search
HomeSystem TutorialLINUXCentOS 6.X network card name modification guide

Usually the network card name is automatically recognized by the system and exists in the registry. However, some netizens want to modify the network card name of the CentOS6.x system for some reasons. So how to change the network card name? Let's go with the editor to see the specific operation.

CentOS 6.X如何更改网卡名称?CentOS 6.X更改网卡名称的方法

There are three ways to modify the network card name under CentOS 6.X:

method 1:

Modify the UDEV file and delete the contents; use the command to redefine the name. Both names must be changed;

Method 2:

In centos6, you can use setup directly to set up a new network card and fill in eth1, ip and other contents.

In CentOS 6, the default kudzu service for identifying hardware no longer exists, and basically all hardware management is managed through Udev.

If you add a new hardware to Centos 6, such as a network card, you only need to restart udev.

start_udev

It will rescan the newly added hardware and perform related processing.

If the newly added network card is incorrectly recognized and sometimes you want to update the name of the network card, you do not need to edit the content under /etc/sysconfig/network-scripts/. If it does not work properly after running above, directly modify udev about the network. configuration.

The configuration file for the specific network card serial number of udev on the network is the file /etc/udev/rules.d/70-persistent-net.rules.

The approximate content is as follows:

SUBSYSTEM=="net", ACTION=="add", DRIVERS=="?*", ATTR{address}=="54:52:00:78:e8:2e", ATTR{type}= = "1", KERNEL== "eth*", NAME = "eth1" # PCI device

0x1af4:0x1000 (virtio-pci) SUBSYSTEM=="net", ACTION=="add", DRIVERS=="?*", ATTR{address}=="54:52:00:04:19: 6c", ATTR{type}=="1", KERNEL=="eth*",

NAME=“eth0”

Reference

After the modification is completed, use the udev command to test:

udevadm test /sys/class/net/eth0/

This command can display the identification and processing process of udev in great detail.

Notice:

Newly added hardware, if a network card is added in setup and system-config-network-tui, but the configuration file cannot be found in /etc/sysconfig/network-scripts/.

This is because these commands will put the generated configuration files in /etc/sysconfig/networking/devices/ by default. Just put the following two configuration files into /etc/sysconfig/network-scripts/, and then use

system-config-network-tui can be configured.

Code example: cp /etc/sysconfig/networking/devices/* /etc/sysconfig/network-scripts/

Then it will take effect after restarting.

Method 3:

1. Add the startup parameter biosdevname=0 in grub, in the shape of

kernel /vmlinuz-2.6.32-131.21.1.el6.i686 ro root=/dev/mapper/vg_test-lv_root rd_LVM_LV=vg_test/lv_root rd_LVM_LV=vg_test/lv_swap rd_NO_LUKS rd_NO_MD rd_NO_DM LANG=en_US.UTF-8 SYSFONT =latar

cyrheb-sun16 KEYBOARDTYPE=pc KEYTABLE=us crashkernel=auto rhgb quiet biosdevname=0

2. Delete udev configuration file rm -f /etc/udev/rules.d/70-persistent-net.rules

3. Rename the network card configuration file

mv ifcfg-em1 ifcfg-eth0

4. Modify the content of the network card configuration file and change all em1 to eth0

You can use perl -p -i -e ‘s/em1/eth0/g’ ifcfg-eth0 or sed -i ‘s/em1/eth0/g’ ifcfg-eth0 to replace.

5. Restart the system

The above is the detailed content of CentOS 6.X network card name modification guide. For more information, please follow other related articles on the PHP Chinese website!

Statement
This article is reproduced at:脚本之家. If there is any infringement, please contact admin@php.cn delete
What are the differences in how Linux and Windows handle user authentication?What are the differences in how Linux and Windows handle user authentication?Apr 30, 2025 am 12:03 AM

The main difference between Linux and Windows in user authentication is that Linux uses PAM modules, while Windows relies on Active Directory and local security policies. 1. Linux provides flexible authentication configurations through PAM, such as passwords, fingerprints, etc. 2. Windows realizes centralized management and enterprise network integration through Active Directory.

