Skip to main content

List and explain all NFS server commands.

65.List and explain all NFS server commands.
Ans.
1. exportfs:
a) The exportfs command enables user to manipulate the list of current exports without editing /etc/exports.
b) It also maintains the list of currently exported file system in /var/lib/nfs/etab.
Example:
The exportfs –a command initializes /var/lib/nfs/etab, synchronizes it with the contents of /etc/exports.
c) To add a new export to etab and also /etc/exports the syntax is :
#exportfs –o opts hostdir
d) Example:
#exportfs –o sync,rw 192.168.166.7:/demo
The above command exports the directory /demo to client 192.168.166.7 with export option rw and sync.
e) –v option of this command, lists currently exported filesystem.
Example:
#exportfs –v
f) –u options unexports the filesystem as follow:
Example:
#exportfs –u 192.168.166.7:/demo

2. showmount:
a) The showmount command provides information about clients and the file systems they have mounted.
b) Syntax is : #showmount [-advhe] [host]
c) Options are as follows:
-d: list only directories
-a: list all the information
-e: lists exported file system
-v: shows showmount’s version number
-h: shows short summary
d) When used with IP address, it lists all the IPs that specific client has mounted.
Example:
#showmount 192.168.166.7
e) #showmount –a
It will show all mount points
f) #showmount –d
It will show only mounted directories
g) #showmount –e
It will show server’s export list.

3. rpcinfo:
a) It is general purpose program to display information about programs that uses RPC protocol.
b) When rpcinfo command is used with –p option it make sure that required daemons are running.
c) Example:
#rpcinfo –p

4. nfsstat:
a) provides status information of nfs
b) Example:
#nfsstat

Comments

Popular posts from this blog

Explain the tools used to monitor system security.

12.Explain the tools used to monitor system security. Ans. 1. People who, for purpose of larceny or to amuse themselves, like to break into computers, they are called ‘crackers’. 2. If there is a vulnerability in a system they will find it and use it against you. 3. Preventing use of your machine for nefarious purpose and guarding against intrusion are, in the end, your responsibility alone. 4. Red hat equips you with tools to detect and deal with unauthorised access of many kinds. 5. You need to configure those tools and understand how to sense the warning they provide. 6. Fortunately Linux is development community is quick to find potential exploits and to create ways of slamming the doors before crackers can enter in your system. 7. Red hat is careful enough to making available new, patched version in which potential exploits have been found. 8. You should make sure to download and install the repaired package. 9. This line of defence...

Explain the file systems supported by Linux.

21.Explain the file systems supported by Linux. Ans. 1. Linux can read/write to several file system that originated with other operating system much different from Linux. 2. One reason that Linux supports so many file systems is the design of its virtual file system (VFS) layer, its provides a fairly universal forms of file support, file systems supported by Linux are as follows: 3. ext3: • Ext3 stands for third extended file system. • Starting from Linux Kernel 2.4.15 ext3 was available. • The main benefit of ext3 is that it allows journaling. • Journaling has a dedicated area in the file system, where all the changes are tracked. • When the system crashes, the possibility of file system corruption is less because of journaling. (If no journaling, then fsck command (file system consistency check) is used to check for the corrupted file and to repair that file). • ext3 keeps a record of uncommitted file transactions and applies only those transactions when the sy...

Explain the rc script and how they can be managed by manually.

18.Explain the rc script and how they can be managed by manually. Ans. 1. ‘rc’ scripts are stored in ‘/etc/rc.d’ directory, rc scripts are used to stop and start services for runlevels. 2. In ‘/etc/rc.d’ directory we have some additional directories rc0.d, rc1.d, rc2.d, rc3.d, rc4.d, rc5.d and rc6.d, the numbers in directory name corresponds to the runlevel and contains the scripts for runlevels. 3. For example let’s take runlevel 5, init program looks in the ‘/etc/rc.d/rc5.d/’ directory for the processes to start and stop. 4. All the scripts in the rc5.d directory are symbolic like to the actual scripts that are located in the ‘/etc/rc.d/init.d/’ directory. The use of symbolic link means that the runlevel can be modified by adding or removing symlinks or changing the order the script run. 5. rc scripts contains symbolic links which can be modified to change the runlevels. 6. Symbolic links begins with a ‘k’ and a number or an ‘s’ and a number. Example: S25netfs -...