New pages
From IT-Arts.net
14 December 2025
- 10:4710:47, 14 December 2025 ZIGBEE - Documentation (hist | edit) [5,853 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == Overview == Zigbee is a wireless communication protocol designed for low-power, low-data-rate, and short-range communication. It is widely used in applications such as home automation, industrial control, and health care systems. Zigbee operates in the IEEE 802.15.4 standard and utilizes the 2.4 GHz ISM band, though it can also operate in the 868 MHz (Europe) and 915 MHz (US) frequency bands. == Communication Range == The communication range of Zig...")
- 10:4410:44, 14 December 2025 POE - Documentation (hist | edit) [5,450 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == PoE Standards == There are several established standards for PoE, each defining different power levels and capabilities: * **IEEE 802.3af (PoE)**: - Provides up to 15.4W of DC power over Cat5 cables at a distance of up to 100 meters. - This standard is ideal for devices with low to moderate power requirements, such as IP phones and basic wireless access points. * **IEEE 802.3at (PoE+)**: - Delivers up to 25.5W of DC power over Cat5 cables...")
- 10:4110:41, 14 December 2025 OPTICAL-FIBER - SFP Documentation (hist | edit) [4,233 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == SFP Form Factors == SFP modules are divided into different form factors based on their data rate and distance capabilities. Some of the common SFP types include: * **Standard SFP**: Supports speeds of up to 1 Gbps over fiber. * **SFP+**: An enhanced version of SFP supporting speeds up to 10 Gbps. * **QSFP (Quad SFP)**: Supports up to 40 Gbps using four SFP+ modules in parallel. * **SFP28**: Supports speeds of 25 Gbps. * **QSFP28**: Supports speeds...")
- 10:2910:29, 14 December 2025 TIGER - Basic Config (hist | edit) [4,762 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == Configuration Files == Tiger configuration files are located in the /etc directory, and these files control the checks Tiger performs during its audits. Some common files include: * /etc/tiger/tigerrc - The main configuration file for Tiger's settings. * /etc/tiger/tiger.def - This file contains default definitions for various checks. * /etc/tiger/checks - A collection of individual check scripts for different audits. == Running Tiger == To run...")
- 10:2210:22, 14 December 2025 JELLYFIN - Install Script On Ubuntu 24.4 (hist | edit) [3,045 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == install_jellyfin.sh == <nowiki> #!/bin/bash # Exit on any error set -e # Function to print messages in green for success function print_success() { echo -e "\033[0;32m$1\033[0m" } # Function to print messages in red for errors function print_error() { echo -e "\033[0;31m$1\033[0m" } # Function to install dependencies function install_dependencies() { print_success "Installing required dependencies..." sudo apt update sudo...")
- 10:1710:17, 14 December 2025 GRAYLOG - Install Script On Ubuntu 24.4 (hist | edit) [4,729 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == install_plex.sh == <nowiki> #!/bin/bash # Exit on errors set -e # Script Variables GRAYLOG_VERSION="4.5.0" MONGO_VERSION="4.2" ES_VERSION="7.x" # Function to install dependencies install_dependencies() { echo "Installing required dependencies..." sudo apt update && sudo apt upgrade -y sudo apt install -y openjdk-11-jre-headless wget curl apt-transport-https gnupg2 lsb-release } # Function to install and configure MongoDB install_mo...")
- 10:1610:16, 14 December 2025 PLEX - Install Script On Ubuntu 24.4 (hist | edit) [4,965 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == install_plex.sh == <nowiki> #!/bin/bash # -------------------------------------------------------- # Advanced Plex Media Server Installation Script for Ubuntu 24.04 # This script installs Plex, sets up the server, configures a firewall (UFW), # and creates a dedicated plex user to run Plex Media Server. # -------------------------------------------------------- # Function to display messages function info() { echo -e "\033[1;32m[INFO]\033[0m...")
- 10:0710:07, 14 December 2025 OSSIM - Install Script On Ubuntu 24.4 (hist | edit) [3,433 bytes] Admin (talk | contribs) (Created page with "[[]] == install-ossim.sh == <nowiki> #!/bin/bash # This script installs OSSIM (Open Source Security Information Management) on Ubuntu 24.04 LTS # Ensure the system is up-to-date echo "Updating system packages..." sudo apt update -y && sudo apt upgrade -y # Install essential packages for system configuration echo "Installing necessary dependencies..." sudo apt install -y curl wget gnupg2 lsb-release apt-transport-https sudo # Add the OSSIM repository and import the...")
