SlideShare a Scribd company logo
ifconfig



       Kevin O'Brien
Washtenaw Linux Users Group
  http://www.lugwash.org
ifconfig
●   ... stands for interface configurator
●   ... is part of the original internet toolkit
    http://www.faqs.org/docs/linux_network/x-
    087-2-iface.interface.html
●   ... has versions available for Linux, BSD,
    Solaris, and Mac OSX




                                                   2
man page
●   Ifconfig is used to configure the kernel-resident
    network interfaces. It is used at boot time to set
    up interfaces as necessary. After that, it is
    usually only needed when debugging or when
    system tuning is needed.




                                                         3
man page 2
●   If no arguments are given, ifconfig displays
    the status of the currently active interfaces. If
    a single interface argument is given, it
    displays the status of the given interface
    only; if a single -a argument is given, it
    displays the status of all interfaces, even
    those that are down. Otherwise, it configures
    an interface.


                                                        4
Sample output
eth0      Link encap 10Mbps Ethernet HWaddr
  00:0F:20:CF:8B:42
  inet addr 172.16.1.2 Bcast 172.16.1.255 Mask
  255.255.255.0 UP BROADCAST RUNNING MULTICAST
  MTU 1500 Metric 0
  RX packets 3136 errors217 dropped 7 overrun 26
  TX packets 1752 errors 25 dropped 0 overrun 0




                                                   5
What is it saying?
●   eth0 is the interface it is reporting on. It is the
    first of the ethernet interfaces on this
    computer.
●   The Hardware Address is 00:0F:20:CF:8B:42.
    This is sometimes called the MAC address
    (Media Access Control), and is a
    hexadecimal number assigned to the
    ethernet card at the factory.
●   The internet address is 172.16.1.2. This is
    the address assigned to this computer.
                                                          6
What is it saying? 2
●   The Broadcast Address is 172.16.1.255. This
    is an address that can be used to send
    messages to every computer on the same
    subnet as this computer.
●   The Subnet Mask is 255.255.255.0. This can
    be thought of as defining or identifying the
    subnet this computer is part of.
●   The rest of it tells about packets sent,
    received, dropped, etc.

                                                   7
Use for information
●   The first thing most beginners will want to do
    is use this for information.
●   If you find you are not connected to the
    Internet, use this command to see if your
    interface is configured and active.
●   You can use this to check on your IP
    address and subnet mask.
●   There is an equivalent for wireless
    interfaces, called iwconfig.

                                                     8
Parallels for newbies
●   Windows 95 through ME had a command
    called winipcfg
●   Windows NT through Windows Vista have
    ipconfig
●   These are essentially similar to the Unix
    command ifconfig




                                                9
Syntax
●   ifconfig interface [address [parameters]]
●   interface is the interface name, such as eth0
    (first ethernet device) or lo (local host)
●   address is the IP address assigned to the
    interface. This can be specified as a dotted
    quad address, or as a name that can be
    looked up in /etc/hosts.



                                                    10
Parameters
●   up – Makes an interface accessible to the IP
    layer.
●   down – Makes an interface inaccessible to
    the IP layer, i.e. stops all traffic through this
    interface.
●   netmask mask – Sets the subnet mask to be
    used by the interface.
●   broadcast address – Sets the broadcast
    address.

                                                        11
Warning!
●   If you are not a network administrator, be
    very careful about setting addresses from the
    command line. Even people with some
    experience can get confused setting a
    subnet mask. You don't want your interface
    to stop working in some mysterious way.
●   Using this command to get information is
    completely safe.


                                                    12
Warning! 2
●   If you do want to experiment (a very good
    way to learn about these things), just make
    sure you are not using a mission-critical
    computer. Whatever you screw up you will
    need to unscrew.☺




                                                  13
More on this command
●   There are other parameters and options
    available for this command, but they go
    beyond the requirements for this
    presentation. Consult Google or the man
    page for more information.
●   A good readable guide to the basics can be
    found at http://tldp.org/LDP/nag2/x-087-2-
    iface.ifconfig.html


                                                 14
Examples
●   ifconfig eth0 – View the network settings on
    the first Ethernet adapter installed in the
    computer.
●   ifconfig -a – Display information on all
    network interfaces on the computer, active or
    inactive.
●   ifconfig eth0 down – Would take down the
    interface, and no packets would be sent or
    received.
●   ifconfig eth0 up – Would bring the interface
    back up so it could send and receive data.    15
Examples 2
●   ifconfig eth0 192.168.1.102 netmask
    255.255.255.0 broadcast 192.168.1.255 –
    This would assign these values to the first
    Ethernet device installed in the computer. Be
    careful here!




