/l3/users/30-11-2009/nt-lnet/debian11.net.nt/root :1 :2 :3 :4 :5 :6 :7 :8 :9 :10 |
|
#ifconfig
eth0 Link encap:Ethernet HWaddr 00:16:3E:00:00:11 inet addr:192.168.16.11 Bcast:192.168.16.255 Mask:255.255.255.0 inet6 addr: fe80::216:3eff:fe00:11/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:4264 errors:0 dropped:0 overruns:0 frame:0 TX packets:2836 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:270658 (264.3 KiB) TX bytes:435205 (425.0 KiB) lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 inet6 addr: ::1/128 Scope:Host UP LOOPBACK RUNNING MTU:16436 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:0 (0.0 b) TX bytes:0 (0.0 b) |
#ifconfig -a
eth0 Link encap:Ethernet HWaddr 00:16:3E:00:00:11 inet addr:192.168.16.11 Bcast:192.168.16.255 Mask:255.255.255.0 inet6 addr: fe80::216:3eff:fe00:11/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:4281 errors:0 dropped:0 overruns:0 frame:0 TX packets:2860 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:271884 (265.5 KiB) TX bytes:447898 (437.4 KiB) eth1 Link encap:Ethernet HWaddr 00:16:3E:00:01:11 BROADCAST MULTICAST MTU:1500 Metric:1 ... RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:0 (0.0 b) TX bytes:0 (0.0 b) sit0 Link encap:IPv6-in-IPv4 NOARP MTU:1480 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:0 (0.0 b) TX bytes:0 (0.0 b) |
#ifconfig eth1 192.168.99.222 netmask 255.255.255.224 up
|
#ping 192.168.99.193
PING 192.168.99.193 (192.168.99.193) 56(84) bytes of data. 64 bytes from 192.168.99.193: icmp_seq=1 ttl=64 time=0.471 ms 64 bytes from 192.168.99.193: icmp_seq=2 ttl=64 time=0.227 ms 64 bytes from 192.168.99.193: icmp_seq=3 ttl=64 time=0.268 ms --- 192.168.99.193 ping statistics --- 3 packets transmitted, 3 received, 0% packet loss, time 1999ms rtt min/avg/max/mdev = 0.227/0.322/0.471/0.106 ms |
#ping 192.168.99.161
PING 192.168.99.161 (192.168.99.161) 56(84) bytes of data. --- 192.168.99.161 ping statistics --- 2 packets transmitted, 0 received, 100% packet loss, time 1008ms |
#apt-get install tcpdump
[root@debian11:~]# ping 192.168.99.193 PING 192.168.99.193 (192.168.99.193) 56(84) bytes of data. 64 bytes from 192.168.99.193: icmp_seq=1 ttl=64 time=0.278 ms 64 bytes from 192.168.99.193: icmp_seq=2 ttl=64 time=0.259 ms --- 192.168.99.193 ping statistics --- 2 packets transmitted, 2 received, 0% packet loss, time 999ms rtt min/avg/max/mdev = 0.259/0.268/0.278/0.018 ms Чтение списков пакетов... Готово Построение дерева зависимостей... Готово Будут установлены следующие дополнительные пакеты: ... Получено:1 http://debian.org.ua etch/main libpcap0.8 0.9.5-1 [89,5kB] Получено:2 http://debian.org.ua etch/main tcpdump 3.9.5-2etch1 [303kB] Получено 392kB за 0s (5854kB/c) Выбор ранее не выбранного пакета libpcap0.8. (Чтение базы данных... на данный момент установлено 22620 файлов и каталогов.) Распаковывается пакет libpcap0.8 (из файла .../libpcap0.8_0.9.5-1_i386.deb)... Выбор ранее не выбранного пакета tcpdump. Распаковывается пакет tcpdump (из файла .../tcpdump_3.9.5-2etch1_i386.deb)... Настраивается пакет libpcap0.8 (0.9.5-1) ... Настраивается пакет tcpdump (3.9.5-2etch1) ... |
#ifconfig
eth0 Link encap:Ethernet HWaddr 00:16:3E:00:00:11 inet addr:192.168.16.11 Bcast:192.168.16.255 Mask:255.255.255.0 inet6 addr: fe80::216:3eff:fe00:11/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:5026 errors:0 dropped:0 overruns:0 frame:0 TX packets:3874 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:330684 (322.9 KiB) TX bytes:717455 (700.6 KiB) eth1 Link encap:Ethernet HWaddr 00:16:3E:00:01:11 inet addr:192.168.99.222 Bcast:192.168.99.223 Mask:255.255.255.224 ... collisions:0 txqueuelen:1000 RX bytes:1498 (1.4 KiB) TX bytes:1126 (1.0 KiB) lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 inet6 addr: ::1/128 Scope:Host UP LOOPBACK RUNNING MTU:16436 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:0 (0.0 b) TX bytes:0 (0.0 b) |
#ping 192.168.1
[root@debian11:~]# ifconfig | less eth0 Link encap:Ethernet HWaddr 00:16:3E:00:00:11 inet addr:192.168.16.11 Bcast:192.168.16.255 Mask:255.255.255.0 inet6 addr: fe80::216:3eff:fe00:11/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:5065 errors:0 dropped:0 overruns:0 frame:0 TX packets:3904 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:333690 (325.8 KiB) TX bytes:726731 (709.6 KiB) eth1 Link encap:Ethernet HWaddr 00:16:3E:00:01:11 ... collisions:0 txqueuelen:1000 RX bytes:1498 (1.4 KiB) TX bytes:1126 (1.0 KiB) lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 inet6 addr: ::1/128 Scope:Host UP LOOPBACK RUNNING MTU:16436 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 PING 192.168.1 (192.168.0.1) 56(84) bytes of data. --- 192.168.1 ping statistics --- 2 packets transmitted, 0 received, 100% packet loss, time 1007ms |
