Here’s how you can quickly list the currently active IPSec VPN sessions on your ASA.

show vpn-sessiondb remote

You can of course use modifiers to filter only the text you’re interested in. For example

show vpn-sessiondb remote | include (Username|Duration)

This will give you the username and duration of the session.

You can also get a summary of all the connections as follows

show vpn-sessiondb summary

 

This is a one step command to extract and untar a tar.gz file.

tar zxvf filename.tar.gz

z = Gunzip(uncompress) it before extracting, used on file ending in .tar.gz or .tgz
x = Extract the contents of the TAR file
v = Verbose – display contents as it is tarring or extracting
f = Filename to follow

Note: If the file does not have “.gz” extension that means its already uncompressed and one has to just extract it using “tar xvf” command.

This is a two step command to extract and untar the file.

gunzip filename.tar.gz

tar xvf filename.tar

 

You can run powershell commands on your Exchange 2010 server from machines whether or not they have the Exchange Management Tools installed using implicit remoting.

Even when you run the Exchange Management Shell on your exchange server, you’re essentially creating a powershell remoting session. The following steps take place in the background when you click the EMS icon:

  • Load the Microsoft.Exchange.Management.PowerShell.E2010 snap-in gets loaded
  • The RemoteExchange.ps1 script is dot sourced
  • The Connect-ExchangeServer function is executed
  • You can set up implicit remoting from any maching using powershell v2. This imports the commands from your exchange server to your local powershell session so you don’t need any Exchange tools installed.

    First we create a session using the New-PSSession cmdlet:

    $s = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri http://<CAS FQDN>/PowerShell/ -Authentication Kerberos

    Then, import the session using the Import-PSSession cmdlet:

    Import-PSSession $s

    The Exchange Management Shell commands are now imported into the local PowerShell session.

    You could use the same method to setup a scheduled task from your machine to run a commands on your exchange server.

    [source: ]

     

    This is perhaps the best tutorial on how to set up Active Directory integration in CentOS.

    http://www.linuxmail.info/active-directory-integration-samba-centos-5/

    Update:
    A related link on setting up Kerberos
    http://www.howtoforge.com/samba_ads_security_mode

     

    So you inherit a box running linux and you have no idea which flavor of linux it is. How do you find out?

    If all you need the kernel version you can try
    uname -a

    This outputs something like this

    Linux localhost.localdomain 2.4.20-31.9 #1 Tue Apr 13 18:04:23 EDT 2004 i686 i686 i386 GNU/Linux

    If you need the actual distro name you can try
    cat /etc/*release

    In Ubuntu it shows up as

    DISTRIB_ID=Ubuntu
    DISTRIB_RELEASE=9.04
    DISTRIB_CODENAME=jaunty
    DISTRIB_DESCRIPTION=”Ubuntu 9.04″

    Or even
    cat /etc/issue

    which spits out the following on Ubuntu

    Ubuntu 9.04 \n \l

    You can combine all three to get the following
    uname -a && cat /etc/*release && cat /etc/issue

    Update:
    Another one to add to the list
    cat /proc/version

    © 2021 !NSFW Suffusion theme by Sayontan Sinha