                                                    16

More Related Content

What's hot

Applets in java
Applets in javaApplets in java
Applets in java
Wani Zahoor
 
Mapping cardinalities
Mapping cardinalitiesMapping cardinalities
Mapping cardinalities
Arafat Hossan
 
Core java Essentials
Core java EssentialsCore java Essentials
Relational Algebra-Database Systems
Relational Algebra-Database SystemsRelational Algebra-Database Systems
Relational Algebra-Database Systems
jakodongo
 
Jdbc Complete Notes by Java Training Center (Som Sir)
Jdbc Complete Notes by Java Training Center (Som Sir)Jdbc Complete Notes by Java Training Center (Som Sir)
Jdbc Complete Notes by Java Training Center (Som Sir)
Som Prakash Rai
 
Introduction to visual basic programming
Introduction to visual basic programmingIntroduction to visual basic programming
Introduction to visual basic programming
Roger Argarin
 
L0018 - SWT - The Standard Widget Toolkit
L0018 - SWT - The Standard Widget ToolkitL0018 - SWT - The Standard Widget Toolkit
L0018 - SWT - The Standard Widget Toolkit
Tonny Madsen
 
Configuring GRE Tunnel Through a Cisco ASA Firewall
Configuring GRE Tunnel Through a Cisco ASA FirewallConfiguring GRE Tunnel Through a Cisco ASA Firewall
Configuring GRE Tunnel Through a Cisco ASA Firewall
Harris Andrea
 
snmp
snmpsnmp
Spring framework in depth
Spring framework in depthSpring framework in depth
Spring framework in depth
Vinay Kumar
 
Mapping Cardinalities
Mapping CardinalitiesMapping Cardinalities
Mapping Cardinalities
Megha Sharma
 
Introduction to data structure ppt
Introduction to data structure pptIntroduction to data structure ppt
Introduction to data structure ppt
NalinNishant3
 
Erd examples
Erd examplesErd examples
Erd examples
Pramod Redekar
 
Adapter Design Pattern
Adapter Design PatternAdapter Design Pattern
Adapter Design Pattern
Salem-Kabbani
 

What's hot (14)

Applets in java
Applets in javaApplets in java
Applets in java
 
Mapping cardinalities
Mapping cardinalitiesMapping cardinalities
Mapping cardinalities
 
Core java Essentials
Core java EssentialsCore java Essentials
Core java Essentials
 
Relational Algebra-Database Systems
Relational Algebra-Database SystemsRelational Algebra-Database Systems
Relational Algebra-Database Systems
 
Jdbc Complete Notes by Java Training Center (Som Sir)
Jdbc Complete Notes by Java Training Center (Som Sir)Jdbc Complete Notes by Java Training Center (Som Sir)
Jdbc Complete Notes by Java Training Center (Som Sir)
 
Introduction to visual basic programming
Introduction to visual basic programmingIntroduction to visual basic programming
Introduction to visual basic programming
 
L0018 - SWT - The Standard Widget Toolkit
L0018 - SWT - The Standard Widget ToolkitL0018 - SWT - The Standard Widget Toolkit
L0018 - SWT - The Standard Widget Toolkit
 
Configuring GRE Tunnel Through a Cisco ASA Firewall
Configuring GRE Tunnel Through a Cisco ASA FirewallConfiguring GRE Tunnel Through a Cisco ASA Firewall
Configuring GRE Tunnel Through a Cisco ASA Firewall
 
snmp
snmpsnmp
snmp
 
Spring framework in depth
Spring framework in depthSpring framework in depth
Spring framework in depth
 
Mapping Cardinalities
Mapping CardinalitiesMapping Cardinalities
Mapping Cardinalities
 
Introduction to data structure ppt
Introduction to data structure pptIntroduction to data structure ppt
Introduction to data structure ppt
 