#ping 192.168.99.193
PING 192.168.99.193 (192.168.99.193) 56(84) bytes of data. 64 bytes from 192.168.99.193: icmp_seq=1 ttl=64 time=0.586 ms 64 bytes from 192.168.99.193: icmp_seq=2 ttl=64 time=0.254 ms --- 192.168.99.193 ping statistics --- 2 packets transmitted, 2 received, 0% packet loss, time 999ms rtt min/avg/max/mdev = 0.254/0.420/0.586/0.166 ms |
#route -n
Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 192.168.99.192 0.0.0.0 255.255.255.224 U 0 0 0 eth1 192.168.16.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0 0.0.0.0 192.168.16.254 0.0.0.0 UG 0 0 0 eth0 |
#traceroute nt.ua -n
traceroute to nt.ua (212.40.34.157), 30 hops max, 40 byte packets 1 192.168.16.254 0.094 ms 0.050 ms 0.057 ms 2 10.0.1.1 0.517 ms 0.468 ms 0.290 ms 3 192.168.1.1 1.626 ms 1.404 ms 1.467 ms 4 212.40.51.73 5.972 ms 5.414 ms 7.036 ms 5 89.209.0.25 6.181 ms 6.280 ms 5.870 ms 6 212.40.34.157 5.876 ms 5.935 ms 7.296 ms |
#ifconfig
eth0 Link encap:Ethernet HWaddr 00:16:3E:00:00:11 inet addr:192.168.16.11 Bcast:192.168.16.255 Mask:255.255.255.0 inet6 addr: fe80::216:3eff:fe00:11/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:6250 errors:0 dropped:0 overruns:0 frame:0 TX packets:5173 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:814104 (795.0 KiB) TX bytes:1226280 (1.1 MiB) eth1 Link encap:Ethernet HWaddr 00:16:3E:00:01:11 inet addr:192.168.99.222 Bcast:192.168.99.223 Mask:255.255.255.224 ... collisions:0 txqueuelen:1000 RX bytes:6132 (5.9 KiB) TX bytes:2008 (1.9 KiB) lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 inet6 addr: ::1/128 Scope:Host UP LOOPBACK RUNNING MTU:16436 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:0 (0.0 b) TX bytes:0 (0.0 b) |
#vim /etc/sysctl.conf
|
#route add -net 192.168.99.0/27 gw 192.168.99.193
|
#route add -net 192.168.99.32
|
#route add -net 192.168.99.64
|
#route add -net 192.168.99.9
|
#route add -net 192.168.99.128
|
#route add -net 192.168.99.160
|
#ping 192.168.99.161
PING 192.168.99.161 (192.168.99.161) 56(84) bytes of data. --- 192.168.99.161 ping statistics --- 7 packets transmitted, 0 received, 100% packet loss, time 6007ms |
#ping 192.168.99.193
PING 192.168.99.193 (192.168.99.193) 56(84) bytes of data. 64 bytes from 192.168.99.193: icmp_seq=1 ttl=64 time=0.249 ms 64 bytes from 192.168.99.193: icmp_seq=2 ttl=64 time=0.231 ms 64 bytes from 192.168.99.193: icmp_seq=3 ttl=64 time=0.233 ms --- 192.168.99.193 ping statistics --- 3 packets transmitted, 3 received, 0% packet loss, time 1998ms rtt min/avg/max/mdev = 0.231/0.237/0.249/0.019 ms |
#ping 192.168.99.190
PING 192.168.99.190 (192.168.99.190) 56(84) bytes of data. 64 bytes from 192.168.99.190: icmp_seq=1 ttl=64 time=0.299 ms 64 bytes from 192.168.99.190: icmp_seq=2 ttl=64 time=0.229 ms --- 192.168.99.190 ping statistics --- 2 packets transmitted, 2 received, 0% packet loss, time 999ms rtt min/avg/max/mdev = 0.229/0.264/0.299/0.035 ms |
#route -n
Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 192.168.99.32 192.168.99.193 255.255.255.224 UG 0 0 0 eth1 192.168.99.0 192.168.99.193 255.255.255.224 UG 0 0 0 eth1 192.168.99.96 192.168.99.193 255.255.255.224 UG 0 0 0 eth1 192.168.99.64 192.168.99.193 255.255.255.224 UG 0 0 0 eth1 192.168.99.160 192.168.99.193 255.255.255.224 UG 0 0 0 eth1 192.168.99.128 192.168.99.193 255.255.255.224 UG 0 0 0 eth1 192.168.99.192 0.0.0.0 255.255.255.224 U 0 0 0 eth1 192.168.16.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0 0.0.0.0 192.168.16.254 0.0.0.0 UG 0 0 0 eth0 |
#!v
14 #$ 15 $ 16 # Uncomment the next line to enable Spoof protection (reverse-path filter)$ 17 #net.ipv4.conf.default.rp_filter=1$ 18 $ 19 # Uncomment the next line to enable TCP/IP SYN cookies$ 20 #net.ipv4.tcp_syncookies=1$ 21 $ 22 # Uncomment the next line to enable packet forwarding for IPv4$ 24 $ 25 # Uncomment the next line to enable packet forwarding for IPv6$ 23 #net.ipv4.conf.default.forwarding=1$ 1,1 Наверху |
#!v
16 # Uncomment the next line to enable Spoof protection (reverse-path filter)$ 17 #net.ipv4.conf.default.rp_filter=1$ 18 $ 19 # Uncomment the next line to enable TCP/IP SYN cookies$ 20 #net.ipv4.tcp_syncookies=1$ 21 $ 22 # Uncomment the next line to enable packet forwarding for IPv4$ 24 $ 25 net.ipv4.conf.default.forwarding=1$ 26 #net.ipv6.conf.default.forwarding=1$ #net.ipv6.conf.default.forwarding=1$ "/etc/sysctl.conf" 26L, 776C записано |
#ping 192.168.99.129
