Skip to main content

BUG: system-config-firewall-tui won't start in Centos 6.6


As reported in BUG 1123919 in Red Hat Bugzilla, system-config-firewall-tui (text user interface to configure firewall in RH family) also won't start in Centos 6.6 (complaining about python module):

# system-config-firewall-tui 
Traceback (most recent call last):
  File "/usr/bin/system-config-firewall-tui", line 29, in <module>
    import fw_tui
  File "/usr/share/system-config-firewall/fw_tui.py", line 34, in <module>
    import fw_nm
ImportError: No module named fw_nm
 And, here is easy way to fix this bug:
  • Install system-config-firewall
yum -y install system-config-firewall
  • copy file started with fw_n from /usr/share/system-config-firewall to temporary location (we use our home dir)
cp /usr/share/system-config-firewall/fw_n* ~
  • Remove system-config-firewall
yum -y remove system-config-firewall
  • Move file started with  fw_n back to /usr/share/system-config-firewall
mv fw_n* /usr/share/system-config-firewall/
  • Now, open system-config-firewall-tui 
    system-config-firewall-tui 
 It's solved now.

Comments

Popular posts from this blog

Mikrotik Bruteforce Login Prevention

Reference: WIKI FTP Bruteforce prevention This configuration allows only 10 FTP login incorrect answer per minutes add chain=input protocol=tcp dst-port=21 src-address-list=ftp_blacklist action=drop comment="drop ftp brute forcers" add chain=output action=accept protocol=tcp content="530 Login incorrect" dst-limit=1/1m,9,dst-address/1m add chain=output action=add-dst-to-address-list protocol=tcp content="530 Login incorrect" address-list=ftp_blacklist address-list-timeout=3h SSH Bruteforce prevention This will prevent SSH bruteforcer to be banned for 10 days after repetitive attemps add chain=input protocol=tcp dst-port=22 src-address-list=ssh_blacklist action=drop comment="drop ssh brute forcers" disabled=no add chain=input protocol=tcp dst-port=22 connection-state=new src-address-list=ssh_stage3 action=add-src-to-address-list address-list=ssh_blacklist address-list-timeout=10d comment="" disabled=no add chain=input

Notes: about de novo assembly

De novo assembly [SFG standford]: http://sfg.stanford.edu/denovo.html A combined approach for de novo dna sequence assembly of very short reads (IPSJ transaction on Bioinformatics): https://www.jstage.jst.go.jp/article/ipsjtbio/4/0/4_0_21/_article to be continued...

Load Balancing Speedy

Dalam situsnya, telkomspeedy.com tidak secara jelas menyebutkan produk-produk yang ditawarkannya, seperti berapa bandwidth internet yang ditawarkan dan fitur apa yang didapat. Dalam situs tersebut hanya dijelaskan bahwa untuk keterangan lebih lanjut agar menghubungi Unit Business Service Telkom di 021-500250. Dari layanan pelanggan bisnis tersebut, kami mendapatkan informasi bahwa bandwidth SPEEDY yang dijual sudah sampai dengan 50 Mbps dengan harga yang terjangkau. Namun, keterangan lebih lanjut, apakah daerah kami bisa dipasang bandwidth besar atau tidak harus datang (menanyakan) ke Plasa Telkom terdekat. Dari informasi Customer Service  Plasa Telkom,  bandwidth tersebut bisa didapat apabila jaringan yang ke pelanggan sudah menggunakan kabel fiber optik, atau istilah mereka FTTH (Fiber to the Home). Sayangnya, komplek perkantoran kami tidak ada FTTH (atau FTTO, O = office), yang ada hanya kabel tembaga dengan segala kekurangannya. Dengan kabel tersebut, bandwidth maksimal yang b