Changeset 224b0659
- Timestamp:
- 10/05/2006 01:12:36 PM (18 years ago)
- Branches:
- 10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 12.0, 12.1, 6.2, 6.2.0, 6.2.0-rc1, 6.2.0-rc2, 6.3, 6.3-rc1, 6.3-rc2, 6.3-rc3, 7.10, 7.4, 7.5, 7.6, 7.6-blfs, 7.6-systemd, 7.7, 7.8, 7.9, 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, basic, bdubbs/svn, elogind, gnome, kde5-13430, kde5-14269, kde5-14686, kea, ken/TL2024, ken/inkscape-core-mods, ken/tuningfonts, krejzi/svn, lazarus, lxqt, nosym, perl-modules, plabs/newcss, plabs/python-mods, python3.11, qt5new, rahul/power-profiles-daemon, renodr/vulkan-addition, systemd-11177, systemd-13485, trunk, upgradedb, xry111/intltool, xry111/llvm18, xry111/soup3, xry111/test-20220226, xry111/xf86-video-removal
- Children:
- 3a05e52b
- Parents:
- 6e08fa52
- Files:
-
- 2 edited
Legend:
- Unmodified
- Added
- Removed
-
introduction/welcome/changelog.xml
r6e08fa52 r224b0659 46 46 <itemizedlist> 47 47 <listitem> 48 <para>[randy] - Changed the TCP ports used by tunneled SWAT in the 49 Samba instructions from 901 and 902 to 904 and 905 so that there is 50 no conflict with the IANA database.</para> 51 </listitem> 52 <listitem> 48 53 <para>[randy] - Updated to cairo-1.2.4.</para> 49 54 </listitem> -
server/major/samba3.xml
r6e08fa52 r224b0659 483 483 as the <systemitem class="username">root</systemitem> user:</para> 484 484 485 <screen role="root"><userinput>echo "swat 90 1/tcp" >> /etc/services &&486 echo "swat_tunnel 90 2/tcp" >> /etc/services</userinput></screen>485 <screen role="root"><userinput>echo "swat 904/tcp" >> /etc/services && 486 echo "swat_tunnel 905/tcp" >> /etc/services</userinput></screen> 487 487 488 488 <para>If <command>inetd</command> is used, the following command will … … 507 507 service swat_tunnel 508 508 { 509 port = 90 2509 port = 905 510 510 socket_type = stream 511 511 wait = no … … 536 536 <screen role="root"><userinput>cat >> /etc/stunnel/stunnel.conf << "EOF" 537 537 <literal>[swat] 538 accept = 90 1539 connect = 90 2538 accept = 904 539 connect = 905 540 540 TIMEOUTclose = 1</literal> 541 541 … … 548 548 549 549 <para>SWAT can be launched by pointing your web browser to 550 <uri>https://<replaceable><CA_DN_field></replaceable>:90 1</uri>.550 <uri>https://<replaceable><CA_DN_field></replaceable>:904</uri>. 551 551 Substitute the hostname listed in the DN field of the CA certificate 552 552 used with <application>Stunnel</application> for … … 570 570 <systemitem class='username'>root</systemitem> user:</para> 571 571 572 <screen role='root'><userinput>echo "swat 90 1/tcp" >> /etc/services</userinput></screen>572 <screen role='root'><userinput>echo "swat 904/tcp" >> /etc/services</userinput></screen> 573 573 574 574 <para>If <command>inetd</command> is used, the following command … … 591 591 service swat 592 592 { 593 port = 90 1593 port = 904 594 594 socket_type = stream 595 595 wait = no … … 607 607 608 608 <para>SWAT can be launched by pointing your web browser to 609 http://localhost:90 1.</para>609 http://localhost:904.</para> 610 610 611 611 </sect4>
Note:
See TracChangeset
for help on using the changeset viewer.