Time
6 hours 20 minutes
Difficulty
Beginner
CEU/CPE
3

Video Description

Linux Networking Introduction This lesson cover an introduction to networking. Participants learn step by step instructions in how to work with files that contain certain network settings. The lesson also teaches about different editors such as the Nano and the VI to view the contents and make changes to a file as well as scripts that can be used to view device information and various configurations. Participants also learn about the ping command which tests how quickly a web site (eg google) responds when it receives communication from a network.

Video Transcription

00:04
Welcome. Cyberia 19. My name is Greg Stewart. Never subject matter expert for loans. Plus,
00:10
in this video, this part
00:12
five of module to we're gonna be covering an introduction to networking.
00:17
Now, most of you that they're taking this course. At this point in time, you should pretty much know about networking and believe some of the prerequisites for this course were six months of hands on Lenox experienced some networking experience.
00:32
You don't need to have six months of hands on. Let me experience to take this course. However, to take the exam, you should have
00:39
a good bit of hands on Lenny's experience
00:41
on and you know, you should have a good understanding of networking. Should understand the OS I model roast. I'll air
00:48
Well, it's a layers and understand how they work, how they function, interactive each other. You need to understand what packets are, what they do, how they're formed.
00:56
You should have a basic understanding of networking and how things are networked.
01:02
If you're using windows, you've had some experience with networking.
01:04
With your network, you're next. You're never gonna face cards,
01:08
know, installing them right, clicking and going to properties, figuring out the i p address selecting either D h c p. You're actually giving it a static address. Those are some things that were going to do and this put this part of the course.
01:22
So we're gonna focus on Lennox and of the different kinds of networking things. They're slightly different from Windows.
01:27
First off, we're gonna deal with some of the different files that would contain certain network settings.
01:34
So I'm gonna go ahead and long back into my machine here
01:42
and when the logs in will go full screen.
01:49
Okay,
01:51
so we're back to our test machine here for cyber ery Sudbury admin,
01:57
and we're gonna do is we're gonna go ahead and open up the
02:01
terminal again.
02:02
And we're using a lot of love command line stuff from this portion of the course onward.
02:08
Well, we'll show some demonstration of some of the the gooey based network stuff in some of the gooey based file management file editing stuff. But we're basically fan of as a systems administrator with for Lennox, we're gonna be focused on
02:23
becoming a power user with the command lines. If you could do that, you'll have a great skill set. Your resume will be great. You'll be able to pretty much command any Lennox job you can if you really know your way around the Lenox spouses sneezing the command line
02:37
much quicker. And you can also begin developing scripts, paying on your language and
02:44
do everything automated, so it will be much easier. You'll have a great, really powerful skill set, so really try to focus on using the command line as much as you possibly can gain a good understanding of it. Understand? There's many cheat sheet websites out there that you can use to go out and see it much different commands have the use
03:01
how they're used, what they do. Have a working Sarah,
03:05
huh?
03:07
It's another we've launched. Our
03:08
MANNLEIN are terminal.
03:12
Let's look at a couple of the main files that will contain your network settings.
03:15
First off, not a file, but command. We've covered this couple times we could go to If
03:22
I have configure, I just call it if config.
03:24
This is basically the equivalent of I p config on your windows machine. So if configures we insure your interface configuration
03:31
here we have everything that are either and zero and our loop back address or look back in her face. So for Ethernet, zero over eat, eat zeros. Well, welcome Will refer to throw the rest of class. You can see it pulls a classy address is using D A. C p to pull down a address from an address from my router, my cable modem.
03:51
And you could see this. Classy. It's got the typical class even met and sudden that mask
03:55
and give you some information about packets dropped. Tell me Trent Pack has been transferred, etcetera.
04:01
So this is a great place to go for really quickly. If you need to get the I p address,
04:08
the broadcast address and that mask et cetera on the Mac address, it's there. So this is a good place to go. So you can see you have your hardware address here is gonna be actually your Mac address.
04:16
Okay,
04:17
so, uh, that's the first place you could go for your basic network configuration items.
04:24
Another place you can go if you have.
04:27
If you don't have d n s involved in your network,
04:30
however you want to be able to resolve
04:32
I p addresses with names. Okay, This is what the U. S. Does
04:38
You can add host names to your host. File your resolve dot com filer, your brother of some other files. Let's go and look at those files.