20 #net.ipv4.tcp_syncookies=1$ 21 $ 22 # Uncomment the next line to enable packet forwarding for IPv4$ 24 $ 25 # Uncomment the next line to enable packet forwarding for IPv6$ 26 #net.ipv6.conf.default.forwarding=1$ 26,1 Внизу PING 192.168.99.129 (192.168.99.129) 56(84) bytes of data. --- 192.168.99.129 ping statistics --- 2 packets transmitted, 0 received, 100% packet loss, time 1008ms |
#sysctl -f
net.ipv4.conf.default.forwarding = 1 |
#ping 192.168.99.129
PING 192.168.99.129 (192.168.99.129) 56(84) bytes of data. --- 192.168.99.129 ping statistics --- 10 packets transmitted, 0 received, 100% packet loss, time 9006ms |
#!r
route -n Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 192.168.99.32 192.168.99.193 255.255.255.224 UG 0 0 0 eth1 192.168.99.0 192.168.99.193 255.255.255.224 UG 0 0 0 eth1 192.168.99.96 192.168.99.193 255.255.255.224 UG 0 0 0 eth1 192.168.99.64 192.168.99.193 255.255.255.224 UG 0 0 0 eth1 192.168.99.160 192.168.99.193 255.255.255.224 UG 0 0 0 eth1 192.168.99.128 192.168.99.193 255.255.255.224 UG 0 0 0 eth1 192.168.99.192 0.0.0.0 255.255.255.224 U 0 0 0 eth1 192.168.16.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0 0.0.0.0 192.168.16.254 0.0.0.0 UG 0 0 0 eth0 |
#ping 192.168.99.161
PING 192.168.99.161 (192.168.99.161) 56(84) bytes of data. --- 192.168.99.161 ping statistics --- 7 packets transmitted, 0 received, 100% packet loss, time 6008ms |
#ping 192.168.99.190
PING 192.168.99.190 (192.168.99.190) 56(84) bytes of data. 64 bytes from 192.168.99.190: icmp_seq=1 ttl=64 time=0.283 ms 64 bytes from 192.168.99.190: icmp_seq=2 ttl=64 time=0.252 ms --- 192.168.99.190 ping statistics --- 2 packets transmitted, 2 received, 0% packet loss, time 999ms rtt min/avg/max/mdev = 0.252/0.267/0.283/0.022 ms |
#!v
21 $ 22 # Uncomment the next line to enable packet forwarding for IPv4$ 24 $ #net.ipv4.conf.default.forwarding=1$ 25 # Uncomment the next line to enable packet forwarding for IPv6$ 26 #net.ipv6.conf.default.forwarding=1$ 26,35 ÐÐ½Ð¸Ð·Ñ 27 #$ -- ÐСТÐÐÐÐ -- 26,36 ÐÐ½Ð¸Ð·Ñ -- ÐСТÐÐÐÐ -- 27,2 ÐÐ½Ð¸Ð·Ñ -- (вÑÑавка) ÐÐÐУÐÐm 27,2 ÐÐ½Ð¸Ð·Ñ E486#$Шаблон не нР-- (#$ÑÑавка) ÐÐÐУÐÐm 27,1 ÐÐ½Ð¸Ð·Ñ net.ipv4.ip_forward=1$ 27,21 ÐÐ½Ð¸Ð·Ñ "/etc/sysctl.conf" 27L, 799C запиÑано |
#sysctl -f
net.ipv4.ip_forward = 1 |
#ping 192.168.99.129
PING 192.168.99.129 (192.168.99.129) 56(84) bytes of data. 64 bytes from 192.168.99.129: icmp_seq=1 ttl=62 time=0.884 ms 64 bytes from 192.168.99.129: icmp_seq=2 ttl=62 time=0.669 ms 64 bytes from 192.168.99.129: icmp_seq=3 ttl=62 time=0.656 ms --- 192.168.99.129 ping statistics --- 3 packets transmitted, 3 received, 0% packet loss, time 1999ms rtt min/avg/max/mdev = 0.656/0.736/0.884/0.106 ms |
#ping 192.168.99.1
PING 192.168.99.1 (192.168.99.1) 56(84) bytes of data. 64 bytes from 192.168.99.1: icmp_seq=1 ttl=58 time=1.62 ms 64 bytes from 192.168.99.1: icmp_seq=2 ttl=58 time=1.45 ms 64 bytes from 192.168.99.1: icmp_seq=3 ttl=58 time=1.48 ms 64 bytes from 192.168.99.1: icmp_seq=4 ttl=58 time=1.52 ms 64 bytes from 192.168.99.1: icmp_seq=5 ttl=58 time=1.50 ms --- 192.168.99.1 ping statistics --- 5 packets transmitted, 5 received, 0% packet loss, time 3998ms rtt min/avg/max/mdev = 1.453/1.518/1.628/0.069 ms |
#!r
route -n Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 192.168.99.32 192.168.99.193 255.255.255.224 UG 0 0 0 eth1 192.168.99.0 192.168.99.193 255.255.255.224 UG 0 0 0 eth1 192.168.99.96 192.168.99.193 255.255.255.224 UG 0 0 0 eth1 192.168.99.64 192.168.99.193 255.255.255.224 UG 0 0 0 eth1 192.168.99.160 192.168.99.193 255.255.255.224 UG 0 0 0 eth1 192.168.99.128 192.168.99.193 255.255.255.224 UG 0 0 0 eth1 192.168.99.192 0.0.0.0 255.255.255.224 U 0 0 0 eth1 192.168.16.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0 0.0.0.0 192.168.16.254 0.0.0.0 UG 0 0 0 eth0 |
#!t
traceroute nt.ua -n traceroute to nt.ua (212.40.34.157), 30 hops max, 40 byte packets 1 192.168.16.254 0.095 ms 0.050 ms 0.046 ms 2 10.0.1.1 0.374 ms 0.463 ms 0.295 ms 3 192.168.1.1 1.608 ms 1.393 ms 1.507 ms 4 212.40.51.73 5.714 ms 5.528 ms 5.477 ms 5 89.209.0.25 6.025 ms 6.036 ms 5.893 ms 6 212.40.34.157 5.804 ms 5.857 ms 7.689 ms |
#!v
16 # Uncomment the next line to enable Spoof protection (reverse-path filter)$ 17 #net.ipv4.conf.default.rp_filter=1$ 18 $ 19 # Uncomment the next line to enable TCP/IP SYN cookies$ 20 #net.ipv4.tcp_syncookies=1$ 21 $ 22 # Uncomment the next line to enable packet forwarding for IPv4$ 24 $ 25 # Uncomment the next line to enable packet forwarding for IPv6$ 26 #net.ipv6.conf.default.forwarding=1$ 26,1 75% |
#!s
sysctl -f net.ipv4.ip_forward = 1 |
#!r
