Network Configuration Flashcards
Private #MACVlan
MACVlan instances cannot talk to each other, only external communication.
VEPA (Virtual Ethernet Port Aggregator) #MACVlan
Instances can talk to each other through external hardware.
Bridge #MACVlan
Instances are allowed internal and external communication.
Passthru #MACVlan
Instances are directly connected to the interface.
Source #MACVlan
Employs MAC filtering.
what is the udev?
The udev (user device facility) is used to manage network hardware interfaces for the Linux kernel. Sometimes changes are needed to rename interfaces or change configurations to match hardware MAC addresses.
It is common to use the local administration directory for adding new rules. When rules are processed, all the files in the rules directories are combined and sorted in a lexical order.
/etc/udev/rules.d/70-persistent-net.rules
what’s the command to change the maximum transmission unit MTU?
example: ifconfig eth0 mtu 1492
example: ip link set mtu 1492 dev eth0
how to change the link speed
ethtool -s eht0 speed 1000 duplex full
how do you check the link status
ip -s link
ip -s link show dev eth0
how do you manually set a network layer 3 address
ip addr add [ip address]/[subnet mask] dev [eth?]
or
ipconfig peth0? [ip address] netmask [subnet mask]
/etc/resolv.conf #DHCP
This is the traditional static file used to configure the resolver.
dnsmasq #DHCP
Sets up in mini caching DNS server and may alter the resolver configuration to look at dnsmasq instead of the items listed in /etc/resolv.conf.
systemd.resolved
As of systemd version 233, the systemd-resolved is available. It provides a DNS stub listener on IP address 127.0.0.53 on the loopback adapter, and takes input from several files, including: /etc/systemd/resolved.conf, /etc/systemd/network/*.network and any DNS information made available by other services, like dnsmasq.
Symmetric Encryption
Symmetric encryption uses a single secret shared key, which both parties must have to communicate.
Asymmetric Encryption
Asymmetric encryption uses mathematically-related public and private keys to communicate.
Plain text encrypted with an asymmetric public key can only be decrypted by using the corresponding private key. You cannot decrypt the cipher text using the same key which was used for encryption.