Professional Documents
Culture Documents
Napoleon Rivera
ALU - DCS UNIX
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Introduction
What is Linux?
The Story of Linux.
How Linux is Built?
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Part 1
OS Installation RHEL
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
OS Installation
Prerequisite:
1. Vmware Workstation Version 8.0
2. RHEL_6.2i386 iso
3. Available disk space 25GB
Note: you can download WMware workstation
installer and RHEL6.2 ISO image from this link.
//RGUIRUELA2/iso
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
OS Installation
1. Select " Install or Upgrade an existing system
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
OS Installation
3. Select SKIP
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
OS Installation
3. Choose Language
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
OS Installation
4. Keyboard mapping
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
OS Installation
5. Select Storage Device
10
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
OS Installation
6. Click yes, discard any data
11
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
OS Installation
7. Type the server name
12
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
OS Installation
8. Choose the correct time zone
13
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
OS Installation
9. Provide the initial root password
14
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
OS Installation
10. Select Create Custom Layout
15
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
OS Installation
11. Use this disk partition pattern for your VM
16
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
OS Installation
12. Click Format
17
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
OS Installation
13. Click on next
18
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
OS Installation
14. Select Desktop and Redhat Enterprise Linux
19
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
OS Installation
15. Click on reboot
20
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
OS Installation
16. Click on Forward
21
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
OS Installation
17. Select yes and click Forward
22
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
OS Installation
17. Select yes and click Forward
23
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
OS Installation
17. Select yes and click Forward
24
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
OS Installation
17. Click Forward
25
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
OS Installation
17. Create non-administrative user (regular user)
26
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
OS Installation
17. Set Time
27
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
OS Installation
17. Login
28
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Part 2
Basic Commands
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
SHELL
USER
Shell
Application
Linux Kernel
Computer Hardware
30
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Bash Shell
Environmental Files
These are the hidden files that define the setup and behavior of the terminal.
In Unix, the filenames have no bash as the prefix.
Filename
Description
Script that is executed upon login.
.
bash_profil
e
.
Script that is executed upon logout.
bash_logout
.
Log file of the commands executed in the terminal
Command
Aliases
bash_histor
alias
- can be useful if you want to create a 'shortcut' to
y
.bashrc
Script executed upon login and where the aliases are normally
option/s.
placed.
a command with
Environmental Variables
env
-displays the environmental variables.
Examples are:
HOSTNAME=localhost.localdomain
TERM=xterm
SHELL=/bin/bash
HISTSIZE=1000
USER=joseph
HOME=/home/joseph
31 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Bash Shell
History
! - repeat specified command
!! - repeat previous command
^^ - repeat previous command with substitution
[ArrowUp] and [ArrowDown] - scroll through the command history (in bash)
history n command followed by the number of last commands to show
!n execute the nth command
Autocomplete
[Tab][Tab] - prints a list of all available commands. This is just an example of
autocomplete with no restriction on the first letter.
x[Tab][Tab] - prints a list of all available completions for a command, where the
beginning is ``x''
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
33
Description
Checks servers OS, hostname, kernel build, date&time,
architecture etc...
Check servers uptime
free
Displays top CPU process. It can sort the tasks by CPU usage,
memory usage and runtime.
Display memory usage
df
du
lspci
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Description
pwd
ls
cd
File Navigation
/ - root directory
./ - current directory
./command_name
- run a command in the current directory when the current
directory is not on the path
../ - parent directory
~ - home directory
34
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Pathnames
Absolute Pathnames
Absolute is typing the complete pathname (/ is the
reference)
[ionrivera@sandbox]$ cd /etc/yum
[ionrivera@sandbox]$
Brings you to the /etc/yum folder
Relative Pathnames (./)
[ionrivera@sandbox]$ ls
pluginconf.d yum-updatesd.conf
[ionrivera@sandbox]$ cd ./pluginconf.d
35
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
36
Description
Makes a directory
Determines file type
Displays the content of the file
to concatenate or type the content of the file on screen
Changes file timestamps
Copies files or directories
Moves files or directories. It is also used as renaming tool.
