DHCP Service Deployment

Catalog DHCP Service Deployment I. Introduction II. Usage and Function 3. Principle + Topology IV. Practical Construction Relevant documents Configuring the underlying DHCP server Configure DHCP Retention Address Configuring DHCP superscopes Configuring DHCP Relay ...

Posted by Mastodont on Tue, 10 Sep 2019 08:53:20 +0200

The simplest directory structure to understand

1. Common directories and explanations in LinuxWhere to save the 1 bin command file2 SBIN Commands that only root users can use3 boot (know it) Directory where information is saved when a Linux program starts4 Directory where dev device files existDirectory where 5 etc file configuration information and service configuration information exist6 ...

Posted by mysty on Sun, 08 Sep 2019 04:12:19 +0200

Self-signed certificate issuance and verification

1. Use openSSL to generate certificatesA root SSL certificate is a certificate authority (CA) trusted by the issued certificate.Generate an RSA-2048 key and save it to a file rootCA.key.This file will be used as the key to generate the root SSL certificate.Command: OpenSSL genrsa-des3-out rootCA.key 2048You can use the key you generate to crea ...

Posted by gottes_tod on Wed, 04 Sep 2019 02:13:44 +0200

Linux Domain Name Service DNS

What is DNS The full name of DNS is Domain Name System, which means Domain Name Resolution System. It is the responsibility of translating a domain name into a recognizable IP for connecting different computer devices. linux Configuration and Files for DNS Resolution There are three files in linux about dns parsing: /etc/hosts Records ip addre ...

Posted by gojiita on Tue, 27 Aug 2019 04:46:02 +0200

dns parsing tool dig, one of linux's powerful tools

dig command is mainly used to query host address information from dns domain name server. It works the same as NSLOOKUP command, but it outputs more information than nslookup. Install dig redhat Department System yum install -y bind-utils debian Department System apt-get install -y dnsutils Query Sina's dns parsing as follows Di www.sina.com o ...

Posted by 9three on Sun, 11 Aug 2019 17:17:02 +0200

Synchronize system time through sntp

Synchronize system time through sntp For small Internet of Things devices, few interfaces provide users with data interaction, so the system time of our devices can only be updated locally after obtaining the network time.Then, you need to use the sntp protocol. ntp protocol: The NTP(Network Time Prot ...

Posted by 00tank on Thu, 08 Aug 2019 05:49:13 +0200

DNS Domain Name Resolution System_2

Deployment DNS Forward Resolution Main configuration file (/etc/named.conf): Used to define the operation of the bind service program. Zone Profile (/etc/named.rfc1912.zones): The location where the corresponding relationship between domain name and ip address is stored. Similar to the catalogue of books, it corresponds to the specific ...

Posted by cfemocha on Sat, 27 Jul 2019 12:12:58 +0200

On the invalid setting of fixed IP address under ubuntu 16.04 18.04

Sources of problems Sometimes we need to cooperate with colleagues or share resources with each other (more for the convenience of cooperation under the LAN, mutual need to know each other's IP addresses) in the working network environment, and prevent the intermittent network problems caused by IP a ...

Posted by iblackedout on Thu, 25 Jul 2019 09:01:36 +0200

DNS Service: Domain Name Resolution System

Preface: Recent tidy up some of the previous study notes. In the past, they were stored locally, and this time they were transferred to the network for reserve.   DNS Domain Name System As a distributed database that maps domain names and IP addresses, it makes it easier for people to access the Internet. At present, the limit for the leng ...

Posted by backslash on Sun, 21 Jul 2019 15:51:08 +0200

Kubernetes 1.6 New Feature Learning: RBAC Authorization

Summary The access control process of API Server in Kuberntes is illustrated as follows: In Kubernetes, authorization is a step after authentication. Authorization is to determine whether a user (ordinary user or Service Account) has the right to request the Kubernetes API to do something. Previously, the authorization strategy i ...

Posted by morris520 on Wed, 03 Jul 2019 21:44:48 +0200