04:46
Now,
04:46
the first file we're gonna talk about is the resolve dot com. Okay, this is gonna list your DNA servers for your Internet domain name resolution
04:56
and again for each of these files, there's actually man pages what we talked about man pages to show for short for manual. It's basically like a user manual for that command or for that file for that attribute clinics. So let's go to the file and look at the man page for so
05:13
it's ah, it's in slash etc. Slash result dot com.
05:16
So I'm gonna go there by doing seedy. Gonna change directory to slash Betsy and again on auto completing by hitting the tab Key
05:26
resolve. And this is actually spelled without the e on resolved comp.
05:32
Okay,
05:33
what was that?
05:36
And these are my is my fault, actually. Went back up here for a second. I'm gonna go to,
05:43
um
05:44
CD s a little list files, okay. And I'm gonna go to what I want to do since the file, It's not actually directory. It's a file. Okay, so within the etc director of the result that com file exists. So we want to actually go and open that file and read it
05:59
couple different ways. We can do that. We can use an editor. There's a couple of enters. There's the Nano editor.
06:04
There's the V I editor, the Vim editor. There's three different considers, but one I particularly use for the most part is Thievy I editor.
06:14
Everybody has their own opinion about which better they want to use some use Nano. They're all different
06:18
slightly and they all have different
06:21
means of navigating the file. But for this, for this, in this case, in this course, we're gonna use the V. I enter. So
06:28
and we'll talk about Well, I'll give you some examples. Different editors in the next module and Assistance Administration module module three.
06:35
We'll do some more file editing and do some again some more examples of different editors. But for now, I'm just gonna be focusing on using the P I editor.
06:44
So there's a couple ways that you can actually see the file on what's in it.
06:48
The quickest way and easiest way to do it would be used. The Catholics, the cat command. So it's just just like the animal cat. C A T.
06:57
What that's short for is contaminate. Then well, that's gonna do. Is going to give you a quick snapshot of the file contents on your screens. Gonna print it out and actually in the terminal.
07:08
So let's d'oh!
07:10
Let's do cat. And then then type the name of a file, resolved
07:15
the cough, okay, and get out of completed. That's it. Auto completes a good way to make sure you're not making mistakes in spelling our case.
07:25
So I'm gonna do that, may enter, and it's going to give me the file content.
07:30
Okay, so you can see the hashtag or the pound character here is that is commenting out the lines. Okay,
07:38
um, don't at this have filed by hand. Your changes will be over it. So any time you make any changes to result dot com it's actually gonna
07:45
it's gonna fix is gonna be overwritten, Okay, So because it is pulling for D. N s, since we don't have DNA, since I don't have this intricate lab set up,
07:53
we don't have any D. N s here. But if you did have your dina server, you'd see it instead. Using search local domain
08:01
in the loop back address 1 27 011 for our name, sir. But we don't actually have a name server.
08:07
Currently, we don't have Dean s 2.2. So this is what you see now, if you did have d N s, you'd actually see the your d n. A server listed here. Your name server. Depending on your configuration and your networking architectural set up,
08:20
it's gonna be different for everybody. But this is basically where you're gonna see your d n. A server. Okay,
08:26
so now we've seen it with cat. We can catch a great command to use just quick and dirty. You can see the contents of the file. However you can't. We use in the cat command, you can actually edit anything. Can't make any changes to it.
08:39
To make changes, you've got to use an editor. So we're gonna use V I So I'm gonna do the same command, except I'm going to say V I
08:45
Sorry. Five finger in here,
08:48
B I resolve.
08:50
Can I have a complete result? That calm
08:52
now It's just dropped me into an editor again. It's still giving me the same. You can see it. Show me the same
08:58
same exact file contents that you saw when I used the cat command. But instead, this is dropped me into an editor so I could go ahead and edit. It is not too edited by, you know, don't edit this file by hand.
09:11
Your chains will be over in. So I'm not actually, I'm not gonna give you a poor example, but actually editing a file says don't edit my hand. But this gives you an idea of what the V I does za file anger and opens up the file and allows you to edit it.
09:26
Since I don't wanna edit it, I'm gonna hit the escape key that's gonna drop me into a little record. Enter a command to leave, which always gonna type, huh?
09:35
I'm sorry. Escape the members, hype the colon
09:39
and cue for quit.