- 10:0510:05, 14 December 2025 JITSI-MEET - Install Script On Ubuntu 24.4 (hist | edit) [3,878 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == install_jitsi.sh == <nowiki> #!/bin/bash # This script installs Jitsi Meet on Ubuntu 24.04 LTS # Ensure the system is up-to-date echo "Updating system packages..." sudo apt update -y && sudo apt upgrade -y # Install essential packages echo "Installing necessary packages..." sudo apt install -y apt-transport-https curl gnupg2 lsb-release sudo # Add Jitsi repository and its GPG key echo "Adding Jitsi repository and GPG key..." curl https://downl...")
- 10:0210:02, 14 December 2025 LibreNMS - Install Script On Ubuntu 24.4 (hist | edit) [3,660 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == install_librenms.sh == <nowiki> #!/bin/bash # This script installs LibreNMS on Ubuntu 24.04 LTS # Update system and install essential utilities echo "Updating system and installing essential utilities..." sudo apt update && sudo apt upgrade -y sudo apt install -y curl wget gnupg2 lsb-release ca-certificates software-properties-common # Install required dependencies echo "Installing required dependencies..." sudo apt install -y apache2 mariadb-s...")
- 10:0110:01, 14 December 2025 NEXTCLOUD - Install Script On Ubuntu 24.4 (hist | edit) [4,721 bytes] Admin (talk | contribs) (Created page with "Category:Wiki This script installs Nextcloud with Nginx and PostgreSQL on Ubuntu 24.04 LTS = install_nextcloud.sh = <nowiki> #!/bin/bash # This script installs Nextcloud with Nginx and PostgreSQL on Ubuntu 24.04 LTS # Update system and install essential utilities echo "Updating system and installing essential utilities..." sudo apt update && sudo apt upgrade -y sudo apt install -y curl wget gnupg2 lsb-release ca-certificates software-properties-common # Instal...")
- 09:5109:51, 14 December 2025 ACIDBASE - Install With SNORT Setup On Ubuntu 24.4 (hist | edit) [7,546 bytes] Admin (talk | contribs) (Created page with "Category:Wiki === Snort Configuration === Before configuring Acidbase, ensure that Snort is properly installed and configured to log alerts to a database. Modify the Snort configuration file (`/etc/snort/snort.conf`) to enable database logging. <nowiki> output database: log, mysql, user=snort dbname=snort host=localhost password=your_secure_password</nowiki> Make sure you replace `your_secure_password` with the password for the Snort database user. This configura...")
- 09:1509:15, 14 December 2025 OSSIM - Install On Ubuntu 24.4 (hist | edit) [4,178 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == Prerequisites == Before starting the installation, ensure that your system meets the following requirements: * Ubuntu 24.4 server (or any other compatible Ubuntu version) * Root privileges or sudo access * A working internet connection for downloading dependencies * Sufficient disk space for OSSIM components and data storage == Configuration and Setup == After installation, you must configure OSSIM for proper operation. Follow these steps to comple...")
- 09:0709:07, 14 December 2025 CLEARPASS - 802.1X Configuration (hist | edit) [6,148 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == Adding a RADIUS Server to Network Devices == Before you begin configuring 802.1X, ensure that your network devices (such as switches or wireless controllers) are configured to communicate with ClearPass as a RADIUS server. Here’s an example configuration for a network switch (using Cisco CLI syntax): <nowiki> radius-server host 192.168.1.100 key RADIUS_SECRET aaa authentication dot1x default group radius dot1x system-auth-control</nowiki> In th...")
- 09:0309:03, 14 December 2025 OPENVPN - OpenVPN Server Security Best Practices (hist | edit) [9,959 bytes] Admin (talk | contribs) (Created page with "Category:Wiki === Use Strong Encryption Algorithms === To ensure that the traffic between the OpenVPN server and its clients is secure, choose strong encryption algorithms. Below is an example of configuring strong encryption: <nowiki> cipher AES-256-CBC auth SHA256</nowiki> This configuration ensures AES-256 encryption and SHA-256 message authentication. === Use TLS Authentication === Use TLS authentication (HMAC) to protect against DoS and DDoS attacks. The `...")
- 08:5008:50, 14 December 2025 SNMP - Snmpget Manpage (hist | edit) [3,230 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == snmpget Manpage == <nowiki> SNMPGET(1) Net-SNMP SNMPGET(1) NAME snmpget - communicates with a network entity using SNMP GET requests SYNOPSIS snmpget [COMMON OPTIONS] [-Cf] AGENT OID [OID]... DESCRIPTION snmpget is an S...")