Deletes files or directories
Deletes an empty directory
Makes a link or pointer
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Part 3
User and Group
Administration
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
38
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
39
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
useradd m user_name
# useradd m ionrivera
40
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
41
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Deleting User
Select the user to be deleted and click on Delete. A confirmation
dialog will appear providing the option to delete the user's home
directory and temporary files. If you wish to proceed, click on
Delete.
A user account may also be deleted from command-line using the
userdel utility:
userdel user_name
It is also possible to remove the user's home directory and
mail spool as part of the deletion process:
userdel -r user_name
42
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
43
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Linux uses a user private group ( UPG) scheme, which makes UNIX
groups easier to manage. A user private group is created whenever a
new user is added to the system.
It has the same name as the user for which it was created and that
user is the only member of the user private group.
44
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Option
Description
-f, --force
-ggid
-K, --keykey=value
-o, --non-unique
-p, --passwordpassword
-r
45
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Modifying Group
Using Manager tool to modify groups. Select the System desktop menu
Groups from the Administration sub-menu to launch the Groups
Manager tool.
46
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Modifying Group
To add an existing user to an existing group from the command-line.
usemod G group_name1 user_name
To add an existing user to a number of existing groups.
Usermod G group_name1_group_name2,group_name3 user_name
47
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Deleting Group
A group may be deleted from a system using the groupdel
utility.
groupdel group_name
Note that if the group to be deleted is the primary group for any
user it cannot be deleted. The user must first be deleted, or
assigned a new primary group using the usermod command:
usermod g user_name
groupdel group_name
48
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Password Expiration
To configure password expiration for a user from a shell prompt, run the
following command as root:
chage [options] username
Force immediate password expiration by running the following command
as root:
chage -d 0 username
49
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Password Expiration
Option
Description
-ddays
-Edate
-Idays
-l
-mdays
-Mdays
-Wdays
50
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Shadow Password
In environments with multiple users, it is very important to use shadow
passwords provided by the shadow-utils package to enhance the
security of system authentication files. For this reason, the installation
program enables shadow passwords by default.
Shadow passwords improve system security by moving encrypted
password hashes from the world-readable /etc/passwd file to
/etc/shadow, which is readable only by the root user.
stoShadow passwords re information about password aging.
Shadow passwords allow the /etc/login.defs file to enforce security
policies.
51
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
52
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
53
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
54
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
/etc/passwd
User account information.
/etc/shadow
Secure user account information.
/etc/group
Group account information.
/etc/gshadow
Secure group account information.
/etc/default/useradd
Default values for account creation.
/etc/skel/
Directory containing default files.
/etc/login.defs
Shadow password suite configuration.
55
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
UID
GID
Home
Directory
root
bin
daemon
sys
adm
tty
disk
lp
mem
kmem
wheel
cdrom
sync
shutdown
halt
mail
news
uucp
operator
0
1
2
3
4
5
6
7
8
9
10
11
0
1
2
3
4
5
6
7
8
9
10
11
(0)
(0)
(0)
12
13
14
(0)
/root
/bin
/sbin
/var/adm
/var/spool/lpd
/sbin
/sbin
/sbin
/var/spool/mail
/var/spool/news
/var/spool/uucp
/root
56
Shell
Packages
/bin/bash
setup
/sbin/nologin
setup
/sbin/nologin
setup
/bin/bash
setup
setup
setup
setup
/sbin/nologin
setup
setup
setup
setup
udev,MAKEDEV
/bin/sync
setup
/sbin/shutdown
/sbin/halt
setup
setup
/sbin/nologin
setup
/sbin/nologin
setup
/sbin/nologin
setup
/sbin/nologin
setup
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Standard Groups
Group
GID
root
bin
daemon
sys
adm
0
1
2
3
4
tty
disk
lp
6
7
mem
kmem
wheel
mail
uucp
10
12
14
man
15
games
20
gopher
30
video
39
dip
40
ftp
50
57
Members
root
root,
root,
root,
root,
bin, daemon
bin, daemon
bin, adm
adm, daemon
root
daemon, lp
root
mail, postfix
uucp
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
lock
54
Part 4
Linux Filesystems,
Files and Directories
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
59
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
60
mount point
fs-type options
dump-freq pass-
/
ext3
defaults
0 1
/boot
ext3
defaults
0 2
/dev/pts
devpts gid=5,mode=620 0 0
/home
ext3
defaults
0 2
/proc
proc
defaults
0 0
/dev/shm
tmpfs defaults
0 0
swap
swap defaults
0 0
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Mount Point
filesystem.
