Skip to main content

How to change the NIC configuration?

53.How to change the NIC configuration?
Ans.
1. We can change the NIC configuration using network configuration tool.

2. In Linux enterprise Linux choose applications-->system settings-->network.

3. Highlight the device that you want to modify and click edit (on the toolbar).

4. The three tabs available from the dialog box are used for the following purpose:

5. General:
Here we can enter a nickname for the device and choose whether the device is activated when the system, allow user to enable and disable device, obtain IP information automatically by DHCP or manually enter the IP information for the device.

6. Route:
We can enter routes to other networks, we need to enter the network IP number as well as the gateway IP numbers.

7. Hardware Device:
This tab contains information about the hardware associated with the Ethernet device, we can assign device aliases here by clicking the add button.

8. After we are done with all the changes, click OK to return to the Network configuration dialog box.

9. Choose file-->save to write your configuration changes to the file.


Comments

Popular posts from this blog

Java,ES,QT practical files

All practical files: Click below to start download Uploaded on special request||||

Vidyalankar Question paper solutions

Download from their website: http://www.vidyalankar.org/index.aspx or just click here to download

Discuss security issues in Network File system.

71.Discuss security issues in Network File system. Ans. 1. NFS protocol version 3 and older have some security problems that make it unsuitable for use across the Internet and potentially unsafe for use even in trusted network. 2. One NFS weakness, in general terms, is the /etc/exports file, if a cracker is able to spoof or take over a trusted address, an address listed in /etc/exports then your exported NFS mount are accessible. 3. NFS has normal Linux file system access controls that take over once a client has mounted an NFS export, once this happens normal user and group permissions on the files take over access control. 4. The 1st way to defense is to use host access control, to limit access to services , particularly the portmapper, which has long been target of exploits attempts. 5. For this add the entries in /etc/hosts.clevy lockd, statd, mountd and rquoted. 6. Careful use of IS packet firewall, using netfilter, dramatically increases NFS server security. ...