Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.150183
Categoría:Policy
Título:Linux: BOOTPROTO in /etc/sysconfig/network-scripts/*
Resumen:Interface configuration (ifcfg) files control the software;interfaces for individual network devices. As the system boots, it uses these files to determine;what interfaces to bring up and how to configure them. These files are usually named ifcfg-name,;where the suffix name refers to the name of the device that the configuration file controls. By;convention, the ifcfg file's suffix is the same as the string given by the DEVICE directive in the;configuration file itself.;;The BOOTPROTO setting is used to determine which protocol to use at boot time:;; - none: No boot-time protocol should be used;; - bootp: The bootp now pump protocol should be used;; - dhcp: The dhcp protocol should be used;; - static: Use static IP address
Descripción:Summary:
Interface configuration (ifcfg) files control the software
interfaces for individual network devices. As the system boots, it uses these files to determine
what interfaces to bring up and how to configure them. These files are usually named ifcfg-name,
where the suffix name refers to the name of the device that the configuration file controls. By
convention, the ifcfg file's suffix is the same as the string given by the DEVICE directive in the
configuration file itself.

The BOOTPROTO setting is used to determine which protocol to use at boot time:

- none: No boot-time protocol should be used

- bootp: The bootp now pump protocol should be used

- dhcp: The dhcp protocol should be used

- static: Use static IP address

CVSS Score:
0.0

CVSS Vector:
AV:L/AC:H/Au:S/C:N/I:N/A:N

CopyrightCopyright (C) 2020 Greenbone AG

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.