route -n Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 192.168.99.32 192.168.99.193 255.255.255.224 UG 0 0 0 eth1 192.168.99.0 192.168.99.193 255.255.255.224 UG 0 0 0 eth1 192.168.99.96 192.168.99.193 255.255.255.224 UG 0 0 0 eth1 192.168.99.64 192.168.99.193 255.255.255.224 UG 0 0 0 eth1 192.168.99.160 192.168.99.193 255.255.255.224 UG 0 0 0 eth1 192.168.99.128 192.168.99.193 255.255.255.224 UG 0 0 0 eth1 192.168.99.192 0.0.0.0 255.255.255.224 U 0 0 0 eth1 192.168.16.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0 0.0.0.0 192.168.16.254 0.0.0.0 UG 0 0 0 eth0 |
#ping 192.168.99.1
PING 192.168.99.1 (192.168.99.1) 56(84) bytes of data. 64 bytes from 192.168.99.1: icmp_seq=1 ttl=58 time=1.50 ms 64 bytes from 192.168.99.1: icmp_seq=2 ttl=58 time=1.53 ms --- 192.168.99.1 ping statistics --- 2 packets transmitted, 2 received, 0% packet loss, time 999ms rtt min/avg/max/mdev = 1.503/1.519/1.535/0.016 ms |
#ping 192.168.99.30
PING 192.168.99.30 (192.168.99.30) 56(84) bytes of data. 64 bytes from 192.168.99.30: icmp_seq=1 ttl=59 time=1.43 ms --- 192.168.99.30 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 1.437/1.437/1.437/0.000 ms |
#ping 192.168.99.65
PING 192.168.99.65 (192.168.99.65) 56(84) bytes of data. 64 bytes from 192.168.99.65: icmp_seq=1 ttl=60 time=1.20 ms 64 bytes from 192.168.99.65: icmp_seq=2 ttl=60 time=1.15 ms --- 192.168.99.65 ping statistics --- 2 packets transmitted, 2 received, 0% packet loss, time 1001ms rtt min/avg/max/mdev = 1.153/1.180/1.208/0.044 ms |
#ping 192.168.99.94
PING 192.168.99.94 (192.168.99.94) 56(84) bytes of data. 64 bytes from 192.168.99.94: icmp_seq=1 ttl=61 time=0.986 ms 64 bytes from 192.168.99.94: icmp_seq=2 ttl=61 time=0.887 ms --- 192.168.99.94 ping statistics --- 2 packets transmitted, 2 received, 0% packet loss, time 999ms rtt min/avg/max/mdev = 0.887/0.936/0.986/0.058 ms |
#ping 192.168.99.97
[root@debian11:~]# ping 192.168.99.97 PING 192.168.99.97 (192.168.99.97) 56(84) bytes of data. From 192.168.99.161 icmp_seq=1 Time to live exceeded From 192.168.99.161 icmp_seq=2 Time to live exceeded From 192.168.99.161 icmp_seq=3 Time to live exceeded From 192.168.99.161 icmp_seq=4 Time to live exceeded --- 192.168.99.97 ping statistics --- 4 packets transmitted, 0 received, +4 errors, 100% packet loss, time 2999ms PING 192.168.99.97 (192.168.99.97) 56(84) bytes of data. From 192.168.99.161 icmp_seq=1 Time to live exceeded From 192.168.99.161 icmp_seq=2 Time to live exceeded From 192.168.99.161 icmp_seq=3 Time to live exceeded From 192.168.99.161 icmp_seq=4 Time to live exceeded --- 192.168.99.97 ping statistics --- 4 packets transmitted, 0 received, +4 errors, 100% packet loss, time 2999ms |
#ping 192.168.99.96
[root@debian11:~]# ping 192.168.99.97 PING 192.168.99.97 (192.168.99.97) 56(84) bytes of data. From 192.168.99.161 icmp_seq=1 Time to live exceeded From 192.168.99.161 icmp_seq=2 Time to live exceeded From 192.168.99.161 icmp_seq=3 Time to live exceeded From 192.168.99.161 icmp_seq=4 Time to live exceeded --- 192.168.99.97 ping statistics --- 4 packets transmitted, 0 received, +4 errors, 100% packet loss, time 2999ms PING 192.168.99.96 (192.168.99.96) 56(84) bytes of data. From 192.168.99.161 icmp_seq=1 Time to live exceeded From 192.168.99.161 icmp_seq=2 Time to live exceeded From 192.168.99.161 icmp_seq=3 Time to live exceeded From 192.168.99.161 icmp_seq=4 Time to live exceeded From 192.168.99.161 icmp_seq=5 Time to live exceeded From 192.168.99.161 icmp_seq=6 Time to live exceeded --- 192.168.99.96 ping statistics --- 6 packets transmitted, 0 received, +6 errors, 100% packet loss, time 5001ms |
#ping 192.168.99.96
PING 192.168.99.96 (192.168.99.96) 56(84) bytes of data. From 192.168.99.161 icmp_seq=1 Time to live exceeded From 192.168.99.161 icmp_seq=2 Time to live exceeded --- 192.168.99.96 ping statistics --- 2 packets transmitted, 0 received, +2 errors, 100% packet loss, time 1002ms |
#ping 192.168.99.96
PING 192.168.99.96 (192.168.99.96) 56(84) bytes of data. From 192.168.99.161 icmp_seq=1 Time to live exceeded From 192.168.99.161 icmp_seq=2 Time to live exceeded From 192.168.99.161 icmp_seq=3 Time to live exceeded --- 192.168.99.96 ping statistics --- 3 packets transmitted, 0 received, +3 errors, 100% packet loss, time 2001ms |
#ping 192.168.99.96
PING 192.168.99.96 (192.168.99.96) 56(84) bytes of data. From 192.168.99.161 icmp_seq=1 Time to live exceeded From 192.168.99.161 icmp_seq=2 Time to live exceeded From 192.168.99.161 icmp_seq=3 Time to live exceeded From 192.168.99.161 icmp_seq=4 Time to live exceeded From 192.168.99.161 icmp_seq=5 Time to live exceeded From 192.168.99.161 icmp_seq=6 Time to live exceeded From 192.168.99.161 icmp_seq=7 Time to live exceeded From 192.168.99.161 icmp_seq=8 Time to live exceeded --- 192.168.99.96 ping statistics --- 8 packets transmitted, 0 received, +8 errors, 100% packet loss, time 7002ms |
