- Timestamp:
- 10/05/2006 01:12:36 PM (18 years ago)
- Branches:
- 10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 12.0, 12.1, 6.2, 6.2.0, 6.2.0-rc1, 6.2.0-rc2, 6.3, 6.3-rc1, 6.3-rc2, 6.3-rc3, 7.10, 7.4, 7.5, 7.6, 7.6-blfs, 7.6-systemd, 7.7, 7.8, 7.9, 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, basic, bdubbs/svn, elogind, gnome, kde5-13430, kde5-14269, kde5-14686, kea, ken/TL2024, ken/inkscape-core-mods, ken/tuningfonts, krejzi/svn, lazarus, lxqt, nosym, perl-modules, plabs/newcss, plabs/python-mods, python3.11, qt5new, rahul/power-profiles-daemon, renodr/vulkan-addition, systemd-11177, systemd-13485, trunk, upgradedb, xry111/intltool, xry111/llvm18, xry111/soup3, xry111/test-20220226, xry111/xf86-video-removal
- Children:
- 3a05e52b
- Parents:
- 6e08fa52
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
server/major/samba3.xml
r6e08fa52 r224b0659 483 483 as the <systemitem class="username">root</systemitem> user:</para> 484 484 485 <screen role="root"><userinput>echo "swat 90 1/tcp" >> /etc/services &&486 echo "swat_tunnel 90 2/tcp" >> /etc/services</userinput></screen>485 <screen role="root"><userinput>echo "swat 904/tcp" >> /etc/services && 486 echo "swat_tunnel 905/tcp" >> /etc/services</userinput></screen> 487 487 488 488 <para>If <command>inetd</command> is used, the following command will … … 507 507 service swat_tunnel 508 508 { 509 port = 90 2509 port = 905 510 510 socket_type = stream 511 511 wait = no … … 536 536 <screen role="root"><userinput>cat >> /etc/stunnel/stunnel.conf << "EOF" 537 537 <literal>[swat] 538 accept = 90 1539 connect = 90 2538 accept = 904 539 connect = 905 540 540 TIMEOUTclose = 1</literal> 541 541 … … 548 548 549 549 <para>SWAT can be launched by pointing your web browser to 550 <uri>https://<replaceable><CA_DN_field></replaceable>:90 1</uri>.550 <uri>https://<replaceable><CA_DN_field></replaceable>:904</uri>. 551 551 Substitute the hostname listed in the DN field of the CA certificate 552 552 used with <application>Stunnel</application> for … … 570 570 <systemitem class='username'>root</systemitem> user:</para> 571 571 572 <screen role='root'><userinput>echo "swat 90 1/tcp" >> /etc/services</userinput></screen>572 <screen role='root'><userinput>echo "swat 904/tcp" >> /etc/services</userinput></screen> 573 573 574 574 <para>If <command>inetd</command> is used, the following command … … 591 591 service swat 592 592 { 593 port = 90 1593 port = 904 594 594 socket_type = stream 595 595 wait = no … … 607 607 608 608 <para>SWAT can be launched by pointing your web browser to 609 http://localhost:90 1.</para>609 http://localhost:904.</para> 610 610 611 611 </sect4>
Note:
See TracChangeset
for help on using the changeset viewer.