No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

eLog V200R007C10 Installation Guide

Describes the installation process of product software. Includes plans, environmental requirements, and procedures for installation, as well as commissioning procedures.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Installing tcpdump

Installing tcpdump

Tcpdump is a common packet analyzer that intercepts data packets transmitted on the network based on user definition. For network security, tcpdump is uninstalled during security hardening. If you need to use the tool in future, install it after fully understanding the risks and obtaining the consent from the customer.

Prerequisites

The security hardening package eLog_ReinforcementTools_For_SUSE11SP3.zip is available, or the system patch package SystemPatchesForSUSE11SP3.zip is available and has been decompressed. You can obtain the tcpdump installation file from the security hardening package or system patch package.

Procedure

  1. Use the iBMC interface to connect to the server and log in to the operating system as the root user.

    Remote connections will be torn down during security hardening. Therefore, you must use the iBMC interface to connect to the server. Otherwise, you cannot log in to the eLog after security hardening.

  2. Right-click the desktop and choose Open in Terminal from the shortcut menu to access the CLI.
  3. Run the cd security-hardening-package-path/rpmPatch/tcpdump or cd system-patch-package-path/tcpdump command to access the directory of the tcpdump installation file.

    For example, if the security hardening package path is /opt/eLog_ReinforcementTools_For_SUSE11SP3, run the following command:

    LogServer:~ # cd /opt/eLog_ReinforcementTools_For_SUSE11SP3/rpmPatch/tcpdump/

    If the system patch package path is /opt/SystemPatchesForSUSE11SP3, run the following command:

    LogServer:~ # cd /opt/SystemPatchesForSUSE11SP3/tcpdump/

  4. Run the sh install_tcpdump.sh command to install tcpdump.

    LogServer:/opt/eLog_ReinforcementTools_For_SUSE11SP3/rpmPatch/tcpdump # sh install_tcpdump.sh 
    
    ###############################################
    
    rpms update start: Wed May 17 23:58:31 CST 2017
    
    Info: Start to install tcpdump-3.9.8-1.27.1.x86_64.rpm...
    Preparing...                ##################################################
    tcpdump                     ##################################################
    
    
    ***************************************************************************************
    install_tcpdump Successfully.

  5. Run the tcpdump -V command. If the tcpdump version number is displayed, the installation succeeds.

    LogServer:/opt/eLog_ReinforcementTools_For_SUSE11SP3/rpmPatch/tcpdump # tcpdump -V
    tcpdump version 3.9.8
    libpcap version 0.9-PRE-CVS
    Usage: tcpdump [-aAdDeflLnNOpqRStuUvxX] [-c count] [ -C file_size ]
        [ -E algo:secret ] [ -F file ] [ -i interface ] [ -M secret ]
        [ -r file ] [ -s snaplen ] [ -T type ] [ -w file ]
        [ -W filecount ] [ -y datalinktype ] [ -Z user ]
        [ expression ]

Follow-Up Procedure

Run the sh uninstall_tcpdump.sh command to uninstall tcpdump.

LogServer:/opt/eLog_ReinforcementTools_For_SUSE11SP3/rpmPatch/tcpdump # sh uninstall_tcpdump.sh  
***************************************************************************************
uninstall_tcpdump Successfully.
Translation
Download
Updated: 2019-04-01

Document ID: EDOC1100073937

Views: 9204

Downloads: 16

Average rating:
This Document Applies to these Products
Related Version
Related Documents
Share
Previous Next