Erd examples
Erd examplesErd examples
Erd examples
 
Adapter Design Pattern
Adapter Design PatternAdapter Design Pattern
Adapter Design Pattern
 

Viewers also liked

IPV6 ADDRESS
IPV6 ADDRESSIPV6 ADDRESS
IPV6 ADDRESS
Jothi Lakshmi
 
Lengua 9 4
Lengua 9 4Lengua 9 4
Lengua 9 4
Bernardita Naranjo
 
114624503 guion-teatral
114624503 guion-teatral114624503 guion-teatral
114624503 guion-teatral
elprofedecoro
 
La familiapeligra libreto
La familiapeligra libretoLa familiapeligra libreto
La familiapeligra libreto
johnhardysterlings
 
Guion teatral
Guion teatralGuion teatral
Guion teatral
gabyabc
 
Guión de teatro
Guión de teatroGuión de teatro
Guión de teatro
Erick Gómez
 

Viewers also liked (6)

IPV6 ADDRESS
IPV6 ADDRESSIPV6 ADDRESS
IPV6 ADDRESS
 
Lengua 9 4
Lengua 9 4Lengua 9 4
Lengua 9 4
 
114624503 guion-teatral
114624503 guion-teatral114624503 guion-teatral
114624503 guion-teatral
 
La familiapeligra libreto
La familiapeligra libretoLa familiapeligra libreto
La familiapeligra libreto
 
Guion teatral
Guion teatralGuion teatral
Guion teatral
 
Guión de teatro
Guión de teatroGuión de teatro
Guión de teatro
 

Similar to The ifconfig Command

Linux Commands
Linux CommandsLinux Commands
Linux Commands
lucita cabral
 
Networking question
Networking questionNetworking question
Networking question
DEVBEJ
 
Linux networking
Linux networkingLinux networking
Linux networking
sanakiyan
 
Chapter 2-Bascs of Switch & Router (1).pptx
Chapter 2-Bascs of Switch & Router (1).pptxChapter 2-Bascs of Switch & Router (1).pptx
Chapter 2-Bascs of Switch & Router (1).pptx
desalewminale
 
Useful Linux commands
Useful Linux commandsUseful Linux commands
Useful Linux commands
Sukanta Pradhan
 
Ccnav5.org ccna 3-v50_final_exam_2014
Ccnav5.org ccna 3-v50_final_exam_2014Ccnav5.org ccna 3-v50_final_exam_2014
Ccnav5.org ccna 3-v50_final_exam_2014
Đồng Quốc Vương
 
ccna 1 chapter 2 v5.0 exam answers 2014
ccna 1 chapter 2 v5.0 exam answers 2014ccna 1 chapter 2 v5.0 exam answers 2014
ccna 1 chapter 2 v5.0 exam answers 2014
Đồng Quốc Vương
 
Managing the system and network connection Linux
Managing the system and network connection LinuxManaging the system and network connection Linux
Managing the system and network connection Linux
Shriharsh Shendre
 
CCNA at a glance
CCNA at a glanceCCNA at a glance
CCNA at a glance
Vikas Raut
 
How to Use GSM/3G/4G in Embedded Linux Systems
How to Use GSM/3G/4G in Embedded Linux SystemsHow to Use GSM/3G/4G in Embedded Linux Systems
How to Use GSM/3G/4G in Embedded Linux Systems
Toradex
 
Networking
NetworkingNetworking
Networking
Tarun Jaiswal
 
111
111111
111
gadoosh
 
111
111111
111
gadoosh
 
Linux network tools (Maarten Blomme)
Linux network tools (Maarten Blomme)Linux network tools (Maarten Blomme)
Linux network tools (Maarten Blomme)
Avansa Mid- en Zuidwest
 
03 linuxfirewall1
03 linuxfirewall103 linuxfirewall1
03 linuxfirewall1
Iwan Threads
 
CCNA CheatSheet
CCNA CheatSheetCCNA CheatSheet
CCNA CheatSheet
Eng. Emad Al-Atoum
 
CMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAM
CMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAMCMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAM
CMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAM
HamesKellor
 
lab1
lab1lab1
ENSA_Module_10.pptx
ENSA_Module_10.pptxENSA_Module_10.pptx
ENSA_Module_10.pptx
SkyBlue659156
 