#ping 192.168.99.96
PING 192.168.99.96 (192.168.99.96) 56(84) bytes of data. --- 192.168.99.96 ping statistics --- 3 packets transmitted, 0 received, 100% packet loss, time 2008ms |
#tcpdump -i eth0 -n icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes 15:51:38.960675 IP 192.168.99.1 > 77.88.21.8: ICMP echo request, id 11282, seq 116, length 64 15:51:39.960669 IP 192.168.99.1 > 77.88.21.8: ICMP echo request, id 11282, seq 117, length 64 15:51:40.960745 IP 192.168.99.1 > 77.88.21.8: ICMP echo request, id 11282, seq 118, length 64 15:51:41.960788 IP 192.168.99.1 > 77.88.21.8: ICMP echo request, id 11282, seq 119, length 64 15:51:42.960794 IP 192.168.99.1 > 77.88.21.8: ICMP echo request, id 11282, seq 120, length 64 15:51:43.960908 IP 192.168.99.1 > 77.88.21.8: ICMP echo request, id 11282, seq 121, length 64 15:51:44.961008 IP 192.168.99.1 > 77.88.21.8: ICMP echo request, id 11282, seq 122, length 64 15:51:45.960992 IP 192.168.99.1 > 77.88.21.8: ICMP echo request, id 11282, seq 123, length 64 ... 15:52:01.961949 IP 192.168.99.1 > 77.88.21.8: ICMP echo request, id 11282, seq 139, length 64 15:52:02.962034 IP 192.168.99.1 > 77.88.21.8: ICMP echo request, id 11282, seq 140, length 64 15:52:03.962130 IP 192.168.99.1 > 77.88.21.8: ICMP echo request, id 11282, seq 141, length 64 15:52:04.962150 IP 192.168.99.1 > 77.88.21.8: ICMP echo request, id 11282, seq 142, length 64 15:52:05.962310 IP 192.168.99.1 > 77.88.21.8: ICMP echo request, id 11282, seq 143, length 64 15:52:06.962328 IP 192.168.99.1 > 77.88.21.8: ICMP echo request, id 11282, seq 144, length 64 15:52:07.962377 IP 192.168.99.1 > 77.88.21.8: ICMP echo request, id 11282, seq 145, length 64 30 packets captured 30 packets received by filter 0 packets dropped by kernel |
#tcpdump -i eth0 -n icmp
16:07:15.778244 IP 194.186.157.50 > 192.168.16.11: ICMP time exceeded in-transit, length 36 16:07:15.853908 IP 194.186.157.50 > 192.168.16.11: ICMP time exceeded in-transit, length 36 16:07:17.624286 IP 192.168.16.254 > 192.168.16.11: ICMP time exceeded in-transit, length 48 16:07:17.626609 IP 192.168.16.254 > 192.168.16.11: ICMP time exceeded in-transit, length 48 16:07:17.628960 IP 192.168.16.254 > 192.168.16.11: ICMP time exceeded in-transit, length 48 16:07:17.631977 IP 10.0.1.1 > 192.168.16.11: ICMP time exceeded in-transit, length 36 16:07:17.634244 IP 10.0.1.1 > 192.168.16.11: ICMP time exceeded in-transit, length 36 16:07:17.636526 IP 10.0.1.1 > 192.168.16.11: ICMP time exceeded in-transit, length 36 16:07:17.647381 IP 192.168.1.1 > 192.168.16.11: ICMP time exceeded in-transit, length 36 16:07:17.660008 IP 192.168.1.1 > 192.168.16.11: ICMP time exceeded in-transit, length 36 ... 16:23:54.087496 IP 192.168.16.11 > 212.26.146.51: ICMP time exceeded in-transit, length 68 16:23:54.888355 IP 192.168.16.11 > 212.26.146.51: ICMP time exceeded in-transit, length 68 16:23:58.889484 IP 192.168.16.11 > 212.26.146.51: ICMP time exceeded in-transit, length 68 16:24:42.150729 IP 192.168.16.11 > 212.26.146.51: ICMP time exceeded in-transit, length 68 16:24:43.109598 IP 192.168.16.11 > 212.26.146.51: ICMP time exceeded in-transit, length 68 16:24:46.152411 IP 192.168.16.11 > 212.26.146.51: ICMP time exceeded in-transit, length 68 16:24:47.091458 IP 192.168.16.11 > 212.26.146.51: ICMP time exceeded in-transit, length 68 326 packets captured 326 packets received by filter 0 packets dropped by kernel |
#ping 192.168.99.129
PING 192.168.99.129 (192.168.99.129) 56(84) bytes of data. --- 192.168.99.129 ping statistics --- 3 packets transmitted, 0 received, 100% packet loss, time 1999ms |
#ping 192.168.99.129
PING 192.168.99.129 (192.168.99.129) 56(84) bytes of data. 64 bytes from 192.168.99.129: icmp_seq=1 ttl=62 time=0.740 ms 64 bytes from 192.168.99.129: icmp_seq=2 ttl=62 time=0.669 ms 64 bytes from 192.168.99.129: icmp_seq=3 ttl=62 time=0.694 ms --- 192.168.99.129 ping statistics --- 3 packets transmitted, 3 received, 0% packet loss, time 1998ms rtt min/avg/max/mdev = 0.669/0.701/0.740/0.029 ms |
#ping 192.168.99.129
PING 192.168.99.129 (192.168.99.129) 56(84) bytes of data. 64 bytes from 192.168.99.129: icmp_seq=1 ttl=62 time=0.642 ms 64 bytes from 192.168.99.129: icmp_seq=2 ttl=62 time=0.687 ms --- 192.168.99.129 ping statistics --- 2 packets transmitted, 2 received, 0% packet loss, time 999ms rtt min/avg/max/mdev = 0.642/0.664/0.687/0.034 ms |
