Solved

AIX Security

Posted on 2011-02-23
4
523 Views
Last Modified: 2012-05-11
1. How to ensure NFS not in use? And configuration files?
2. How to enable NFS? What is the command?
3. Is /etc/exports the only export directory?
4. How to know the current access options of the exported directories?

5. How to remove the following networking services in AIX?
a. fingerd
b. rshd or remshd
c. tftpd
d. rusersd
e. rlogind
f. rwhod
g. whois
h. rexec
0
Comment
Question by:mawingho
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 68

Accepted Solution

by:
woolmilkporc earned 167 total points
ID: 34968422
1) lssrc -g nfs, /etc/rc.nfs  and /etc/exports

2) startsrc -g nfs

3) /etc/exports is a configuration file, not a directory.

4) showmount -e, /usr/sbin/lsnfsexp

5) smitty inetdconf and smitty otherserv

wmp
0
 
LVL 5

Assisted Solution

by:balasundaram_s
balasundaram_s earned 166 total points
ID: 34973298
'exportfs' is the command to be used after you modify /etc/exports, or to use any exports file like below:

# exportfs -f  /anypath/anyexportfile

# exportfs -u /anymountpoint   ( to unexport the filesystem )
0
 
LVL 62

Assisted Solution

by:gheist
gheist earned 167 total points
ID: 34974537
1-3
rpcinfo -p
4 question is void after nfs is stopped, ls -ld shows directory permissions.
5. /etc/inetd.conf ; refresh -s inetd
0
 

Author Closing Comment

by:mawingho
ID: 34977074
thanks
0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial
Suggested Courses

635 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question