How to Install and Run FreeDOS on Linux Using QEMUHow to Install and Run FreeDOS on Linux Using QEMUApr 29, 2025 am 10:36 AM

This guide shows you how to set up the free and open-source DOS-compatible operating system, FreeDOS, within a Linux environment using the QEMU emulator. This allows you to run legacy DOS software and games on modern hardware without needing a separ

How to Install KDE Plasma on Linux Mint 22How to Install KDE Plasma on Linux Mint 22Apr 29, 2025 am 10:10 AM

Linux Mint, an operating system known for its simplicity, stability and ease of use, is popular with users and is especially suitable for beginners. It uses the Cinnamon desktop environment by default, providing a simple and friendly user interface. But if you prefer a different look or need more customization options, you can install other desktop environments such as KDE Plasma. KDE Plasma is a feature-rich, highly customizable and visually excellent desktop environment that provides a modern and stylish user experience. It has a wide range of customization options, advanced window management capabilities and sophisticated aesthetics, perfect for users who want to have a better control over the desktop experience. This guide will guide you step by step to install KDE Pl on Linux Mint 22

How to Reduce High RAM & CPU Usage on LinuxHow to Reduce High RAM & CPU Usage on LinuxApr 29, 2025 am 10:05 AM

Linux system performance optimization: Reduce RAM and CPU usage Linux systems are powerful and efficient, but high RAM and CPU usage can reduce performance, slow down applications, and even cause servers, workstations, or embedded systems to crash. Therefore, optimizing resource usage is crucial for the smooth operation of the system. This guide will explore practical ways to reduce RAM and CPU usage in Linux systems, covering monitoring tools, process management, kernel tuning and system optimization technologies to help you keep your system running efficiently. Identify resource-intensive processes The first step in reducing RAM and CPU usage is to identify which processes consume the most resources. To do this, you can use the following command-line tools: a. Use top

How to Boot Into Single User Mode in AlmaLinux 8/9How to Boot Into Single User Mode in AlmaLinux 8/9Apr 29, 2025 am 09:46 AM

Single User Mode (also known as Rescue Mode) Guide for AlmaLinux 8 and 9 Single-user mode is a streamlined Linux environment that allows system administrators to perform maintenance tasks, troubleshoot problems, and recover from system failures. Single-user mode is especially useful when you need to reset your root password, fix configuration errors, fix corrupt file systems, or investigate system errors that prevent normal startup. As RHEL-based distributions, AlmaLinux 8 and 9 provide an easy way to enter single-user mode via the GRUB boot loader. This guide will explain step by step how to enter single-user mode on AlmaLinux 8 and 9. What is single use

Linux Troubleshooting: 5 Common Problems & How to Fix ThemLinux Troubleshooting: 5 Common Problems & How to Fix ThemApr 29, 2025 am 09:42 AM

Linux systems are known for their power and reliability, but even experienced users will encounter unexpected problems. Whether it is an unexpectedly deleted file, a forgotten root password, or a slow system running, efficient troubleshooting skills are the key to becoming a Linux expert. This guide will introduce common Linux problem solving scenarios and step-by-step solutions that are common among system administrators, developers, and everyday Linux users. Scene 1: Unexpected deletion of important files You accidentally deleted an important file using the rm command and now you need to restore it. Unlike Windows and macOS, Linux does not have a built-in "recycle bin" to store files deleted from the terminal. Recovery options depend on

How to Permanently Change Docker Folder Permissions on LinuxHow to Permanently Change Docker Folder Permissions on LinuxApr 29, 2025 am 09:35 AM

Docker is a powerful tool that allows you to run applications in an isolated environment called containers. However, sometimes you may need to change the permissions of the Docker folder to ensure that your application has access to the necessary files and directories. This article will guide you through the process of permanently changing Docker folder permissions on Linux systems. Understand Docker folder permissions By default, Docker stores its data, including images, containers, and volumes, in specific directories on Linux systems. The most common directory is /var/lib/docker. The permissions of these folders determine who can read, write, or execute the files in it. if

Manage Docker Like a Pro: Install Portainer CE on LinuxManage Docker Like a Pro: Install Portainer CE on LinuxApr 29, 2025 am 09:24 AM

Simplify Docker Management with Portainer CE on Linux: A Step-by-Step Guide Managing Docker containers via the command line can be daunting, especially for newcomers. Portainer CE (Community Edition) offers a free, lightweight, and intuitive solutio

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Atom editor mac version download

Atom editor mac version download

The most popular open source editor

VSCode Windows 64-bit Download

VSCode Windows 64-bit Download

A free and powerful IDE editor launched by Microsoft

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

SublimeText3 English version

SublimeText3 English version

Recommended: Win version, supports code prompts!

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor