HP-UX System Administrator's Guide: Overview HP-UX 11i v3 (B3921-90011, September 2010)
Example 4-1 Testing network performance using ping
To test a network connection between two systems called “thissystem” and “thatsystem”,
from a local command prompt on “thissystem” enter the command:
/usr/sbin/ping thatsystem
PING thatsystem.xxx.yyy.com:
64 byte packets
64 bytes from 10.17.123.456: icmp_seq=0. time=1. ms
64 bytes from 10.17.123.456: icmp_seq=1. time=0. ms
64 bytes from 10.17.123.456: icmp_seq=2. time=0. ms
64 bytes from 10.17.123.456: icmp_seq=3. time=0. ms
Ping will keep sending/receiving packets until you stop it by using the interrupt character (usually
CTRL-C). It will then terminate the packet sending and report the final performance statistics:
----thatsystem.xxx.yyy.com PING Statistics----
4 packets transmitted, 4 packets received, 0% packet loss
round-trip (ms) min/avg/max = 0/0/1
Tools for Monitoring the Performance of Applications
Applications running on HP Integrity Servers can be extensively profiled using the HP Caliper
performance monitoring tool (Caliper). While Caliper is capable of monitoring whole-server
performance, it is primarily an application profiling tool.
Caliper makes extensive use of hardware features on HP Integrity Servers and can run on both
HP-UX 11i and Linux operating systems.
Data Protection Tools
Security of servers, networks, and data has never been more important than it is today. HP-UX
has many tools for securing your servers and data.
For most HP-UX users, securing your servers and data from unauthorized access ranges from
important to critical. Unauthorized access (whether malicious or accidental) is only one of many
threats to the integrity and security of your data. Others include:
• Accidental destruction or removal of data by poorly behaving software
• Accidental destruction or removal of data by authorized users
• Storage device failures
• Other hardware failures that corrupt data
• Other hardware failures that prevent access to data
• Physical plant and equipment destruction (for example from fires, floods, and earthquakes)
There are HP-UX based tools to protect your data from all of these potential threats.
Protecting Against Unauthorized Access to Your Servers and Data
HP-UX can be configured to run in either of two modes:
Standard Mode Offers traditional security features found in UNIX systems (accounts,
groups, file access privileges, and so on). Passwords are stored (encrypted)
in the /etc/passwd file.
In addition to the traditional security features mentioned previous, HP-UX
running in standard mode has an extended set of security features (for
example HP-UX Shadow Passwords) that significantly increase the security
of your system without having to convert it to Trusted Mode. These
additional features are fully explained in the HP-UX 11i Security Containment
Administrator’s Guide. Additional security information is located in the
HP-UX System Administrator’s Guide: Security Management document.
104 System Administration Tools