#ping 192.168.16.254
PING 192.168.16.254 (192.168.16.254) 56(84) bytes of data. 64 bytes from 192.168.16.254: icmp_seq=1 ttl=64 time=0.086 ms 64 bytes from 192.168.16.254: icmp_seq=2 ttl=64 time=0.076 ms --- 192.168.16.254 ping statistics --- 2 packets transmitted, 2 received, 0% packet loss, time 999ms rtt min/avg/max/mdev = 0.076/0.081/0.086/0.005 ms |
#ping 192.168.16.1
PING 192.168.16.1 (192.168.16.1) 56(84) bytes of data. 64 bytes from 192.168.16.1: icmp_seq=1 ttl=64 time=1.57 ms 64 bytes from 192.168.16.1: icmp_seq=2 ttl=64 time=0.142 ms --- 192.168.16.1 ping statistics --- 2 packets transmitted, 2 received, 0% packet loss, time 1001ms rtt min/avg/max/mdev = 0.142/0.858/1.575/0.717 ms |
#ifconfig
eth0 Link encap:Ethernet HWaddr 00:16:3E:00:00:11 inet addr:192.168.16.11 Bcast:192.168.16.255 Mask:255.255.255.0 inet6 addr: fe80::216:3eff:fe00:11/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:17299 errors:0 dropped:0 overruns:0 frame:0 TX packets:19516 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:1644197 (1.5 MiB) TX bytes:3781557 (3.6 MiB) eth1 Link encap:Ethernet HWaddr 00:16:3E:00:01:11 inet addr:192.168.99.222 Bcast:192.168.99.223 Mask:255.255.255.224 ... collisions:0 txqueuelen:1000 RX bytes:171016 (167.0 KiB) TX bytes:27422 (26.7 KiB) lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 inet6 addr: ::1/128 Scope:Host UP LOOPBACK RUNNING MTU:16436 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:0 (0.0 b) TX bytes:0 (0.0 b) |
#traceroute -n nt.ua
traceroute to nt.ua (212.40.34.157), 30 hops max, 40 byte packets 1 192.168.16.254 0.206 ms 0.095 ms 0.099 ms 2 10.0.1.1 0.529 ms 0.440 ms 0.495 ms 3 192.168.1.1 4.404 ms 36.645 ms 3.368 ms 4 212.40.51.73 5.693 ms 5.456 ms 5.477 ms 5 89.209.0.25 6.073 ms 6.449 ms 6.241 ms 6 212.40.34.157 6.225 ms 6.769 ms 6.158 ms Настройка маршрутизации |
#iptable
Chain PREROUTING (policy ACCEPT) target prot opt source destination Chain POSTROUTING (policy ACCEPT) target prot opt source destination Chain OUTPUT (policy ACCEPT) target prot opt source destination |
#iptables -t nat -A POSTROUTING -s 192.168.99.0/24 -d ! 192.168.99.0/24 -j MASQUERADE
|
#ntpdate
30 Nov 16:11:18 ntpdate[2613]: no servers can be used, exiting |
#ntpdate ntp.psn.ru
30 Nov 16:11:30 ntpdate[2621]: step time server 194.149.67.130 offset -2.697354 sec |
#grep forward /etc/sysctl.conf
# Uncomment the next line to enable packet forwarding for IPv4 #net.ipv4.conf.default.forwarding=1 # Uncomment the next line to enable packet forwarding for IPv6 #net.ipv6.conf.default.forwarding=1 net.ipv4.ip_forward=1 |
#echo "net.ipv4.ip_forward=1" >> /etc/sysctl.conf
|
#sed -i -e 's/"net.ipv4.ip_forward=1"//
[root@debian11:~]# grep forward /etc/sysctl.conf # Uncomment the next line to enable packet forwarding for IPv4 #net.ipv4.conf.default.forwarding=1 # Uncomment the next line to enable packet forwarding for IPv6 #net.ipv6.conf.default.forwarding=1 net.ipv4.ip_forward=1 net.ipv4.ip_forward=1 sed: no input files |
#sed -i -e 's/"net.ipv4.ip_forward=1"//' /etc/sysctl.conf
|
#grep forward /etc/sysctl.conf
# Uncomment the next line to enable packet forwarding for IPv4 #net.ipv4.conf.default.forwarding=1 # Uncomment the next line to enable packet forwarding for IPv6 #net.ipv6.conf.default.forwarding=1 net.ipv4.ip_forward=1 net.ipv4.ip_forward=1 |
#sed -i -e 's/
|
#grep forward /etc/sysctl.conf
# Uncomment the next line to enable packet forwarding for IPv4 #net.ipv4.conf.default.forwarding=1 # Uncomment the next line to enable packet forwarding for IPv6 #net.ipv6.conf.default.forwarding=1 |
#echo "net.ipv4.ip_forward=1" >> /etc/sysctl.conf
|
#grep forward /etc/sysctl.conf
# Uncomment the next line to enable packet forwarding for IPv4 #net.ipv4.conf.default.forwarding=1 # Uncomment the next line to enable packet forwarding for IPv6 #net.ipv6.conf.default.forwarding=1 net.ipv4.ip_forward=1 |
#cp /etc/network/interfaces{
|
#ls -l /etc/network/interfaces*
-rw-r--r-- 1 root root 155 2009-11-29 23:22 /etc/network/interfaces -rw-r--r-- 1 root root 155 2009-11-30 16:14 /etc/network/interfaces.back |
#vim /etc/network/interfaces
--- /tmp/l3-saved-2539.13805.15409 2009-11-30 16:14:45.000000000 +0200 +++ /etc/network/interfaces 2009-11-30 16:28:30.000000000 +0200 @@ -5,3 +5,14 @@ netmask 255.255.255.0 gateway 192.168.16.254 + +iface eth1 inet static + address 192.168.99.222 + netmask 255.255.255.224 +post-up route add -net 192.168.99.32/27 gw 192.168.99.193 +post-up route add -net 192.168.99.0/27 gw 192.168.99.193 +post-up route add -net 192.168.99.96/27 gw 192.168.99.193 +post-up route add -net 192.168.99.64/27 gw 192.168.99.193 +post-up route add -net 192.168.99.160/27 gw 192.168.99.193 +post-up route add -net 192.168.99.128/27 gw 192.168.99.193 + |
