![]() The specifications for this are formally defined as the IP protocol. These are also generally mapped to hostnames, such as laptop and desktop or darkstar or penguin or whatever name you give each machine. Red Hat OpenShift Service on AWS security FAQĬomputers on a network identify themselves and each other with IP addresses, such as 10.0.0.1 or 192.168.0.8.The specifications for this are formally defined as the TCP protocol. The systems responsible for making this possible are TCP and IP.Ĭommunication requires a means of transport for messages between them, and computers communicate using digital signals carried over Ethernet cables or radio waves or microwaves. In order for networking to facilitate communication between devices, the machines on the network must be able to find each other. In computing, a network is a collection of two or more computers that can communicate. This article covers the basics of network management using open source. Learning basic networking commands can help you understand how a device knows what network to connect to, how to find a shared printer or a file share-or the biggest network of all, the internet. While understanding everything there is to know about networking is a big topic, there's much to learn from your own humble Linux computer's networking stack. Once in a blue moon, and usually not informative as much as instructive.One of the sysadmin's most important domains is the network. I do know those those things but they've been about as useful to me in the cloud computing world as most of my bare-metal datacenter knowledge. Neither security groups nor stateful firewalls should require any knowledge of how traffic gets transported from one IP to the next, and generally speaking if you do need to know, you're involved in setting it up/in a role that includes networking as a substantial component. Think security groups and stateful firewalls etc…Įhhh. I've frequently been the only person on an ops/tooling team with the ability to fluidly pinpoint where in layers 2-4 a problem is manifesting, and well, it's pretty tough to troubleshoot something you can't define.Ĭonfiguring site to site IPSec VPNs or setting up BGP routes in a DevOps rule but you should definitely know what they do and how it works. Yeah, I don't think it should be required, but it's incredibly helpful. Set up a Pi-Hole DNS server for your home network (use a VM if you don't have a pi).I recommend Zoho for a free email provider with your own domain. Configure mail for your custom domain.For example, you may need to port forward on your router if your using your home public IP Configure SSH on the server, and do the necessary networking to SSH to your server using the domain name. Point an A record to your home's public IP, or to a cloud server you control with a public IP. ![]() Get a device to connect to it (You can use your home router for this. You probably won't need to worry about these technologies / groups, but they're useful background knowledge
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |