp data in /var/dhcp (default location), you can create a tar ball for all the files in that dir, and restore it to the same lacation when you needed.

FYI, for Solaris 9, you can run GUI tool
/usr/sadm/admin/bin/dhcpmgr

to verify your hdcp configureation, export/import dhcp configuration data etc (you can import/export your dhcp configuration to other Solaris 9/10 boxes to make a new dhcp server.

of course, you can perform a full sysytem backup for your production dhcp server to another HD or tape.



0
 

Expert Comment

by:EE_AutoDeleter
ID: 41619059
I've requested that this question be deleted for the following reason:

                           
No comment has been added to this question in more than 21 days, so it is now classified as abandoned and is now flagged for deletion.


If there is a valid solution, please OBJECT and indicate the comments that are, or would otherwise lead to, a solution.


Use the specific format https:#axxxxxxxx for comment ID(s).


Also, please don't object simply because the author did not respond to your comment. While we understand this is frustrating, unfortunately we cannot force the author to return to the question. Unless you feel you have presented a valid, verifiable solution we'll simply delete the question.


Experts-Exchange Auto Deleter
0
 
LVL 16

Expert Comment

by:Joseph Gan
ID: 41619060
My valid solutions have provided, see above
0

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

FreeBSD on EC2 FreeBSD (https://www.freebsd.org) is a robust Unix-like operating system that has been around for many years. FreeBSD is available on Amazon EC2 through Amazon Machine Images (AMIs) provided by FreeBSD developer and security office…
The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

740 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question