#reboot
|
#route -n
Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 192.168.16.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0 0.0.0.0 192.168.16.254 0.0.0.0 UG 0 0 0 eth0 |
#ifconfig
eth0 Link encap:Ethernet HWaddr 00:16:3E:00:00:11 inet addr:192.168.16.11 Bcast:192.168.16.255 Mask:255.255.255.0 inet6 addr: fe80::216:3eff:fe00:11/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:1068 errors:0 dropped:0 overruns:0 frame:0 TX packets:667 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:149041 (145.5 KiB) TX bytes:189674 (185.2 KiB) lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 inet6 addr: ::1/128 Scope:Host UP LOOPBACK RUNNING MTU:16436 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:0 (0.0 b) TX bytes:0 (0.0 b) |
#iptables -t nat -L -n
|
#echo
192.168.99.0/24 -j MASQUERADE" >> /etc/network/interfaces |
#vim /etc/network/interfaces
--- /tmp/l3-saved-1287.6847.20749 2009-11-30 16:30:27.000000000 +0200 +++ /etc/network/interfaces 2009-11-30 16:30:44.000000000 +0200 @@ -15,5 +15,4 @@ post-up route add -net 192.168.99.64/27 gw 192.168.99.193 post-up route add -net 192.168.99.160/27 gw 192.168.99.193 post-up route add -net 192.168.99.128/27 gw 192.168.99.193 - -iptables -t nat -A POSTROUTING -s 192.168.99.0/24 -d ! 192.168.99.0/24 -j MASQUERADE +post-up iptables -t nat -A POSTROUTING -s 192.168.99.0/24 -d ! 192.168.99.0/24 -j MASQUERADE |
#vi /etc/network
|
#vi /etc/network/
|
#sshd
sshd re-exec requires execution with an absolute path |
#ping 192.168.16.10
PING 192.168.16.10 (192.168.16.10) 56(84) bytes of data. 64 bytes from 192.168.16.10: icmp_seq=1 ttl=64 time=0.499 ms 64 bytes from 192.168.16.10: icmp_seq=2 ttl=64 time=0.130 ms --- 192.168.16.10 ping statistics --- 2 packets transmitted, 2 received, 0% packet loss, time 1000ms rtt min/avg/max/mdev = 0.130/0.314/0.499/0.185 ms |
#ssh root@
The authenticity of host '192.168.16.10 (192.168.16.10)' can't be established. RSA key fingerprint is 51:5b:32:d8:70:19:6d:04:c7:b4:11:49:13:74:dc:bc. Are you sure you want to continue connecting (yes/no)? yes Warning: Permanently added '192.168.16.10' (RSA) to the list of known hosts. root@192.168.16.10's password: Last login: Mon Nov 30 14:57:01 2009 from debian.net.nt Linux debiant 2.6.18-5-xen-686 #1 SMP Fri Jun 1 05:05:24 UTC 2007 i686 The programs included with the Debian GNU/Linux system are free software; the exact distribution terms for each program are described in the individual files in /usr/share/doc/*/copyright. Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent permitted by applicable law. l3-agent is already running: pid=1736; pidfile=/root/.lilalo/l3-agent.pid |
#logout
bash: logout: not login shell: use `exit' |
#exit
exit Connection to 192.168.16.10 closed. |
#ssh root@192.168.16.10
root@192.168.16.10's password: Last login: Tue Dec 1 11:28:53 2009 from debian11.net.nt Linux debiant 2.6.18-5-xen-686 #1 SMP Fri Jun 1 05:05:24 UTC 2007 i686 The programs included with the Debian GNU/Linux system are free software; the exact distribution terms for each program are described in the individual files in /usr/share/doc/*/copyright. Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent permitted by applicable law. l3-agent is already running: pid=1736; pidfile=/root/.lilalo/l3-agent.pid |
#vim /etc/proba
|
#exi
bash: exi: command not found |
#exit
exit Connection to 192.168.16.10 closed. |
#scp -r root@192.168.16.10:/etc/proba ~/etc-that
root@192.168.16.10's password: proba 100% 12 0.0KB/s 00:00 |
#ls -l /etc/ |grep proba
|
#vim etc-that
|
#mv etc-that probaonlocalhost
|
Время первой команды журнала | 13:46:01 2009-11-30 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Время последней команды журнала | 10:32:43 2009-12- 1 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Количество командных строк в журнале | 99 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Процент команд с ненулевым кодом завершения, % | 19.19 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Процент синтаксически неверно набранных команд, % | 5.05 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Суммарное время работы с терминалом *, час | 1.95 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Количество командных строк в единицу времени, команда/мин | 0.85 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Частота использования команд |
|
В журнал автоматически попадают все команды, данные в любом терминале системы.
