Linux server security policy details (2)

Source: Internet
Author: User
Article Title: Linux server security policy details (2 ). Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.

2. Linux TCP/IP network configuration

Linux was designed for the network from the very beginning. It has built-in mature functions that were previously only visible in high-end enterprise products. However, despite these powerful capabilities, the configuration of the Linux network is far less complex than that of the Windows network. For example, Webmin, redhat-config-network, and YaST allow graphical configuration; for example, ifconfig and route allow viewing and modifying network parameters through the console or script; for example, netstat allows viewing individual network connections, and display their relationships with running processes.

1.2.1 Linux TCP/IP network configuration file

Unless otherwise specified, most configuration files in Red Hat Linux are in the/etc directory. The configuration file is shown in Table 1-5.


1.2.2 Network Configuration Tool

When installing the Linux release version, you must configure the network. You may already have an active eth0 from the initial configuration. This configuration may be sufficient for the current use, but you may need to make changes over time. The following describes different configuration items related to the IP network and the files and tools for using these configuration items.

 1. manually modify the configuration file

Manual configuration is the most direct method. Skilled Linux users prefer manual configuration when maintaining the system, because manual configuration has many advantages:

① After being familiar with commands, manual configuration is faster and does not need to be restarted;

② Be able to use advanced features of configuration commands;

③ It is easier to maintain the configuration file and identify system faults;

④ A deeper understanding of how the system is configured.

 2. Use Linux commands

Although Linux desktop applications develop rapidly, commands still have a strong vitality in Linux. Linux is an operating system composed of command lines. Its essence lies in the command line. No matter what level the graphic interface develops, this principle will not change. Linux network device operation Commands include ifconfig, ip, ping, netstat, route, ip, arp, hostname, and arpwatch.

 

[1] [2] [3] [4] [5] [6] Next page

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.