- 08:4708:47, 14 December 2025 ELASTICSEARCH - Troubleshoot (hist | edit) [6,372 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == Log Files and System Monitoring == Before diving into the specifics of Elasticsearch problems, it's important to review log files and system health metrics. * Elasticsearch logs are typically located in the `/var/log/elasticsearch/` directory (depending on the installation and configuration). * The Elasticsearch logs can also be accessed via the `GET /_cat/indices?v` API to view the status of indices. * Monitoring tools like Kibana can provide ins...")
- 08:4408:44, 14 December 2025 MONGODB - Troubleshoot (hist | edit) [6,211 bytes] Admin (talk | contribs) (Created page with "Category:Wiki ==== Checking MongoDB Logs ==== To check MongoDB logs for errors, navigate to the log directory and examine the `mongod.log` file. The default location for MongoDB logs is `/var/log/mongodb/mongod.log` on Linux-based systems. <nowiki> tail -f /var/log/mongodb/mongod.log</nowiki> This command shows the latest log entries. Look for error messages that might indicate issues such as corrupted data files or network issues. ==== Error: "Failed to connec...")
- 08:4208:42, 14 December 2025 GRAYLOG - Install on Ubuntu 24.4 (hist | edit) [4,712 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == Introduction == Graylog is an open-source log management platform that helps you to collect, index, and analyze log data from various sources in real-time. It provides powerful tools for searching, visualizing, and alerting based on log data. This document provides a detailed guide on how to install Graylog on Ubuntu 24.4 and configure it for use. == System Requirements == Before proceeding with the installation of Graylog, ensure that your system...")
- 08:4008:40, 14 December 2025 LOGCHECK - Documentation (hist | edit) [4,190 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == Command Usage == To use `logcheck`, the following basic syntax is applied: <nowiki> logcheck [options]</nowiki> Where `[options]` can vary based on the user’s preferences and the log files to be checked. == Main Options == * <nowiki>-s</nowiki>, <nowiki>--sendmail</nowiki>: This option sends the output via email to a specified recipient. * <nowiki>-c</nowiki>, <nowiki>--config</nowiki> <path>: Specifies a custom configuration file instead...")
- 08:3808:38, 14 December 2025 DEBSECAN - Documentation (hist | edit) [3,780 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == Basic Usage == The primary purpose of `debsecan` is to display vulnerabilities in installed packages. By default, it will list any vulnerable packages with details such as the severity of the vulnerability and links to further information. <nowiki> debsecan</nowiki> This will output a list of vulnerable packages currently installed on the system. == Checking Vulnerabilities for a Specific Package == To check for vulnerabilities in a specific p...")
- 08:3608:36, 14 December 2025 RKHUNTER - Documentation (hist | edit) [5,394 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == Basic Usage == The most basic command to run rkhunter is as follows: <nowiki> rkhunter --check</nowiki> This runs a full scan of the system and checks for rootkits, hidden files, and other potential security risks. It may take some time to complete, depending on the system size. == Running rkhunter with Options == The command supports a wide range of options to customize the scan. Some of the most commonly used options are: === Running a Chec...")
- 08:3408:34, 14 December 2025 LYNIS - Documentation (hist | edit) [4,627 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == Usage == The basic syntax for using Lynis is as follows: <nowiki> lynis [OPTIONS] [COMMAND]</nowiki> Where `OPTIONS` define the behavior of the scan and `COMMAND` specifies which audit tasks to perform. == Command Line Options == Lynis offers a range of command-line options that allow for customization of the audit process. === Common Options === * `--help` Displays the help message, listing all available commands and options. <nowiki> l...")
- 08:3008:30, 14 December 2025 CLONEZILLA - Set up Clonezilla in GRUB on a Debian-based VPS (hist | edit) [4,963 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == Configure GRUB to Load Clonezilla in Memory == In order to boot Clonezilla via GRUB, the Clonezilla ISO will need to be loaded into memory. This can be accomplished by modifying the GRUB configuration to load the Clonezilla kernel and initrd. === Download Clonezilla ISO === Download the Clonezilla ISO from the official site: <nowiki> https://clonezilla.org/clonezilla-live.php</nowiki> Ensure that you download the correct version (Live, stable,...")
