tcpdchk man page on HP-UX

Man page or keyword search:  
man Server   10987 pages
apropos Keyword Search (all sections)
Output format
HP-UX logo
[printable version]

tcpdchk(1)							    tcpdchk(1)

NAME
       tcpdchk - check tcp wrapper configuration

SYNOPSYS
       inet_conf]

DESCRIPTION
       examines	 the  tcp  wrapper configuration and reports all potential and
       real problems it can encounter.	The command examines the  access  con‐
       trol files (by default, these are and and compares the entries in these
       files against entries in the configuration file.

       reports the following types of problems:

	      non-existent pathnames,

	      services that appear in access control rules but	are  not  con‐
	      trolled by

	      services that should not be wrapped,

	      non-existent host names or non-internet address forms,

	      occurrences of host aliases instead of official host names,

	      hosts with a name/address conflict,

	      inappropriate use of wildcard patterns,

	      inappropriate use of NIS netgroups or references to non-existent
	      NIS netgroups,

	      references to non-existent options,

	      invalid arguments to options.

       Wherever possible, provides a helpful suggestion to fix the problem.

   Options
       The following options are supported by If  no  options  are  specified,
       then it uses the default location of the files.

       Report access control rules that permit access without an explicit
	      keyword.

       Examine the
	      and files in the current directory instead of the default ones.

       Specify this option when
	      is  unable  to find your configuration file, or when you suspect
	      that is using the wrong file.  inet_conf is the path name of the
	      configuration file whose entries you want to examine.

       Display the contents of each access control rule.  Daemon lists, client
	      lists,  shell commands and options are shown in a printable for‐
	      mat.  The display helps you find any discrepancies between  what
	      you want and what understands for the access control rules.

AUTHOR
	      Wietse Venema (wietse@wzv.win.tue.nl),
	      Department of Mathematics and Computing Science,
	      Eindhoven University of Technology
	      Den Dolech 2, P.O. Box 513,
	      5600 MB Eindhoven, The Netherlands

FILES
       The default locations of the access control tables are:

       (daemon, client) pairs that are granted access.

       (daemon, client) pairs that are denied access.

SEE ALSO
       tcpdmatch(1), explains what would do in specific cases.

       inetd.conf(4), format of the control file.

       hosts_access(5), format of the access control tables.

       hosts_options(5), format of the language extensions.

								    tcpdchk(1)
[top]

List of man pages available for HP-UX

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net