And I think the cleanest solution would be to link .login to vtysh , make
sure that your system logs out when it finishes this command or you can't use
this technique.
Steve Bertrand wrote (earlier today):
> I think the cleanest solution would be to create a match block for your
> user, and ap
hi...
have a look here:
http://docs.hp.com/en/5991-7517/ch01s04.html
I think the cleanest solution would be to create a match block for your
user, and apply the forcecommand within that block...
--
Olli
On Fr, 2009-03-13 at 21:50 -0400, Steve Bertrand wrote:
> Jonathan Chen wrote:
> >
Jonathan Chen wrote:
> On Sat, Mar 14, 2009 at 02:18:27AM +0100, Polytropon wrote:
>
> [..]
>> If the user's shell is csh (FreeBSD's standard dialog shell), you
>> could achieve the goal:
>>
>> ~/.login
>> vtysh
>> logout
>>
>> Only problem: I don't know how the shell will act when
On Sat, Mar 14, 2009 at 02:18:27AM +0100, Polytropon wrote:
[..]
> If the user's shell is csh (FreeBSD's standard dialog shell), you
> could achieve the goal:
>
> ~/.login
> vtysh
> logout
>
> Only problem: I don't know how the shell will act when the user
> terminates the vtys
Polytropon wrote:
> On Fri, 13 Mar 2009 21:12:07 -0400, Steve Bertrand wrote:
>> Steve Bertrand wrote:
>>> Hi everyone,
>>>
>>> Although the application of my question focuses on network operation, I
>>> believe that the objective fits this list.
>>>
>>> Mostly irrelevant, I have been working on s
On Fri, 13 Mar 2009 21:12:07 -0400, Steve Bertrand wrote:
> Steve Bertrand wrote:
> > Hi everyone,
> >
> > Although the application of my question focuses on network operation, I
> > believe that the objective fits this list.
> >
> > Mostly irrelevant, I have been working on securing my network
Steve Bertrand wrote:
> Hi everyone,
>
> Although the application of my question focuses on network operation, I
> believe that the objective fits this list.
>
> Mostly irrelevant, I have been working on securing my network perimeter.
> I have a FreeBSD box that acts as a host-based BGP peer to a
Hi everyone,
Although the application of my question focuses on network operation, I
believe that the objective fits this list.
Mostly irrelevant, I have been working on securing my network perimeter.
I have a FreeBSD box that acts as a host-based BGP peer to all edge
connected routers.
I use th