- 08:2508:25, 14 December 2025 CLONEZILLA - Basic Usage (hist | edit) [5,528 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == Cloning a Disk to Another Disk == Clonezilla allows you to clone an entire disk, including all partitions, to another disk. This is useful for upgrading to a larger drive or creating a duplicate of the system setup. To clone a source disk (`/dev/sda`) to a target disk (`/dev/sdb`), use the following command: <nowiki> sudo clonezilla -q -icds -scs -q2 -rsync -source /dev/sda -target /dev/sdb</nowiki> Where: - `-q` = Quiet mode, minimizes output....")
- 08:2008:20, 14 December 2025 RSYSLOG - Configuration (hist | edit) [6,272 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == Configuration Files == Rsyslog is primarily configured through the `/etc/rsyslog.conf` file and the `/etc/rsyslog.d/` directory, where additional configuration files can be placed. The main configuration file `/etc/rsyslog.conf` controls global settings, while the files in `/etc/rsyslog.d/` allow modular configuration. == Main Configuration File == The main configuration file contains global settings, input modules, and output modules. Here’s a...")
- 08:0708:07, 14 December 2025 NFT - Guide (hist | edit) [5,705 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == Organizing Configuration Files == A good practice is to organize `nft` configuration files into logical sections to ensure clarity and maintainability. Avoid putting all rules into a single file. Instead, create different files for different contexts (e.g., input, output, forward, etc.) and then include them in a master configuration file. Example: <nowiki> # Main configuration file table inet filter { include "/etc/nftables/ipv4.rules" i...")
- 08:0208:02, 14 December 2025 NGINX - Reverse Proxy (hist | edit) [7,699 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == General Configuration Structure == In a reverse proxy setup, Nginx receives client requests and forwards them to an upstream server (e.g., an application server or a web service). This allows Nginx to handle multiple protocols, such as HTTP and TCP, while acting as a gateway for secure and optimized traffic management. The configuration files for Nginx are typically located in the `/etc/nginx/` directory, with the main configuration file being `/et...")
- 07:5007:50, 14 December 2025 LibreNMS - LNMS Command Line Utility (hist | edit) [5,888 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == Overview == `lnms` is a command-line interface to interact with LibreNMS. The command is a wrapper around the core application, providing functionality to automate or quickly perform common tasks without the need for the web interface. This command is typically used on systems running LibreNMS where administrators may need to troubleshoot, configure, or automate tasks in a Linux environment. == Basic Command Syntax == The basic syntax for using th...")
- 07:4507:45, 14 December 2025 TOP - Manpage (hist | edit) [108,458 bytes] Admin (talk | contribs) (Created page with "[[]] == top Manpage == <nowiki> TOP(1) User Commands TOP(1) NAME top - display Linux processes SYNOPSIS top [options] DESCRIPTION The top program provides a dynamic real-time view of a running system. It can display system summary infor...")
- 07:4307:43, 14 December 2025 TOP - Basic Usage (hist | edit) [4,321 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == Command Output == When you run `top`, the output is divided into two sections: * **Summary Area**: Displays overall system information. * **Task Area**: Displays a list of running processes. === Summary Area === The top part of the display shows summary information about the system, including: * **uptime**: Time the system has been running. * **user tasks**: Number of user processes. * **system tasks**: Number of system processes. * **load averag...")
- 07:3507:35, 14 December 2025 SSLDUMP - Manpage (hist | edit) [17,540 bytes] Admin (talk | contribs) (Created page with "[[]] == ssldump Manpage == <nowiki> SSLDUMP(1) General Commands Manual SSLDUMP(1) NAME ssldump - dump SSL traffic on a network SYNOPSIS ssldump [ -aAdeFHjnNPqtTvxXyz ] [ -i interface ] [ -k keyfile ] [ -l sslkeylogfile ] [ -p password ] [ -r dumpfil...")
- 07:3407:34, 14 December 2025 SSLDUMP - Examples (hist | edit) [5,108 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == Basic Usage == The basic syntax of the `ssldump` command is as follows: <nowiki> ssldump [options] [host] [port]</nowiki> Here: * `host` specifies the target host. * `port` specifies the target port (default is 443 for HTTPS). == Commonly Used Options == * `-i <interface>`: Specifies the network interface to capture packets from (e.g., `eth0`, `wlan0`). * `-A`: Print all available SSL/TLS protocol messages. * `-d`: Enable the display of decode...")
