Fuente: https://linuxize.com/post/create-bootable-debian-10-usb-stick-on-linux/
sudo dd bs=4M if=/path/file.iso of=/dev/sdx status=progress oflag=sync
Fuente: https://linuxize.com/post/create-bootable-debian-10-usb-stick-on-linux/
sudo dd bs=4M if=/path/file.iso of=/dev/sdx status=progress oflag=sync
En Consola de Mikrotik/tool bandwidth-test 87.121.0.45 user=neterra password=neterra direction=bothssh-keygen -t rsa
cat ~/.ssh/id_rsa.pub | ssh root@[your.ip.address.here] "cat >> ~/.ssh/authorized_keys"
# tar xjf /root/iRedAdmin-Pro-LDAP-2.1.2.tar.bz2 -C /tmp/
# cd /tmp/iRedAdmin-Pro-LDAP-2.1.2/tools/
# bash upgrade_iredadmin.sh
# rm -rf /tmp/iRedAdmin-Pro-LDAP-2.1.2/
cd /root wget http://downloads.digium.com/pub/register/x86-64/register
chmod 500 /root/register
/root/register
cd /root wget http://downloads.digium.com/pub/telephony/codec_g729/benchg729/x86-64/benchg729-1.0.8-x86_64 -O benchg729
chmod 500 /root/benchg729
/root/benchg729
asterisk -rvvv *CLI> g729 show licenses 0/0 encoders/decoders of 26 licensed channels are currently in use Licenses Found: Key: G729-EXAMPLE1 -- Host-ID: ex:am:pl:e0:ex:am:pl:e0:ex:am:pl:e0:ex: am:pl:e0:ex:am:pl:e0 -- Channels: 2 (Expires: 2026-09-26) (OK) Key: G729-EXAMPLE2 -- Host-ID: ex:am:pl:e0:ex:am:pl:e0:ex:am:pl:e0:ex: am:pl:e0:ex:am:pl:e0 -- Channels: 24 (Expires: 2026-09-26) (OK)
/etc/default/grub has only these effective options:GRUB_DEFAULT='Ubuntu'
GRUB_HIDDEN_TIMEOUT=1
GRUB_HIDDEN_TIMEOUT_QUIET=true
GRUB_TIMEOUT=1
GRUB_DISTRIBUTOR=`lsb_release -i -s 2> /dev/null || echo Debian`
GRUB_CMDLINE_LINUX_DEFAULT="quiet splash"
GRUB_CMDLINE_LINUX=""
GRUB_TERMINAL=console
/etc/default/grubGRUB_RECORDFAIL_TIMEOUT=0
Save and runsudo update-grub
[Desktop Entry]
Name=IntelliJ IDEA Community Edition
Comment=Free Java, Groovy, Scala and Android applications development
Exec=/path/to/your/bin/idea.sh
Path=/path/to/your/bin
Terminal=false
Icon=intellij-idea-ce
Type=Application
Categories=Development;IDE
[root@openldap_a ~]# tail -n 5 /etc/openldap/slapd.conf overlay syncprov syncprov-checkpoint 1 10 syncprov-sessionlog 100
[root@openldap_c ~]# tail -n 10 /etc/openldap/slapd.conf
syncrepl rid=1
provider=ldap://openldap_a.unixh4cks.com
type=refreshAndPersist
searchbase="dc=unixh4cks,dc=com"
schemachecking=off
bindmethod=simple
binddn="cn=Manager,dc=unixh4cks,dc=com"
credentials=secret
updateref ldap://openldap_a.unixh4cks.com.com/
[root@openldap_c ~]#
# apt-get update && apt-get upgrade --show-upgraded |
# apt-get install libapache2-mod-evasive -y |
# cat >> /etc/httpd/conf.d/mod_evasive.conf <DOSHashTableSize 3097DOSPageCount 5DOSSiteCount 50DOSPageInterval 1DOSSiteInterval 1DOSBlockingPeriod 60DOSEmailNotify your@email.comDOSLogDir /var/log/apache2/evasive</IfModule>EOF |
# chown www-data: -R /var/log/apache2/ |
# /etc/init.d/apache2 restart /ip firewall nat
add chain=srcnat out-interface="1-DIGICEL" action=masquerade comment="Internet - Proveedor Principal"
add chain=srcnat out-interface="2-CABLEONDA" action=masquerade comment="Internet - Proveedor Secundario (Backup)"
Luego podemos por ejemplo llevar un conteo de las caídas de conexión con
la opción de enviar un mail si se encuentra la misma (Mails de Alerta),
configuración para:
Hotmail:
/tool e-mail
set server=65.55.96.11 username="MAIL HOTMAIL" password="CONTRASEÑA" from=
Gmail:
/tool e-mail
set server=74.125.134.108 username="MAIL GMAIL" password="CONTRASEÑA" from=
Luego continuaremos creando una serie de script, vamos a ir a System ► Scripts ► "+"
Name= ISP1-UP
Policy= read,write,policy,test
Source=
/ip firewall nat set [find comment="Internet - ISP1"] disabled=no
/ip firewall nat set [find comment="Internet - ISP2"] disabled yes
: log info "::::::::::::::: TRAFICO SALIENDO POR PROVEEDOR PRINCIPAL 1 :::::::::::::::"
Name= ISP2-UP
Policy= read,write,policy,test
Source=
/ip firewall nat set [find comment="Internet - ISP1"] disabled=yes
/ip firewall nat set [find comment="Internet - ISP2"] disabled=no
: log info "::::::::::::::: TRAFICO SALIENDO POR PROVEEDOR SECUNDARIO :::::::::::::::"
Name= ISP1-DOWN
Policy= read,write,policy,test
Source=
/ip firewall nat set [find comment="Internet - ISP1"] disabled=yes
/ip firewall nat set [find comment="Internet - ISP2"] disabled=no
: log info "::::::::::::::: TRAFICO SALIENDO POR PROVEEDOR SECUNDARIO, PROVEEDOR PRIMARIO FUERA DE SERVICIO :::::::::::::::"
/tool netwatch set [find comment="SALIDA ISP1"] disabled=yes
/tool netwatch set [find comment="SALIDA ISP2"] disabled=no
/tool e-mail send to="DIRECCION DE MAIL" subject="Proveedor 1 Fuera de Servicio" body="Proveedor principal dejo de funcionar"
:log info "::::::::::::::: ALERTA ENVIADA :::::::::::::::"
Name= ISP2-DOWN
Policy= read,write,policy,test
Source=
/ip firewall nat set [find comment="Internet - ISP1"] disabled=no
/ip firewall nat set [find comment="Internet - ISP2"] disabled=yes
: log info "::::::::::::::: TRAFICO SALIENDO POR PROVEEDOR PRINCIPAL, PROVEEDOR SECUNDARIO FUERA DE SERVICIO :::::::::::::::"
/tool netwatch set [find comment="SALIDA ISP2"] disabled=yes
/tool netwatch set [find comment="SALIDA ISP1"] disabled=no
/tool e-mail send to="DIRECCION DE MAIL" subject="Proveedor 2 Fuera de Servicio" body="Proveedor 2 Dejo de funcionar"
:log info "::::::::::::::: ALERTA ENVIADA :::::::::::::::"
Luego para terminar creamos las reglas de Netwatch:
/tool netwatch
add comment="SALIDA ISP1" host=74.125.47.104 down-script="ISP1-DOWN" up-script="ISP1-UP"
add comment="SALIDA ISP2" host=98.139.183.24 down-script="ISP2-DOWN" up-script="ISP2-UP"