![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.150183 |
Categoría: | Policy |
Título: | Linux: BOOTPROTO in /etc/sysconfig/network-scripts/* |
Resumen: | Interface configuration (ifcfg) files control the software;interfaces for individual network devices. As the system boots, it uses these files to determine;what interfaces to bring up and how to configure them. These files are usually named ifcfg-name,;where the suffix name refers to the name of the device that the configuration file controls. By;convention, the ifcfg file's suffix is the same as the string given by the DEVICE directive in the;configuration file itself.;;The BOOTPROTO setting is used to determine which protocol to use at boot time:;; - none: No boot-time protocol should be used;; - bootp: The bootp now pump protocol should be used;; - dhcp: The dhcp protocol should be used;; - static: Use static IP address |
Descripción: | Summary: Interface configuration (ifcfg) files control the software interfaces for individual network devices. As the system boots, it uses these files to determine what interfaces to bring up and how to configure them. These files are usually named ifcfg-name, where the suffix name refers to the name of the device that the configuration file controls. By convention, the ifcfg file's suffix is the same as the string given by the DEVICE directive in the configuration file itself. The BOOTPROTO setting is used to determine which protocol to use at boot time: - none: No boot-time protocol should be used - bootp: The bootp now pump protocol should be used - dhcp: The dhcp protocol should be used - static: Use static IP address CVSS Score: 0.0 CVSS Vector: AV:L/AC:H/Au:S/C:N/I:N/A:N |
Copyright | Copyright (C) 2020 Greenbone AG |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |