In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-04-08 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
Hello, everyone. I'm your heavenly saint.
It's time for Qi Tian Sheng to explain to you again.
Today I'm going to take you to do a big project. Do you believe it?
If you accidentally open this document, I hope it took me two days to read this blog post, so please respect my work and pretend to finish it, okay? Qi Tian Sheng would like to thank all the viewers.
First of all, welcome to watch the operation steps.
Let's get started.
Title:
Routing configuration practices:
01. The network information of the server needs to be configured according to the topology.
02. You need to allow linux server 01 to access linux server 03 through linux server 02
Transform linux server 02 into a router
03. Implement the test method that linux01 and linux03 can access each other, and prove that the hosts have interworking with each other through traceroute
Description: according to the route command learned above, realize the practice of routing configuration project
Let's take a look at this picture and get the following information
Machine A: 10.0.0.10 / 2
Gateway: 10.0.0.254
Machine b: 10.0.0.11 Compact 24
Gateway: 10.0.0.254
10.0.1.11/24
Gateway: 10.0.1.254
Machine C: 10.0.1.11 / 24
Gateway: 10.0.1.254
The first idea to do this problem is
First deal with the source host, we need a small white machine to avoid conflicts such as mac, etc. If you clone your current machine directly, you will find the mac error when you restart after the clone is configured with the network card. You can try it.
Make three ABC, three virtual machines, and connect the clone here.
Modify the virtual network of VM
Networks as ABC respectively
Make a xshell connection
Rename
Conduct testing and processing
One: deal with the source host
Before cloning
Use the following command
Vim/etc/sysconfig/network-scripts/ifcfg-eth0
Delete the mak address and UUID lines from the
Effect after deletion
[root@oldboyedu-39-nb ~] # > / etc/udev/rules.d/70-persistent-net.rules
Then it is correct to empty the file and execute the above command without reporting an error.
This is a network rule profile
[root@oldboyedu-39-nb ~] # echo' > / etc/udev/rules.d/70-persistent-net.rules' > > / etc/s' > > / etc/rc.local
And then write this command into
This is to write the above command to boot self-boot
[root@oldboyedu-39-nb] # shutdown-h now
Shut down the computer for cloning
This is the end of the operation on the source host
The second pair of VM processing 1 let's make a clone.
Right-click the server you want to clone and select manage clone
2 the operation of virtual network editor
The arrows are all different. Please follow my instructions.
Operation on B
Operate on C machine
Three pairs of virtual machines operate one pair of a hosts
2 the operation of B machine
Create a new eth2
3 pairs of C machines
Three pairs of optimization of the whole network
Establish the network segment of host A
Network segment takes effect
Modify B to make the second network card take effect.
Here are the commands
Vim / etc/sysctl.conf
The 9 lines of this file are changed from 0 to 1
Let's make the changes take effect.
Set c
If it is not set here, it will result in A sending data to C, but there is no reply, so set it.
Network segment takes effect
Five bugles of success
Thank you for reading my technical blog.
There is a hole in this document that careful friends will find, so please check it carefully.
If you can't find it, it doesn't affect your operation. please don't be afraid. the friendly reminder pit has something to do with the number 200.
Here is a question for you to think about whether the UUID and mac that you just deleted will be generated later.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.