Skip to main content

How to change the NIC configuration?

53.How to change the NIC configuration?
Ans.
1. We can change the NIC configuration using network configuration tool.

2. In Linux enterprise Linux choose applications-->system settings-->network.

3. Highlight the device that you want to modify and click edit (on the toolbar).

4. The three tabs available from the dialog box are used for the following purpose:

5. General:
Here we can enter a nickname for the device and choose whether the device is activated when the system, allow user to enable and disable device, obtain IP information automatically by DHCP or manually enter the IP information for the device.

6. Route:
We can enter routes to other networks, we need to enter the network IP number as well as the gateway IP numbers.

7. Hardware Device:
This tab contains information about the hardware associated with the Ethernet device, we can assign device aliases here by clicking the add button.

8. After we are done with all the changes, click OK to return to the Network configuration dialog box.

9. Choose file-->save to write your configuration changes to the file.


Comments

Popular posts from this blog

Explain process of setting up a NIC (Network interface card).

44.Explain process of setting up a NIC (Network interface card). Ans. 1. Network interface card (NIC) can be set-up by configuring the network card and internal network. 2. Before configuring network card we must check loopback (IP address 127.0.0.1) is working. 3. Even if the compute is not connected to outside network internet network configuration is required for some applications. This address is known as loopback device, and its IP address is 127.0.0.1 4. To check loopback device is configured or not, we use ‘ifconfig’ command it shows a device called ‘lo’ with the address 127.0.0.1, if this device and address is not shown there then loopback is not configured. 5. To configure it we can use command ifconfig lo 127.0.0.1 after that we need to use the ‘route’ command to give system a little more information about this interface for this ‘route add –net 127.0.0.0’ command is used, after this loopback is setup. 6. To configure a network card we will use ifconfig co...

List and explain all NFS server commands.

65.List and explain all NFS server commands. Ans. 1. exportfs: a) The exportfs command enables user to manipulate the list of current exports without editing /etc/exports. b) It also maintains the list of currently exported file system in /var/lib/nfs/etab. Example: The exportfs –a command initializes /var/lib/nfs/etab, synchronizes it with the contents of /etc/exports. c) To add a new export to etab and also /etc/exports the syntax is : #exportfs –o opts hostdir d) Example: #exportfs –o sync,rw 192.168.166.7:/demo The above command exports the directory /demo to client 192.168.166.7 with export option rw and sync. e) –v option of this command, lists currently exported filesystem. Example: #exportfs –v f) –u options unexports the filesystem as follow: Example: #exportfs –u 192.168.166.7:/demo 2. showmount: a) The showmount command provides information about clients and the file systems they have mounted. b) Syntax is : #showmount [-advhe] [host] ...

What are the disadvantages of Network file system (NFS)?

58.What are the disadvantages of Network file system (NFS)? Ans. 1. NFS is sensitive to network congestion/traffic which shows down NFS performance. 2. Busy disk activity on the NFS server badly affects NFS’s performance. 3. The performance enhancement incorporated in NFSv4 have increased NFS’s stability and reliability on high latency and heavily congested networks. 4. If user/client wants to mount some files which is not exported, then client’s system may get hang and this can be resolved with the help of mount option. 5. Is the disk or system exporting important data or application becomes unavailable, such as a disk crash or server failure, no one can access that resource. 6. NFS suffers from potential security problems because its designs assure a trusted networks. 7. The major weakness of most NFS implementation based on protocol’s other versions, that they are based on standard RPC which is unencrypted. 8. Sensitive information should never be exported f...