- 07:3107:31, 14 December 2025 PFSENSE - NETSTAT Command (hist | edit) [4,772 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == Syntax == The basic syntax of the `netstat` command is: <nowiki> netstat [options] </nowiki> Where `[options]` can be any of the following flags, which modify the behavior of the command. == Common Options == * `-a` : Display all sockets (both listening and non-listening). * `-n` : Show numerical addresses instead of resolving hostnames. * `-r` : Show the routing table. * `-i` : Display network interfaces and their statistics. * `-s` : Display...")
- 07:2607:26, 14 December 2025 VIM - Manpage (hist | edit) [19,898 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == VIM ManPage == <nowiki> VIM(1) General Commands Manual VIM(1) NAME vim - Vi IMproved, a programmer's text editor SYNOPSIS vim [options] [file ..] vim [options] - vim [options] -t tag vim [options] -q [errorfile]...")
- 07:2307:23, 14 December 2025 VIM - Command Examples (hist | edit) [5,121 bytes] Admin (talk | contribs) (Created page with "Category:Wiki === Opening and Closing Files === To open a file in Vim, use the following command: <nowiki> vim filename</nowiki> To open multiple files: <nowiki> vim file1 file2 file3</nowiki> To quit Vim: <nowiki> :q</nowiki> To save changes and exit: <nowiki> :wq</nowiki> To force quit without saving changes: <nowiki> :q!</nowiki> To save a file without exiting: <nowiki> :w</nowiki> === Moving the Cursor === Move the cursor word by word: <nowiki> w (...")
- 07:1907:19, 14 December 2025 DEBIAN - Post-Install VIM (hist | edit) [965 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == Script File == <nowiki> #!/bin/sh # # To run after VIM installation ##### Test pre-existent config file echo "/root/.vimrc test..." if [ -e ~/.vimrc ] then echo "# A previous Vim config file is present!" && # Backup previous config file echo "# Backup before updating..." && cp -v ~/.vimrc ~/.vimrc.BACKUP && # Append new conf to file echo "# Updating config file..." && echo "\" Remove auto VISUAL mode on mouse selection" >> ~/.vimrc &...")
- 07:1107:11, 14 December 2025 PFSENSE - PFCTL Managing snort2c Table (hist | edit) [4,111 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == Checking the Contents of the Snort2c Table == To view the contents of the `snort2c` table, use the following command: <nowiki> pfctl -t snort2c -T show</nowiki> This will display all IP addresses that are currently in the Snort2c table. You may see IPs that are either part of a blocklist or involved in malicious activities detected by Snort. The output will include the IP address and timestamp of when it was added to the table. == Flushing the...")
- 07:0507:05, 14 December 2025 PFSENSE - PFCTL Basic Usage (hist | edit) [4,604 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == pfctl Command Overview == The `pfctl` command interacts with the PF firewall by managing states, rules, queues, and NAT configuration. It is a crucial tool for pfSense administrators who need to fine-tune firewall settings, troubleshoot issues, or examine the current state of the firewall. ### General Syntax <nowiki> pfctl [options]</nowiki> The options provide the functionality for various tasks such as listing rules, monitoring states, and man...")
13 December 2025
- 16:3916:39, 13 December 2025 METASPLOIT - Pentest a Personnal Website (hist | edit) [3,808 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == Starting Metasploit == First, launch Metasploit's console to begin the penetration test: <nowiki> msfconsole </nowiki> == Information Gathering == Information gathering is the first phase of penetration testing, and Metasploit offers various auxiliary modules to gather valuable data about the target website. === Scanning for Open Ports === To find open ports on the target website's server, use the following auxiliary module: <nowiki> use auxilia...")
- 16:3216:32, 13 December 2025 METASPLOIT - Base Commands (hist | edit) [6,719 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == Advanced Metasploit CLI Commands == === Starting Metasploit Console === To start the Metasploit Framework console, use the following command: <nowiki> msfconsole </nowiki> This launches the Metasploit interactive console, where you can execute various commands for penetration testing. === Search for Exploits === To search for a specific exploit module or vulnerability in Metasploit: <nowiki> search <search_term> </nowiki> For example, to searc...")
- 16:2516:25, 13 December 2025 ARISTA - VXLAN Troubleshooting (hist | edit) [5,155 bytes] Admin (talk | contribs) (Created page with "== Checking VXLAN Tunnel Status == To verify the status of VXLAN tunnels, use the following command: <nowiki> show vxlan tunnel </nowiki> This command shows information about the VXLAN tunnels including tunnel IDs, state, and the associated interfaces. == Checking VXLAN Interfaces == To view the VXLAN interface configuration: <nowiki> show running-configuration interface Vxlan1 </nowiki> This command will display the configuration of a specific VXLAN interface, such...")
