


The scope of the ifconfig command is: 1. Use the ifconfig command to view the information of the network card, the code is [ifconfig [Interface]]; 2. Use the ifconfig command to configure the IP address of the network card, the code is [ifconfig eth0 192.168 .0.].
Related learning recommendations: linux video tutorial
ifconfig command scope The ones are:
1. ifconfig is to check the network card information.
ifconfig [Interface]
Interface is optional. If this item is not added, information about all network cards in the system will be displayed. If you add this option, the specified network card information will be displayed
For example: ifconfig eth0
eth0 Link encap:Ethernet HWaddr 00:0C:29:F3:3B:F2 inet addr:192.168.0.10 Bcast:192.168.0.255 Mask:255.255.255.0 UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:78 errors:0 dropped:0 overruns:0 frame:0 TX packets:104 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:100 RX bytes:11679 (11.4 Kb) TX bytes:14077 (13.7 Kb) Interrupt:10 Base address:0x1080
We can see
The first line: Connection type: Ethernet (Ethernet) HWaddr (hardware mac address)
Second line: IP address, subnet, mask of the network card
Third line: UP (represents the network card open status) RUNNING (represents the network cable of the network card is Continued) MULTICAST (supports multicast) MTU: 1500 (maximum transmission unit): 1500 bytes
The fourth and fifth lines: statistics on receiving and sending data packets
The seventh line: receiving , send data bytes statistics.
2. ifconfig configure the network card
Configure the IP address of the network card
ifconfig eth0 192.168.0.1 netmask 255.255.255.0
Configure the IP address and 24-bit mask of 192.168.0.1 on eth0 code. What if I want to configure an IP address of 192.168.1.1/24 on eth0? Use the following command
ifconfig eth0:0 192.168.1.1 netmask 255.255.255.0
and then use the ifconifg command to view it. You can see the information of the two network cards, which are: eth0 and eth0:0. If you want to add more IPs, then the network card names will be: eth0:1, eth0:2...fill in as many as you want. OK!
Configure the hardware address of the network card
ifconfig eth0 hw ether xx:xx:xx:xx:xx:xx
The hardware address of the network card will be changed. At this time, you can deceive the IP address bonding in the LAN.
Disable the network card
ifconfig eth0 down
Enable the network card
ifconfig eth0 up
The ifconfig command is very powerful and can also set the MTU of the network card, promiscuous mode, etc. I won’t introduce them one by one. You can study them yourself in time.
If you want to know more about programming learning, please pay attention to the php training column!
The above is the detailed content of What is the scope of the ifconfig command?. For more information, please follow other related articles on the PHP Chinese website!

The article explains how to use regular expressions (regex) in Linux for pattern matching, file searching, and text manipulation, detailing syntax, commands, and tools like grep, sed, and awk.

The article provides a guide on setting up two-factor authentication (2FA) for SSH on Linux using Google Authenticator, detailing installation, configuration, and troubleshooting steps. It highlights the security benefits of 2FA, such as enhanced sec

The article discusses using top, htop, and vmstat for monitoring Linux system performance, detailing their unique features and customization options for effective system management.

This article compares SELinux and AppArmor, Linux kernel security modules providing mandatory access control. It details their configuration, highlighting the differences in approach (policy-based vs. profile-based) and potential performance impacts

This article details Linux system backup and restoration methods. It compares full system image backups with incremental backups, discusses optimal backup strategies (regularity, multiple locations, versioning, testing, security, rotation), and da

The article explains how to manage sudo privileges in Linux, including granting, revoking, and best practices for security. Key focus is on editing /etc/sudoers safely and limiting access.Character count: 159

This article compares Linux firewall configuration using firewalld and iptables. Firewalld offers a user-friendly interface for managing zones and services, while iptables provides low-level control via command-line manipulation of the netfilter fra

Article discusses managing software packages in Linux using apt, yum, and dnf, covering installation, updates, and removals. It compares their functionalities and suitability for different distributions.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

MinGW - Minimalist GNU for Windows
This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.

Atom editor mac version download
The most popular open source editor

Dreamweaver CS6
Visual web development tools

VSCode Windows 64-bit Download
A free and powerful IDE editor launched by Microsoft