Securing Switch Access
Securing Switch Access Securing Switch Access
Securing Switch Access
Netwax Lab
 

Similar to The ifconfig Command (20)

Linux Commands
Linux CommandsLinux Commands
Linux Commands
 
Networking question
Networking questionNetworking question
Networking question
 
Linux networking
Linux networkingLinux networking
Linux networking
 
Chapter 2-Bascs of Switch & Router (1).pptx
Chapter 2-Bascs of Switch & Router (1).pptxChapter 2-Bascs of Switch & Router (1).pptx
Chapter 2-Bascs of Switch & Router (1).pptx
 
Useful Linux commands
Useful Linux commandsUseful Linux commands
Useful Linux commands
 
Ccnav5.org ccna 3-v50_final_exam_2014
Ccnav5.org ccna 3-v50_final_exam_2014Ccnav5.org ccna 3-v50_final_exam_2014
Ccnav5.org ccna 3-v50_final_exam_2014
 
ccna 1 chapter 2 v5.0 exam answers 2014
ccna 1 chapter 2 v5.0 exam answers 2014ccna 1 chapter 2 v5.0 exam answers 2014
ccna 1 chapter 2 v5.0 exam answers 2014
 
Managing the system and network connection Linux
Managing the system and network connection LinuxManaging the system and network connection Linux
Managing the system and network connection Linux
 
CCNA at a glance
CCNA at a glanceCCNA at a glance
CCNA at a glance
 
How to Use GSM/3G/4G in Embedded Linux Systems
How to Use GSM/3G/4G in Embedded Linux SystemsHow to Use GSM/3G/4G in Embedded Linux Systems
How to Use GSM/3G/4G in Embedded Linux Systems
 
Networking
NetworkingNetworking
Networking
 
111
111111
111
 
111
111111
111
 
Linux network tools (Maarten Blomme)
Linux network tools (Maarten Blomme)Linux network tools (Maarten Blomme)
Linux network tools (Maarten Blomme)
 
03 linuxfirewall1
03 linuxfirewall103 linuxfirewall1
03 linuxfirewall1
 
CCNA CheatSheet
CCNA CheatSheetCCNA CheatSheet
CCNA CheatSheet
 
CMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAM
CMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAMCMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAM
CMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAM
 
lab1
lab1lab1
lab1
 
ENSA_Module_10.pptx
ENSA_Module_10.pptxENSA_Module_10.pptx
ENSA_Module_10.pptx
 
Securing Switch Access
Securing Switch Access Securing Switch Access
Securing Switch Access
 

More from Kevin OBrien

American icon pmi
American icon   pmiAmerican icon   pmi
American icon pmi
Kevin OBrien
 
Tls 1.3
Tls 1.3Tls 1.3
Tls 1.3
Kevin OBrien
 
Forward Secrecy
Forward SecrecyForward Secrecy
Forward Secrecy
Kevin OBrien
 
Diffie_Hellman-Merkle Key Exchange
Diffie_Hellman-Merkle Key ExchangeDiffie_Hellman-Merkle Key Exchange
Diffie_Hellman-Merkle Key Exchange
Kevin OBrien
 
Password best practices and the last pass hack
Password best practices and the last pass hackPassword best practices and the last pass hack
Password best practices and the last pass hack
Kevin OBrien
 
SSL certificates
SSL certificatesSSL certificates
SSL certificates
Kevin OBrien
 
Encryption basics
Encryption basicsEncryption basics
Encryption basics
Kevin OBrien
 
Passwords
PasswordsPasswords
Passwords
Kevin OBrien
 
Linux Directory Structure
Linux Directory StructureLinux Directory Structure
Linux Directory Structure
Kevin OBrien
 
Hardware Discovery Commands
Hardware Discovery CommandsHardware Discovery Commands
Hardware Discovery Commands
Kevin OBrien
 
Introduction to linux
Introduction to linuxIntroduction to linux
Introduction to linux
Kevin OBrien
 
Help, my computer is sluggish
Help, my computer is sluggishHelp, my computer is sluggish
Help, my computer is sluggish
Kevin OBrien
 