- 16:1416:14, 13 December 2025 SNORT - Install On Ubuntu 24.4 (hist | edit) [4,392 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == Step 1: Update Your System == Start by ensuring your system's package list is up-to-date. Open a terminal and run the following commands: <nowiki> sudo apt update sudo apt upgrade -y </nowiki> This will update all the existing packages on your system. == Step 2: Install Required Dependencies == Snort requires several dependencies to compile and run. Install them by running the following command: <nowiki> sudo apt install -y build-essential cma...")
- 16:0316:03, 13 December 2025 FAIL2BAN - fail2ban-regex Manpage (hist | edit) [4,507 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == Quick Examples == <nowiki> fail2ban-regex -v /var/log/nginx/<VHOST>.access.log /etc/fail2ban/filter.d/<FILTER-NAME>.conf</nowiki> == fail2ban-regex Manpage == <noscript> FAIL2BAN-REGEX(1) User Commands FAIL2BAN-REGEX(1) NAME fail2ban-regex - test Fail2...")
- 13:5413:54, 13 December 2025 NMAP - Examples (hist | edit) [4,726 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == 3. Perform a Ping Sweep == To check which hosts are up in a subnet, use the `-sn` option to perform a ping sweep without port scanning: nmap -sn 192.168.1.0/24 == 4. Scan Specific Ports == If you're only interested in specific ports, you can specify them with the `-p` option: nmap -p 22,80,443 192.168.1.1 This command will only scan ports 22 (SSH), 80 (HTTP), and 443 (HTTPS). == 5. Service Version Detection == To detect service versions...")
- 13:4913:49, 13 December 2025 NC - Linux Netcat Guide (hist | edit) [4,041 bytes] Admin (talk | contribs) (Created page with "Category:Wiki = Netcat Command Guide = Netcat, often abbreviated as `nc`, is a versatile networking tool in Linux used for reading from and writing to network connections using the TCP or UDP protocol. It can be used for port scanning, banner grabbing, transferring files, and creating network connections for testing or debugging. == Installation == Netcat is usually pre-installed on most Linux distributions. To check if it is installed, use: $ nc -v If it’s...")
- 13:4113:41, 13 December 2025 FAIL2BAN - fail2ban-client Manpage (hist | edit) [13,281 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == fail2ban-client Manpage == <nowiki> FAIL2BAN-CLIENT(1) User Commands FAIL2BAN-CLIENT(1) NAME fail2ban-client - configure and control the server SYNOPSIS fail2ban-client [OPTIONS] <COMMAND> DESCRIPTION Fail2Ban v1.1.0 reads log file that cont...")
- 13:3813:38, 13 December 2025 ARISTA - MLAG (hist | edit) [8,095 bytes] Admin (talk | contribs) (Created page with "Category:Wiki ==Introduction== MLAG (Multi-Chassis Link Aggregation) is a network feature that allows two physical switches (MLAG peers) to present themselves as a single logical switch to the connected devices. This provides high availability, increased bandwidth, and redundancy without requiring a single switch to be a point of failure. Arista EOS supports MLAG, enabling the creation of a redundant, active-active link aggregation configuration. This guide covers...")
- 13:3613:36, 13 December 2025 ARISTA - SNMP (hist | edit) [7,548 bytes] Admin (talk | contribs) (Created page with "Category:Wiki ==Introduction== SNMP (Simple Network Management Protocol) is a protocol used for network management. It allows network devices to be monitored and managed through the exchange of information between network devices (agents) and a central management station (SNMP manager). This guide provides the essential SNMP configuration commands for Arista EOS. ==SNMP Overview== Arista EOS supports SNMP for both monitoring and controlling network devices. It can...")
- 13:3313:33, 13 December 2025 ARISTA - VXLAN (hist | edit) [3,907 bytes] Admin (talk | contribs) (Created page with "Category:Wiki ==Introduction== VXLAN (Virtual Extensible LAN) is a network virtualization technology that extends Layer 2 networks over a Layer 3 infrastructure. VXLAN is widely used in data center environments to enable scalable, multi-tenant networking, often in conjunction with technologies like EVPN (Ethernet VPN). This guide covers the VXLAN configuration commands for Arista EOS. ==VXLAN Overview== VXLAN encapsulates Layer 2 Ethernet frames in Layer 3 UDP pack...")
