Home Operation and Maintenance Linux Operation and Maintenance What is the scope of the ifconfig command?

What is the scope of the ifconfig command?

Sep 11, 2020 am 10:23 AM

The scope of the ifconfig command is: 1. Use the ifconfig command to view the information of the network card, the code is [ifconfig [Interface]]; 2. Use the ifconfig command to configure the IP address of the network card, the code is [ifconfig eth0 192.168 .0.].

What is the scope of the ifconfig command?

Related learning recommendations: linux video tutorial

ifconfig command scope The ones are:

1. ifconfig is to check the network card information.

ifconfig [Interface]
Copy after login

Interface is optional. If this item is not added, information about all network cards in the system will be displayed. If you add this option, the specified network card information will be displayed

For example: ifconfig eth0

eth0 Link encap:Ethernet
            HWaddr 00:0C:29:F3:3B:F2
            inet addr:192.168.0.10 Bcast:192.168.0.255 Mask:255.255.255.0
            UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
            RX packets:78 errors:0 dropped:0 overruns:0 frame:0
            TX packets:104 errors:0 dropped:0 overruns:0 carrier:0
            collisions:0 txqueuelen:100
            RX bytes:11679 (11.4 Kb)
            TX bytes:14077 (13.7 Kb)
            Interrupt:10 Base address:0x1080
Copy after login

We can see

The first line: Connection type: Ethernet (Ethernet) HWaddr (hardware mac address)

Second line: IP address, subnet, mask of the network card

Third line: UP (represents the network card open status) RUNNING (represents the network cable of the network card is Continued) MULTICAST (supports multicast) MTU: 1500 (maximum transmission unit): 1500 bytes

The fourth and fifth lines: statistics on receiving and sending data packets

The seventh line: receiving , send data bytes statistics.

2. ifconfig configure the network card

Configure the IP address of the network card

ifconfig eth0 192.168.0.1 netmask 255.255.255.0
Copy after login

Configure the IP address and 24-bit mask of 192.168.0.1 on eth0 code. What if I want to configure an IP address of 192.168.1.1/24 on eth0? Use the following command

ifconfig eth0:0 192.168.1.1 netmask 255.255.255.0
Copy after login

and then use the ifconifg command to view it. You can see the information of the two network cards, which are: eth0 and eth0:0. If you want to add more IPs, then the network card names will be: eth0:1, eth0:2...fill in as many as you want. OK!

Configure the hardware address of the network card

ifconfig eth0 hw ether xx:xx:xx:xx:xx:xx
Copy after login

The hardware address of the network card will be changed. At this time, you can deceive the IP address bonding in the LAN.

Disable the network card

ifconfig eth0 down
Copy after login

Enable the network card

ifconfig eth0 up
Copy after login

The ifconfig command is very powerful and can also set the MTU of the network card, promiscuous mode, etc. I won’t introduce them one by one. You can study them yourself in time.

If you want to know more about programming learning, please pay attention to the php training column!

The above is the detailed content of What is the scope of the ifconfig command?. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
1 months ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
1 months ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
1 months ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Chat Commands and How to Use Them
1 months ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

How do I use regular expressions (regex) in Linux for pattern matching? How do I use regular expressions (regex) in Linux for pattern matching? Mar 17, 2025 pm 05:25 PM

The article explains how to use regular expressions (regex) in Linux for pattern matching, file searching, and text manipulation, detailing syntax, commands, and tools like grep, sed, and awk.

How do I monitor system performance in Linux using tools like top, htop, and vmstat? How do I monitor system performance in Linux using tools like top, htop, and vmstat? Mar 17, 2025 pm 05:28 PM

The article discusses using top, htop, and vmstat for monitoring Linux system performance, detailing their unique features and customization options for effective system management.

How do I implement two-factor authentication (2FA) for SSH in Linux? How do I implement two-factor authentication (2FA) for SSH in Linux? Mar 17, 2025 pm 05:31 PM

The article provides a guide on setting up two-factor authentication (2FA) for SSH on Linux using Google Authenticator, detailing installation, configuration, and troubleshooting steps. It highlights the security benefits of 2FA, such as enhanced sec

How do I manage software packages in Linux using package managers (apt, yum, dnf)? How do I manage software packages in Linux using package managers (apt, yum, dnf)? Mar 17, 2025 pm 05:26 PM

Article discusses managing software packages in Linux using apt, yum, and dnf, covering installation, updates, and removals. It compares their functionalities and suitability for different distributions.

How do I use sudo to grant elevated privileges to users in Linux? How do I use sudo to grant elevated privileges to users in Linux? Mar 17, 2025 pm 05:32 PM

The article explains how to manage sudo privileges in Linux, including granting, revoking, and best practices for security. Key focus is on editing /etc/sudoers safely and limiting access.Character count: 159

Key Linux Operations: A Beginner's Guide Key Linux Operations: A Beginner's Guide Apr 09, 2025 pm 04:09 PM

Linux beginners should master basic operations such as file management, user management and network configuration. 1) File management: Use mkdir, touch, ls, rm, mv, and CP commands. 2) User management: Use useradd, passwd, userdel, and usermod commands. 3) Network configuration: Use ifconfig, echo, and ufw commands. These operations are the basis of Linux system management, and mastering them can effectively manage the system.

How to interpret the output results of Debian Sniffer How to interpret the output results of Debian Sniffer Apr 12, 2025 pm 11:00 PM

DebianSniffer is a network sniffer tool used to capture and analyze network packet timestamps: displays the time for packet capture, usually in seconds. Source IP address (SourceIP): The network address of the device that sent the packet. Destination IP address (DestinationIP): The network address of the device receiving the data packet. SourcePort: The port number used by the device sending the packet. Destinatio

How to check Debian OpenSSL configuration How to check Debian OpenSSL configuration Apr 12, 2025 pm 11:57 PM

This article introduces several methods to check the OpenSSL configuration of the Debian system to help you quickly grasp the security status of the system. 1. Confirm the OpenSSL version First, verify whether OpenSSL has been installed and version information. Enter the following command in the terminal: If opensslversion is not installed, the system will prompt an error. 2. View the configuration file. The main configuration file of OpenSSL is usually located in /etc/ssl/openssl.cnf. You can use a text editor (such as nano) to view: sudonano/etc/ssl/openssl.cnf This file contains important configuration information such as key, certificate path, and encryption algorithm. 3. Utilize OPE

See all articles