


How to change network interface policy on Ubuntu/Debian/RHEL/CentOS/Fedora/Rocky Linux
The predictable network interface name is:
- Stable after restart
- Fixed/consistent even when hardware is added or removed
- Fixed/consistent even after defective/damaged hardware was replaced
- Stateless, no explicit configuration file required
To ensure system security and ease of use of network interfaces, predictable network interface names are crucial. For this reason, mainstream Linux distributions often use "systemd" and "udev" to assign predictable names to the computer's network interfaces. This makes it easier for users to manage and identify individual network interfaces, while also contributing to system stability and performance optimization. In this way, users can configure and manage the network more conveniently, improving overall system operation efficiency and security.
Currently, there are some network interface naming strategies that can be used on Ubuntu, Debian, RHEL, CentOS, Fedora, Rocky Linux and other popular Debian/Ubuntu-based or RPM-based Linux distributions. In this article, we will discuss the network interface naming strategies available in Linux and show you how to switch to the one you want.
Content topic:
- Available network interface removal policies
- Currently used network interface deletion policy
- Change network interface deletion policy
- Check if the new network interface removal policy is being used
- Configure a custom name for the network interface
- in conclusion
Available network interface removal policies
Currently, the available network interface naming strategies are:
- Kernel - In this policy, the kernel does not rename predictable network devices, i.e. lo (loopback interface)
- Database - In this policy, the udev hardware database "hwdb" is used to assign network device names.
- Onboard—In this strategy, the index numbers provided by your computer's BIOS/firmware are used to name the onboard network devices, i.e. eno1, eno2.
- slot—In this strategy, the PCIE hot-plug slot index numbers provided by the computer BIOS/firmware are used to name the network devices, i.e. ens1, ens2.
- Path - In this policy, the network devices are named using the physical location of the hardware, i.e. enp1s0, enp1s2, enp1s0f0, enp1s0f1.
- mac—In this policy, the mac address of the network device is appended to the network interface name, which is enx000c294cd7e8.
Currently used network interface deletion policy
The default network interface naming policy configuration file on most popular Linux distributions is located in the "/usr/lib/systemd/network/99-default.link" path.
You can use the nano text editor to open the default network interface naming policy configuration file "/usr/lib/systemd/network/99—default.link", as shown below:
$sudo nano/usr/lib/systemd/network/www.example.com
The order of network interface naming policies to be used is listed in the "NamePolicy" section [1].
Here, "Hold" has the highest priority. systemd/udev will use the same name over and over again as long as that name has been assigned to the network interface.
It will then try to set the kernel name. If the kernel naming policy fails, database, onboard, slot, and path are used respectively.
You can also set alternative names for network interfaces in the same way using the "AlternativeNamesPolicy" option [2]. Naming policies that are not used for actual network interface naming are used as alternative naming policies, depending on the order set in "AlternativeNamesPolicy".
As you can see, by default, the slot network interface naming policy is used to name the actual network interface, and the path network interface naming policy is used to provide alternative names for network interfaces on Ubuntu 22.04 LTS. Other Linux distributions may use different naming strategies and alternative naming strategies by default.
$IP a
Change network interface deletion policy
To change the network interface naming policy, please use the nano text editor to open the "/usr/lib/systemd/network/99—default.link" configuration file, as shown below:
$sudo nano/usr/lib/systemd/network/www.example.com
Type the desired network interface naming policy in the "NamePolicy" section and the alternative network interface naming policy in the "AlternativeNamePolicy" section.
When finished, press X, then "Y" to save the "99—default.link" file.
For the changes to take effect, please restart your computer as follows:
$sudo reboot
Check if the new network interface removal policy is being used
After the computer boots, run the "ip" command to verify that the network interface name has changed accordingly. As you can see, the Mac network interface naming policy is used to set the real name of the network interface, and the PATH network interface naming policy is used to set the alternative name of the network interface.
$IP a
In this example, we use the path naming strategy for the real name and the mac naming strategy for the alternative name of the network interface.
Configure a custom name for the network interface
In addition to using the predefined network interface naming strategy, you can also set a custom name for your computer's network interface. To learn how to set a custom name for a network interface, read this article.
in conclusion
In this article, we discussed the network interface naming strategies available with modern Linux distributions. We also show you how to use different network interface naming strategies on Ubuntu/Debian, RHEL/Rocky Linux/CentOS/Fedora, and other modern Ubuntu/Debian-based or RPM-based Linux distributions.
The above is the detailed content of How to change network interface policy on Ubuntu/Debian/RHEL/CentOS/Fedora/Rocky Linux. For more information, please follow other related articles on the PHP Chinese website!

Do you have trouble downloading or sending attachments in Outlook 365? Sometimes, Outlook doesn’t show them for some unknown reason, so you are unable to see them. In this post on php.cn Website, we collect some use tips for attachments not showing.

When V Rising players try to join a server that is close to or already full, they may encounter the “V Rising connection timed out” issue. If you are one of them, you can refer to this post from php.cn to get solutions. Now, keep on your reading.

Windows supplies real-time protection via Windows Security. But this feature may prevent you from doing something it thinks are dangerous. In this situation, you may want to temporarily turn on real-time protection. This php.cn post will show you how

Microsoft has started working on next year’s Windows updates very early. Recent rumors state that the next update in 2024 might be Windows 11 24H2 rather than Windows 12. Everything is uncertain now. php.cn will now take you to see some related infor

The error 0x80030001 often happens when you are attempting to copy files. The error code will be accompanied by a message that tells “unable to perform requested operation”. If you are struggling with this error, you can read this article on php.cn W

On February 13, 2024, Microsoft released KB5034765 (OS builds 22621.3155 and 22631.3155) for Windows 11 22H2 and Windows 11 23H2. This security update brings you many new improvements and bug fixes. You can learn how to download and install Windows 1

Device Manager is widely used when you need to fix some computer issues. You can check the problematic devices and decide to uninstall or update device drivers. Besides, you can also set Power Management settings in Device Manager. However, you may f

When Backup and Restore (Windows Backup) fails to work, you can choose to reset it to default. How to restore Windows Backup to default in Windows 11/10? php.cn will guide you to easily do this thing in 2 ways and let’s go to see them.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

SublimeText3 Linux new version
SublimeText3 Linux latest version

Dreamweaver Mac version
Visual web development tools

ZendStudio 13.5.1 Mac
Powerful PHP integrated development environment

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

SublimeText3 Mac version
God-level code editing software (SublimeText3)