Filesystem Type -
Options
Dump-freq
Normally set to
Pass-num
controls the order in which fsck checks the device
for errors at
boot time. The root device should
be 1. Other partitions should
be either 2 (to
check after root) or 0 (to disable checking for the
partition altogether.
61
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
62
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
ext3 ext4 -
it allows journaling
smb -
63
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Mounting/Unmounting of Filesystems
To Mount:
$ mount t <fstype> <device> <mount point>
e.g. mount t nfs /dev/sda9 /apps
To Unmount:
$ cd /
$ umount <mount point>
e.g. umount /apps
Note: Make sure you are not working on the current mount
directory, otherwise, it would show an error device busy
while unmounting.
64
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Filesystem Tools
mkfs
Syntax:
mkfs t <fstype><device>
Example:
mkfs -t ext2 /dev/sda9
fsck
Syntax:
fsck t <fstype> <device>
Example:
fsck t ext2 /dev/sda9
65
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Filesystem Tools
tune2fs
Syntax:
tune2fs c <numeric> -i <string> <device>
Example:
tune2fs c 120 i 3m /dev/sda9
Where:
-c = maximum mount count
-i = interval between checks
To disable checks:
tune2fs c -1 i 0 /dev/sda9
66
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
<
Example:
sort < file1.txt
Above, sorts the content of file1.txt
>
Example:
cat file1.txt > file2.txt
Above example, displays the content of file1.txt and redirects its output
to file2.txt
>>
Example:
cat file1.txt >> file2.txt
This displays the content of file1.txt and redirects to file2.txt by
inserting it into next line.
|
67
Example:
ps fax | grep <string>| wc l
Above example, displays the output of ps based on target string and
counts its line number. Command displays the output of the last
command wc -l
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
68
69
Part 3: Activity
1. Add a virtual disk into your virtual machine (e.g. 2 GB in size)
2. Format the disk with filesystem type ext3
Commands:
mkfs t ext3 <device>
mkfs.ext3 <device>
3. Mount the disk with mountpoint format (/firstname_lastname)
Command:
mount t ext3 <device> /firstname_lastname
4. Unmount the filesystem. Ran fsck to confirm if there are
inconsistencies. Add it into /etc/fstab to automatically mount during
boot-up.
Command:
umount /firstname_lastname
fsck.ext3 <device>
5. Reboot. Filesystem should be automatically mounted after reboot.
6. After reboot, create 2 directories using names, <firstname>
<lastname> into your mounted directory.
7. After creating the directories, create a file on each directory and put
a content/data into it.
71
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Part 5
Help Utilities
User Password
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
73
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
passwd l <username>
passwd u <username>
74
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Password Aging
Enabling password aging by editing login.defs
cat /etc/login.defs
75
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Password Aging
Edit the /etc/default/useradd
The INACTIVE settings indicate
when to change the account to
inactive after the password has
expired
The EXPIRE setting can set an
explicit expiration date for all new
users in the format YYYY-MM-DD
Note:
The above mention step only affect
newly created user after the
settings has been change. In order
to update existing user setting
please use chage command.
