Network Configuration Flashcards

1
Q
Private
#MACVlan
A

MACVlan instances cannot talk to each other, only external communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
VEPA (Virtual Ethernet Port Aggregator)
#MACVlan
A

Instances can talk to each other through external hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Bridge
#MACVlan
A

Instances are allowed internal and external communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Passthru
#MACVlan
A

Instances are directly connected to the interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Source
#MACVlan
A

Employs MAC filtering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is the udev?

A

The udev (user device facility) is used to manage network hardware interfaces for the Linux kernel. Sometimes changes are needed to rename interfaces or change configurations to match hardware MAC addresses.

It is common to use the local administration directory for adding new rules. When rules are processed, all the files in the rules directories are combined and sorted in a lexical order.

/etc/udev/rules.d/70-persistent-net.rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what’s the command to change the maximum transmission unit MTU?

A

example: ifconfig eth0 mtu 1492
example: ip link set mtu 1492 dev eth0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

how to change the link speed

A

ethtool -s eht0 speed 1000 duplex full

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

how do you check the link status

A

ip -s link

ip -s link show dev eth0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

how do you manually set a network layer 3 address

A

ip addr add [ip address]/[subnet mask] dev [eth?]
or
ipconfig peth0? [ip address] netmask [subnet mask]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
/etc/resolv.conf
#DHCP
A

This is the traditional static file used to configure the resolver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
dnsmasq
#DHCP
A

Sets up in mini caching DNS server and may alter the resolver configuration to look at dnsmasq instead of the items listed in /etc/resolv.conf.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

systemd.resolved

A

As of systemd version 233, the systemd-resolved is available. It provides a DNS stub listener on IP address 127.0.0.53 on the loopback adapter, and takes input from several files, including: /etc/systemd/resolved.conf, /etc/systemd/network/*.network and any DNS information made available by other services, like dnsmasq.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Symmetric Encryption

A

Symmetric encryption uses a single secret shared key, which both parties must have to communicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Asymmetric Encryption

A

Asymmetric encryption uses mathematically-related public and private keys to communicate.

Plain text encrypted with an asymmetric public key can only be decrypted by using the corresponding private key. You cannot decrypt the cipher text using the same key which was used for encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Key Exchange

A

By using a combination of symmetric and asymmetric encryption, you can overcome the problems associated with both. The presented picture gives you an example of how to do it.

  • Party One creates a session key using a symmetric algorithm.
  • Party One then encrypts the session key, using the public key of Party Two, and sends the encrypted session key to Party Two.
  • Party Two uses their private key to decrypt the session key.
  • Both parties now communicate using the symmetric session key for encryption.