The ps Command
The ps CommandThe ps Command
The ps Command
Kevin OBrien
 
Installing Software, Part 3: Command Line
Installing Software, Part 3: Command LineInstalling Software, Part 3: Command Line
Installing Software, Part 3: Command Line
Kevin OBrien
 
Installing Software, Part 2: Package Managers
Installing Software, Part 2: Package ManagersInstalling Software, Part 2: Package Managers
Installing Software, Part 2: Package Managers
Kevin OBrien
 
Installing Software, Part 1 - Repositories
Installing Software, Part 1 - RepositoriesInstalling Software, Part 1 - Repositories
Installing Software, Part 1 - Repositories
Kevin OBrien
 
Installing Linux: Partitioning and File System Considerations
Installing Linux: Partitioning and File System ConsiderationsInstalling Linux: Partitioning and File System Considerations
Installing Linux: Partitioning and File System Considerations
Kevin OBrien
 
Find and Locate: Two Commands
Find and Locate: Two CommandsFind and Locate: Two Commands
Find and Locate: Two Commands
Kevin OBrien
 
The Shell Game Part 4: Bash Shortcuts
The Shell Game Part 4: Bash ShortcutsThe Shell Game Part 4: Bash Shortcuts
The Shell Game Part 4: Bash Shortcuts
Kevin OBrien
 
The Shell Game Part 3: Introduction to Bash
The Shell Game Part 3: Introduction to BashThe Shell Game Part 3: Introduction to Bash
The Shell Game Part 3: Introduction to Bash
Kevin OBrien
 

More from Kevin OBrien (20)

American icon pmi
American icon   pmiAmerican icon   pmi
American icon pmi
 
Tls 1.3
Tls 1.3Tls 1.3
Tls 1.3
 
Forward Secrecy
Forward SecrecyForward Secrecy
Forward Secrecy
 
Diffie_Hellman-Merkle Key Exchange
Diffie_Hellman-Merkle Key ExchangeDiffie_Hellman-Merkle Key Exchange
Diffie_Hellman-Merkle Key Exchange
 
Password best practices and the last pass hack
Password best practices and the last pass hackPassword best practices and the last pass hack
Password best practices and the last pass hack
 
SSL certificates
SSL certificatesSSL certificates
SSL certificates
 
Encryption basics
Encryption basicsEncryption basics
Encryption basics
 
Passwords
PasswordsPasswords
Passwords
 
Linux Directory Structure
Linux Directory StructureLinux Directory Structure
Linux Directory Structure
 
Hardware Discovery Commands
Hardware Discovery CommandsHardware Discovery Commands
Hardware Discovery Commands
 
Introduction to linux
Introduction to linuxIntroduction to linux
Introduction to linux
 
Help, my computer is sluggish
Help, my computer is sluggishHelp, my computer is sluggish
Help, my computer is sluggish
 
The ps Command
The ps CommandThe ps Command
The ps Command
 
Installing Software, Part 3: Command Line
Installing Software, Part 3: Command LineInstalling Software, Part 3: Command Line
Installing Software, Part 3: Command Line
 
Installing Software, Part 2: Package Managers
Installing Software, Part 2: Package ManagersInstalling Software, Part 2: Package Managers
Installing Software, Part 2: Package Managers
 
Installing Software, Part 1 - Repositories
Installing Software, Part 1 - RepositoriesInstalling Software, Part 1 - Repositories
Installing Software, Part 1 - Repositories
 
Installing Linux: Partitioning and File System Considerations
Installing Linux: Partitioning and File System ConsiderationsInstalling Linux: Partitioning and File System Considerations
Installing Linux: Partitioning and File System Considerations
 
Find and Locate: Two Commands
Find and Locate: Two CommandsFind and Locate: Two Commands
Find and Locate: Two Commands
 
The Shell Game Part 4: Bash Shortcuts
The Shell Game Part 4: Bash ShortcutsThe Shell Game Part 4: Bash Shortcuts
The Shell Game Part 4: Bash Shortcuts
 
The Shell Game Part 3: Introduction to Bash
The Shell Game Part 3: Introduction to BashThe Shell Game Part 3: Introduction to Bash
The Shell Game Part 3: Introduction to Bash
 

Recently uploaded

Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 

Recently uploaded (20)

Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Artificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic WarfareArtificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic Warfare
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 

