Anfälligkeitssuche        Suche in 191973 CVE Beschreibungen
und 86218 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.150183
Kategorie:Policy
Titel:Linux: BOOTPROTO in /etc/sysconfig/network-scripts/*
Zusammenfassung:Interface configuration (ifcfg) files control the software;interfaces for individual network devices. As the system boots, it uses these files to determine;what interfaces to bring up and how to configure them. These files are usually named ifcfg-name,;where the suffix name refers to the name of the device that the configuration file controls. By;convention, the ifcfg file's suffix is the same as the string given by the DEVICE directive in the;configuration file itself.;;The BOOTPROTO setting is used to determine which protocol to use at boot time:;; - none: No boot-time protocol should be used;; - bootp: The bootp now pump protocol should be used;; - dhcp: The dhcp protocol should be used;; - static: Use static IP address
Beschreibung:Summary:
Interface configuration (ifcfg) files control the software
interfaces for individual network devices. As the system boots, it uses these files to determine
what interfaces to bring up and how to configure them. These files are usually named ifcfg-name,
where the suffix name refers to the name of the device that the configuration file controls. By
convention, the ifcfg file's suffix is the same as the string given by the DEVICE directive in the
configuration file itself.

The BOOTPROTO setting is used to determine which protocol to use at boot time:

- none: No boot-time protocol should be used

- bootp: The bootp now pump protocol should be used

- dhcp: The dhcp protocol should be used

- static: Use static IP address

CVSS Score:
0.0

CVSS Vector:
AV:L/AC:H/Au:S/C:N/I:N/A:N

CopyrightCopyright (C) 2020 Greenbone Networks GmbH

Dies ist nur einer von 86218 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2020 E-Soft Inc. Alle Rechte vorbehalten.