Для того чтобы убедиться, что журнал на текущем терминале ведётся, и команды записываются, дайте команду w. В поле WHAT, соответствующем текущему терминалу, должна быть указана программа script.
Команды, при наборе которых были допущены синтаксические ошибки, выводятся перечёркнутым текстом:
$ l s-l bash: l: command not found |
Если код завершения команды равен нулю, команда была выполнена без ошибок. Команды, код завершения которых отличен от нуля, выделяются цветом.
$ test 5 -lt 4 |
Команды, ход выполнения которых был прерван пользователем, выделяются цветом.
$ find / -name abc find: /home/devi-orig/.gnome2: Keine Berechtigung find: /home/devi-orig/.gnome2_private: Keine Berechtigung find: /home/devi-orig/.nautilus/metafiles: Keine Berechtigung find: /home/devi-orig/.metacity: Keine Berechtigung find: /home/devi-orig/.inkscape: Keine Berechtigung ^C |
Команды, выполненные с привилегиями суперпользователя, выделяются слева красной чертой.
# id uid=0(root) gid=0(root) Gruppen=0(root) |
Изменения, внесённые в текстовый файл с помощью редактора, запоминаются и показываются в журнале в формате ed. Строки, начинающиеся символом "<", удалены, а строки, начинающиеся символом ">" -- добавлены.
$ vi ~/.bashrc
|
Для того чтобы изменить файл в соответствии с показанными в диффшоте изменениями, можно воспользоваться командой patch. Нужно скопировать изменения, запустить программу patch, указав в качестве её аргумента файл, к которому применяются изменения, и всавить скопированный текст:
$ patch ~/.bashrc |
Для того чтобы получить краткую справочную информацию о команде, нужно подвести к ней мышь. Во всплывающей подсказке появится краткое описание команды.
Если справочная информация о команде есть, команда выделяется голубым фоном, например: vi. Если справочная информация отсутствует, команда выделяется розовым фоном, например: notepad.exe. Справочная информация может отсутствовать в том случае, если (1) команда введена неверно; (2) если распознавание команды LiLaLo выполнено неверно; (3) если информация о команде неизвестна LiLaLo. Последнее возможно для редких команд.
Большие, в особенности многострочные, всплывающие подсказки лучше всего показываются браузерами KDE Konqueror, Apple Safari и Microsoft Internet Explorer. В браузерах Mozilla и Firefox они отображаются не полностью, а вместо перевода строки выводится специальный символ.
Время ввода команды, показанное в журнале, соответствует времени начала ввода командной строки, которое равно тому моменту, когда на терминале появилось приглашение интерпретатора
Имя терминала, на котором была введена команда, показано в специальном блоке. Этот блок показывается только в том случае, если терминал текущей команды отличается от терминала предыдущей.
Вывод не интересующих вас в настоящий момент элементов журнала, таких как время, имя терминала и других, можно отключить. Для этого нужно воспользоваться формой управления журналом вверху страницы.
Небольшие комментарии к командам можно вставлять прямо из командной строки. Комментарий вводится прямо в командную строку, после символов #^ или #v. Символы ^ и v показывают направление выбора команды, к которой относится комментарий: ^ - к предыдущей, v - к следующей. Например, если в командной строке было введено:
$ whoami
user
$ #^ Интересно, кто я?в журнале это будет выглядеть так:
$ whoami
user
Интересно, кто я? |
Если комментарий содержит несколько строк, его можно вставить в журнал следующим образом:
$ whoami
user
$ cat > /dev/null #^ Интересно, кто я?
Программа whoami выводит имя пользователя, под которым мы зарегистрировались в системе. - Она не может ответить на вопрос о нашем назначении в этом мире.В журнале это будет выглядеть так:
$ whoami user
|
Комментарии, не относящиеся непосредственно ни к какой из команд, добавляются точно таким же способом, только вместо симолов #^ или #v нужно использовать символы #=
1 2 3 4Группы команд, выполненных на разных терминалах, разделяются специальной линией. Под этой линией в правом углу показано имя терминала, на котором выполнялись команды. Для того чтобы посмотреть команды только одного сенса, нужно щёкнуть по этому названию.
LiLaLo (L3) расшифровывается как Live Lab Log.
Программа разработана для повышения эффективности обучения Unix/Linux-системам.
(c) Игорь Чубин, 2004-2008