scp username@10.9.9.90:/opt/mpp/projects/ /opt/misserver
rpm -qa|grep #check rpm installation
rpm -e
ssh -s nat@10.9.205.29 -p 22 netconf #ssh connection to netconf
ls -lR|grep "205.29"|wc -l #count the number of files
find ./ -type f -name "*.*" | xargs grep "symm" #find files by content in ./ drectory
request snmp spoof-trap jnxFruRemoval variable-bindings "jnxFruName=PIC:1x10GE(LAN/WAN)@2/0/0" ###spoof trap in juniper device
keytool -import -alias cacerts -keystore "%JAVA_HOME%\jre\lib\security\cacerts" -file "%JAVA_HOME%\jre\lib\security\maven.cer" -trustcacerts ##import certificate for jvm
netstat -tlnp|grep ##to see what process is using this port
tracert 10.9.186.184 #in NT
Pinging 10.0.44.42 with 32 bytes of data:
Reply from 10.0.44.42: bytes=32 time=33ms TTL=251
操作系统 TTL(Time To Live) LINUX 64 WIN2K/NT 128 WINDOWS系列 32 UNIX系列 255, 每过一个路由至少-1
rpm -qa|grep #check rpm installation
rpm -e
ssh -s nat@10.9.205.29 -p 22 netconf #ssh connection to netconf
ls -lR|grep "205.29"|wc -l #count the number of files
find ./ -type f -name "*.*" | xargs grep "symm" #find files by content in ./ drectory
request snmp spoof-trap jnxFruRemoval variable-bindings "jnxFruName=PIC:1x10GE(LAN/WAN)@2/0/0" ###spoof trap in juniper device
keytool -import -alias cacerts -keystore "%JAVA_HOME%\jre\lib\security\cacerts" -file "%JAVA_HOME%\jre\lib\security\maven.cer" -trustcacerts ##import certificate for jvm
netstat -tlnp|grep ##to see what process is using this port
tracert 10.9.186.184 #in NT
Pinging 10.0.44.42 with 32 bytes of data:
Reply from 10.0.44.42: bytes=32 time=33ms TTL=251
操作系统 TTL(Time To Live) LINUX 64 WIN2K/NT 128 WINDOWS系列 32 UNIX系列 255, 每过一个路由至少-1