Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Router configuration practice teaches you how to communicate with each other between three hosts and two network segments in Linux.

2025-04-08 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

Hello, everyone. I'm your heavenly saint.

It's time for Qi Tian Sheng to explain to you again.

Today I'm going to take you to do a big project. Do you believe it?

If you accidentally open this document, I hope it took me two days to read this blog post, so please respect my work and pretend to finish it, okay? Qi Tian Sheng would like to thank all the viewers.

First of all, welcome to watch the operation steps.

Let's get started.

Title:

Routing configuration practices:

01. The network information of the server needs to be configured according to the topology.

02. You need to allow linux server 01 to access linux server 03 through linux server 02

Transform linux server 02 into a router

03. Implement the test method that linux01 and linux03 can access each other, and prove that the hosts have interworking with each other through traceroute

Description: according to the route command learned above, realize the practice of routing configuration project

Let's take a look at this picture and get the following information

Machine A: 10.0.0.10 / 2

Gateway: 10.0.0.254

Machine b: 10.0.0.11 Compact 24

Gateway: 10.0.0.254

10.0.1.11/24

Gateway: 10.0.1.254

Machine C: 10.0.1.11 / 24

Gateway: 10.0.1.254

The first idea to do this problem is

First deal with the source host, we need a small white machine to avoid conflicts such as mac, etc. If you clone your current machine directly, you will find the mac error when you restart after the clone is configured with the network card. You can try it.

Make three ABC, three virtual machines, and connect the clone here.

Modify the virtual network of VM

Networks as ABC respectively

Make a xshell connection

Rename

Conduct testing and processing

One: deal with the source host

Before cloning

Use the following command

Vim/etc/sysconfig/network-scripts/ifcfg-eth0

Delete the mak address and UUID lines from the

Effect after deletion

[root@oldboyedu-39-nb ~] # > / etc/udev/rules.d/70-persistent-net.rules

Then it is correct to empty the file and execute the above command without reporting an error.

This is a network rule profile

[root@oldboyedu-39-nb ~] # echo' > / etc/udev/rules.d/70-persistent-net.rules' > > / etc/s' > > / etc/rc.local

And then write this command into

This is to write the above command to boot self-boot

[root@oldboyedu-39-nb] # shutdown-h now

Shut down the computer for cloning

This is the end of the operation on the source host

The second pair of VM processing 1 let's make a clone.

Right-click the server you want to clone and select manage clone

2 the operation of virtual network editor

The arrows are all different. Please follow my instructions.

Operation on B

Operate on C machine

Three pairs of virtual machines operate one pair of a hosts

2 the operation of B machine

Create a new eth2

3 pairs of C machines

Three pairs of optimization of the whole network

Establish the network segment of host A

Network segment takes effect

Modify B to make the second network card take effect.

Here are the commands

Vim / etc/sysctl.conf

The 9 lines of this file are changed from 0 to 1

Let's make the changes take effect.

Set c

If it is not set here, it will result in A sending data to C, but there is no reply, so set it.

Network segment takes effect

Five bugles of success

Thank you for reading my technical blog.

There is a hole in this document that careful friends will find, so please check it carefully.

If you can't find it, it doesn't affect your operation. please don't be afraid. the friendly reminder pit has something to do with the number 200.

Here is a question for you to think about whether the UUID and mac that you just deleted will be generated later.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report