


There are also software solutions for changing the MAC address.Īn Internet Protocol ( IP) address is an identification number permanently or temporarily assigned to each device connected to a computer network using the Internet Protocol. This last statement is nowadays a little less true with virtualization. It is composed of: 3 bytes of the manufacturer identifier and 3 bytes of the serial number. It consists of 6 bytes often given in hexadecimal form (for example 5E:FF:56:A2:AF:15). This is sometimes referred to as the hardware address. It is used to broadcast information to all the machines on the network.Ī MAC address is a physical identifier written in the factory onto the device. The last address of a range is the broadcast address. It is used to identify networks and to route information from one network to another. The first address of a range is the network address. The first address of a range as well as the last one have a particular role: There are also specific addresses within a network, which must be identified. the host address ( HostID) by performing a bitwise logical AND between the IP address and the complement of the mask.the network address ( NetID or SubnetID) by performing a bitwise logical AND between the IP address and the mask.The subnet mask is a set of 4 bytes intended to isolate: the identifier of the host in the network.the fixed part, identifying the network.

IP addresses are used for the proper routing of messages (packets). The notation called CIDR is more and more frequent: 192.168.1.10/24 The minimum parameters to be defined for the machine are: the configuration of a DNS server and the implementation of name resolution.the configuration of a gateway to reach a remote server.integration in a LAN (local area network).To illustrate this chapter, we will use the following architecture. Troubleshoot the network of a workstation. Objectives: In this chapter you will learn how to:Ĭonfigure a workstation to use a static configuration Ĭonfigure a workstation to use a gateway Ĭonfigure a workstation to use DNS servers In this chapter you will learn how to work with and manage the network. NoSleep.sh - A simple Configuration Script Verifying DISA STIG Compliance with OpenSCAP - Part 2 Host-based Intrustion Detection System (HIDS)īash - Conditional structures if and case Building and Installing Custom Linux KernelsĪutomatic Template Creation - Packer - Ansible - VMware vSphere
