Skip to main content

Explain network configuration files in /etc/sysconfig/network-scripts.

41.Explain network configuration files in /etc/sysconfig/network-scripts.
Ans.
1. We can use the files in this directory to set the parameters for the hardware and software used for networking.

2. These scripts are used to enable network interface and set other network-related parameters.

3. Ifcfg-networkinterfacename
Red hat specifies a separate configuration file for each network interface.
In typical Red hat install, we have many different network interface configuration files that all follow the same basic syntax and format.

4. ifup and ifdown
These files are symlinks to /sbin/ifup and /sbin/ifdown, these scripts are called when the network service is started or stopped.
We call the scripts with the name of interface that we want to bring up or down.
For instance, to bring Ethernet interface down and up again after boot, we will type command
Ifup eth0
Ifdown eth0

Comments

Popular posts from this blog

Java,ES,QT practical files

All practical files: Click below to start download Uploaded on special request||||

Vidyalankar Question paper solutions

Download from their website: http://www.vidyalankar.org/index.aspx or just click here to download

Discuss security issues in Network File system.

71.Discuss security issues in Network File system. Ans. 1. NFS protocol version 3 and older have some security problems that make it unsuitable for use across the Internet and potentially unsafe for use even in trusted network. 2. One NFS weakness, in general terms, is the /etc/exports file, if a cracker is able to spoof or take over a trusted address, an address listed in /etc/exports then your exported NFS mount are accessible. 3. NFS has normal Linux file system access controls that take over once a client has mounted an NFS export, once this happens normal user and group permissions on the files take over access control. 4. The 1st way to defense is to use host access control, to limit access to services , particularly the portmapper, which has long been target of exploits attempts. 5. For this add the entries in /etc/hosts.clevy lockd, statd, mountd and rquoted. 6. Careful use of IS packet firewall, using netfilter, dramatically increases NFS server security. ...