The ifconfig Command

  • 1. ifconfig Kevin O'Brien Washtenaw Linux Users Group http://www.lugwash.org
  • 2. ifconfig ● ... stands for interface configurator ● ... is part of the original internet toolkit http://www.faqs.org/docs/linux_network/x- 087-2-iface.interface.html ● ... has versions available for Linux, BSD, Solaris, and Mac OSX 2
  • 3. man page ● Ifconfig is used to configure the kernel-resident network interfaces. It is used at boot time to set up interfaces as necessary. After that, it is usually only needed when debugging or when system tuning is needed. 3
  • 4. man page 2 ● If no arguments are given, ifconfig displays the status of the currently active interfaces. If a single interface argument is given, it displays the status of the given interface only; if a single -a argument is given, it displays the status of all interfaces, even those that are down. Otherwise, it configures an interface. 4
  • 5. Sample output eth0 Link encap 10Mbps Ethernet HWaddr 00:0F:20:CF:8B:42 inet addr 172.16.1.2 Bcast 172.16.1.255 Mask 255.255.255.0 UP BROADCAST RUNNING MULTICAST MTU 1500 Metric 0 RX packets 3136 errors217 dropped 7 overrun 26 TX packets 1752 errors 25 dropped 0 overrun 0 5
  • 6. What is it saying? ● eth0 is the interface it is reporting on. It is the first of the ethernet interfaces on this computer. ● The Hardware Address is 00:0F:20:CF:8B:42. This is sometimes called the MAC address (Media Access Control), and is a hexadecimal number assigned to the ethernet card at the factory. ● The internet address is 172.16.1.2. This is the address assigned to this computer. 6
  • 7. What is it saying? 2 ● The Broadcast Address is 172.16.1.255. This is an address that can be used to send messages to every computer on the same subnet as this computer. ● The Subnet Mask is 255.255.255.0. This can be thought of as defining or identifying the subnet this computer is part of. ● The rest of it tells about packets sent, received, dropped, etc. 7
  • 8. Use for information ● The first thing most beginners will want to do is use this for information. ● If you find you are not connected to the Internet, use this command to see if your interface is configured and active. ● You can use this to check on your IP address and subnet mask. ● There is an equivalent for wireless interfaces, called iwconfig. 8
  • 9. Parallels for newbies ● Windows 95 through ME had a command called winipcfg ● Windows NT through Windows Vista have ipconfig ● These are essentially similar to the Unix command ifconfig 9
  • 10. Syntax ● ifconfig interface [address [parameters]] ● interface is the interface name, such as eth0 (first ethernet device) or lo (local host) ● address is the IP address assigned to the interface. This can be specified as a dotted quad address, or as a name that can be looked up in /etc/hosts. 10
  • 11. Parameters ● up – Makes an interface accessible to the IP layer. ● down – Makes an interface inaccessible to the IP layer, i.e. stops all traffic through this interface. ● netmask mask – Sets the subnet mask to be used by the interface. ● broadcast address – Sets the broadcast address. 11
  • 12. Warning! ● If you are not a network administrator, be very careful about setting addresses from the command line. Even people with some experience can get confused setting a subnet mask. You don't want your interface to stop working in some mysterious way. ● Using this command to get information is completely safe. 12
  • 13. Warning! 2 ● If you do want to experiment (a very good way to learn about these things), just make sure you are not using a mission-critical computer. Whatever you screw up you will need to unscrew.☺ 13
  • 14. More on this command ● There are other parameters and options available for this command, but they go beyond the requirements for this presentation. Consult Google or the man page for more information. ● A good readable guide to the basics can be found at http://tldp.org/LDP/nag2/x-087-2- iface.ifconfig.html 14
  • 15. Examples ● ifconfig eth0 – View the network settings on the first Ethernet adapter installed in the computer. ● ifconfig -a – Display information on all network interfaces on the computer, active or inactive. ● ifconfig eth0 down – Would take down the interface, and no packets would be sent or received. ● ifconfig eth0 up – Would bring the interface back up so it could send and receive data. 15
  • 16. Examples 2 ● ifconfig eth0 192.168.1.102 netmask 255.255.255.0 broadcast 192.168.1.255 – This would assign these values to the first Ethernet device installed in the computer. Be careful here! 16