Tag:Network segment

  • Ubuntu configuring the network through netplan tutorial

    Time:2022-7-27

    Ubuntu configuring the network through netplan tutorial Ubuntu through Netplan configuration network tutorial 1、 Netplan configuration process 1. Netplan configuration process 1. The netplan default configuration file is in the /etc/netplan directory. You can find it with the following command: 1. The default configuration file of Netplan is in the /etc/netplan directory. You can find it with the following command: ls /etc/netplan/ You can see the name of the configuration file. You can see the configuration file name. 2. View the contents of the netplan network configuration file […]

  • Simple simulation implementation of go rip protocol

    Time:2022-7-12

    Rip is a dynamic routing protocol. A router regularly exchanges routing tables with its adjacent routers. The router updates its own routing table according to the routing table sent by the other party through a certain algorithm. Thus, the routing tables of all routers in the whole autonomous system are dynamically updated. If you just […]

  • VirtualBox NAT network configuration

    Time:2022-7-11

    VirtualBox itself comes with a connection mode of NAT network address translation, which can be used directly without configuration. Since there are ready-made direct options, why configure NAT networks?The reason is that the default NAT network has a preset network segment * * 10.0.2.0/24 * *, which is not a problem.Only when the project VPN […]

  • CTF competition simulation CFS three-layer intranet roaming

    Time:2022-7-6

    CTF competition simulation CFS three-layer intranet roaming Environmental Science: Three virtual machines, three networks. target 1:192.168.161.178 ,192.168.52.132 (linux) target 2:192.168.52.133, 192.168.72.131 (linux) target 3: 192.168.72.132 (win7) Attackers can only communicate with target 1 Internet Management Visit 192.168.161.178:80 It was found that it was the version of thinkphp5 TP vulnerability exploitation Using TP5 detection tool Vulnerability […]

  • Elasticsearch uses series docker to build elasticsearch clusters

    Time:2022-6-20

    Elasticsearch uses series es introduction and environment construction Elasticsearch using series es basic operations of adding, deleting, querying and modifying +ik word segmentation Elasticsearch uses the series – basic query and aggregate query +sql plug-in Elasticsearch uses series – Net6 docking elasticsearch Elasticsearch uses series docker to build elasticsearch clusters 1、 System environment preparation Three […]

  • MySQL shares databases in the LAN: if you find a database named by a space, you can either run away or beat the head of the database!

    Time:2022-6-18

    MySQL for LAN database sharing When you want to use Mysql to share databases in the LAN, you must pay attention to that the IP addresses of the computers in the experiment need to be in the same network segment, and these computers need to be installed with MySQL services. Don’t talk too much, start […]

  • BGP evpn routing information

    Time:2022-6-15

    Type2 Routing – mac/ip routing Host MAC address advertisement To implement the same subnet hostSecond floor mutual visitsVteps at both ends need to be mutuallyLearning host mac。 Vteps as BGP evpn peers can announce the acquired host Mac to each other by exchanging mac/ip routes. The MAC address length and MAC address fields are the […]

  • Detailed explanation of three network configurations of Linux

    Time:2022-6-11

    Before introducing the network mode, use a few simple commands about the network Ifup eth0 / / start the network card eth0 Ifdown eth0 / / turn off the network card eth0 /Etc/network/interfaces / / network configuration file /etc/init. D/networking / / network service location /etc/init. D/networking restart / / restart the network /etc/resolv. Conf […]

  • Seven ways to use the ping command

    Time:2022-6-11

    Official account: markerhub, website:https://markerhub.com Small hub reading: To tell you the truth, I thought Ping was just used to judge whether the network was connected or not. Hahahaha~ By Pheenet finnett https://www.toutiao.com/a6783… A friend asked me if I could tell you about the use of the ping command. In fact, we mentioned some about the […]

  • The seven usages of ping command can be understood after reading!

    Time:2022-5-27

    Official account:MarkerHub, website:https://markerhub.com Read by little hub: To tell you the truth, I thought Ping was just used to judge whether the network is connected or not. Ha ha~ Author: Pheenet feinit https://www.toutiao.com/a6783… A friend said, can you talk about the use of the ping command? In fact, we mentioned some about the use of […]

  • Agent ARP of HCNP Routing & Switching

    Time:2022-5-24

    Previously, we learned about the topics related to port isolation. For review, please refer tohttps://www.cnblogs.com/qiuhom-1874/p/16186451.html; Today, let’s talk about ARP agent related topics; The solution of port isolation As we can see from the packet capture above, when the ports under the same VLAN are isolated by two-way ports or one-way ports, the corresponding ports […]

  • MUX VLAN of HCNP Routing & Switching

    Time:2022-5-23

    Previously, we learned about the topics related to agent ARP. Please refer to the reviewhttps://www.cnblogs.com/qiuhom-1874/p/16188230.html; Today, let’s talk about the topic of VLAN isolation MUX VLAN; VLAN isolation – port isolation review In the same VLAN of the same network segment, in order to ensure that the ports do not interfere with each other, we […]