Page 276 - DCAP602_NETWORK_OPERATING_SYSTEMS_I
P. 276
Network Operating Systems-I
notes server = /usr/sbin/swat
only_from = 127.0.0.1
log_on_failure += USERID
disable = no
}
Note In the server line, I put the path I found earlier with whereis or find. It’s likely
that the last line will read disable=yes because many distributions don’t enable SWAT by
default. My version of this file was missing the port and groups lines, so I had to add them.
When you’re done editing the file, run /etc/init.d/xinetd restart, and SWAT will be ready
to work.
On older systems, you might have inetd instead of xinetd; in that case, look for /etc/inetd.
conf, which should include an entry like this:
# swat is the Samba Web Administration Tool
swat stream tcp nowait.400 root /usr/sbin/swat swat
Use /etc/init.d/inetd restart to activate your edits.
14.5.2 using swat
SWAT works by rewriting the configuration files at /etc/samba/smb.conf and restarting
Samba as needed. Unsupported parameters are deleted, parameters that have the default value
are ignored, and SWAT changes the order of the parameters, so your carefully handcrafted
configuration file may look rather bleak after SWAT is done with it.
Access SWAT by opening a browser and going to http://127.0.0.1:901. The home page provides
access to the man documentation pages and some extra Samba documentation, including some
complete books. You’ll have to install the samba-doc additional package to get the latter.
270 LoveLy professionaL university