76
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Password Aging
To update the settings for users
that already exist, use the chage
tool
chage -M 60 {username}
This will set username
PASS_MAX_DAYS setting to 60 days
and update the shadow file
accordingly.
77
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Part 6
Sudo
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
SUDO
Why we need to use sudo
- Elevate user privileges
- Execute commands from another user
- Logging logs sudo executed commands
79
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
SUDO
How to execute sudo
sudo su sudo system-config-network
sudo reboot
80
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
SUDO
Edit /etc/sudoers file
vi /etc/sudoers
-edit manually the /etc/sudoers file
visudo
- vi environment
- checks if there syntax error
Sample checking:
visudo
>>> /etc/sudoers: syntax error near line 22 <<<
What now?
81
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
SUDO
82
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
SUDO
Edit /etc/sudoers file
Defining User Alias
User_Alias ALIAS_NAME = user1, user2
Examples:
##
user
User_Alias
User_Alias
User_Alias
83
MACHINE=COMMANDS
FULLTIMERS = millert, mikef, dowdy
PARTIMERS = ed, edd, eddy
OLDTIMERS = michael, jackson
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
SUDO
Runas_Alias OP = operator
Runas_Alias DB = oradb, sysbase
84
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
SUDO
Edit /etc/sudoers file
Defining Host Alias
Host_Alias ALIAS_NAME = host1, host2
Examples:
Host_Alias SPARC = sun10, sparcstation10
Host_Alias LINUX = rhel6, rhel5, rhel4
Host_Alias
NFS = nfssrv1, nfssrv2
85
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
SUDO
86
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
SUDO
87
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Part 7
File Permissions
and Access
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
89
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
90
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
91
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Values
r
w
x
Read permission
Write permission
Execute permission
read 4
write 2
execute 1
Example:
chmod 777 f1
92
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Set 1
Set 2
Set 3
u = user
+ = add
r =read
g = group
- = remove
w = write
o = others
= = set
x = execute
a = all
93
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Octal Method:
rwxrwxrwx = complete file permission
rwx||rwx||rwx
3 sets of rwx:
Set 1 is the permission for user owner
Set 2 is the permission for the group owner
Set 3 is the permission for others
94
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Octal Method:
Octal values:
R=4
w=2
x=1
95
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
96
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
97
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
98
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
99
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
100 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
101 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
102 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Part 7
ACL
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
ACL
OVERVIEW
- Why ACLs
- Types of ACL entries
- Enable ACL
- Viewing ACLs
- Applying ACLs
104 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
ACL
Why ACLs
- File owner controls permission
- Want to give specific user or group ability to
access to files and directories
105 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
ACL
Types of ACL Entries
Entry type
Owner
Named user
Owning group
Named group
Mask
Others
Text form
user::rwx
user:name:rwx
group::rwx
group:name:rwx
mask::rwx
other::rwx
106 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
ACL
Enable acl on filesystem
Set acl on filesystem
mount o acl
/dev/<device> /<mountpoint>
1
107 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
ACL
ACL
Set ACL on file / directory - setfacl
- User command utility to set, modify, or delete ACLs
on a file
- Can be ran by file owner or anyone given permission
to modify permissions
# setfacl m u:root:rwx file
Where:
-m
- modify
u
type of acl(user)
root name of the user
rwx type of permission(read only,write and
execute)
109 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
ACL
Examples:
setfacl
setfacl
setfacl
setfacl
s
m
u
d
u:alice:+rx:i myFile
o::drwx myFile
myFile
u:alice myFile
110 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Part 8
Linux Networking
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Ping
Traceroute
113 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Ifconfig
114 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Ifconfig
# ifconfig
check the property of a single
network interface.
#ifconfig eth0
assign an ip on the fly
# ifconfig <IP> <netmask>
<device>
115 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Route
116 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Route
Netstat
Ethtool
119 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Thank you
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.