09:41
Hey, I didn't make any changes. The file. I'm just quitting
09:46
again. We're gonna talk more in depth about violating, will understand how we can edit it, and we'll use examples, create files, understand that. So I'm not gonna get into death on that. But that's a look at the result of com file Again. You would see that name, sir, over there
10:01
on DDE what it would look like if you had Deanna's involved.
10:05
So let's take a look at a different file.
10:07
This file is the etc host file again. It's in the etc. Director. Someone to stay in like I'm going to stay here in this directory. I'm just gonna do again cat
10:18
hosts.
10:20
But Swan
10:24
Crist
10:26
Who's okay?
10:33
Okay. So again, cat Nate or the cat command,
10:37
it's just printing a quick and dirty look at the snapshot of the file content.
10:43
So here you can see again If I had different hosts if I wanted to create a different VM on my network
10:48
and given a name of cyberia Lennox bm underscore too
10:54
more savory Lennix
10:56
admin d m that I could actually
11:00
put that in here instead of actually, instead of having to pee in the eye with the I p address, I could just paying the machine name.
11:07
So this is nice to set up. You don't have d N s, but you wanna get away from having to use the I p address for everything.
11:13
All you have to do is place all of your host inside of the host file, and it will do that. So
11:18
there is one thing that you need to remember when you're doing
11:20
when you're when you're creating stuff with your host file, there's no persistency involved with your host file. Okay,
11:28
So what means what persistency means is that if I'm going to place host file host names in my host, etc. Host file
11:37
when I go to reboot, what if I have to reboot or the machine goes down? For some reason, when I come back up, that host files gonna be blank.
11:45
It does not hold onto any changes that are made to it. So it's just a running change, Okay,
11:50
not the greatest place to do that. But when you do that you created there, then you also add the hosts
11:56
to your dear, uh,
11:58
network sis config file or your dad or your resolve dot com file. Or, if you have Deena's, that's where it will stick.
12:05
But to be quick and dirty. If you're just upper running, you want to make sure that you can ping things with the names or you wanna add it. So it's etc hosts. And again, if I do, the I
12:16
hosts
12:16
draws me into the file editor. And here's where I can actually make any changes at
12:22
different names.
12:22
So let's go ahead and add. But the host just to make believe, though, so you can see what the editor will. D'oh.
12:28
So in order to get into the motor, I'm actually going to start editing the file. I have to hit a lower case I
12:35
That drops me into
12:39
input mode, so I'm actually gonna start making input. You can see it the bottom. When I hit, I tells me warning. I'm changing a read only file. Okay. Again, we're gonna cover all this inside of the file editing portion of module three. It's a Sandman Martin module. So just for now, I'm gonna show you what change will be made. I could do this type
12:58
No. Blow hit, enter.
13:01
Um,
13:01
making
13:03
changes.
13:05
I mean,
13:09
okay. And save those changes when I'm done with my editing mode or input Mohit escape. That takes me out of it anymore. I can't type anything else. We'll see if I start typing things. Nothing happens
13:20
Now, if I go up here and I do a d d it deletes the entire line. Okay? Begin Will cover this in death, so don't worry about it.
13:28
But I want to get out of here. I'm just gonna type command, and I'm gonna excite quick.
13:31
Okay? This is no right since last change. And
13:35
ah, bang or exclamation and Lennox, we call exclamation marks, bangs
13:41
and a bang to override. Okay, so there's no right since last. I'm not. It's not gonna want me to make you the rights for saves to this file because it's Marie only.
13:48
So again, I have to do escape,
13:50
hit the colon
13:52
and do a quit with the bang, and it'll let me go out.
13:56
Okay? Normally, if it wasn't a read only file and it was editable, I hit the quick
14:03
hit the colon, and then a cue for quit to get out. It would tell me you've made some changes. Do you want to save this? Or the last rites have not been saved yet.
14:13
Then you have to do a w Q right, and then quit. So you do a right quit and then a bang to force the right quick. And then you get out on you. Major city. You Major, save your changes to that file. So some good stuff. So good files again. Just using cat will just drop you into the file contents on your screen. Easy. Good to go.
14:33
So another another file that we're going to look at
14:37
is the,
14:37
uh, in this switch dot cough. Let's look at that one again. I'm used the cat command can cat short Furkan, Captain eight.
14:46
You know, take. It s
14:48
switched, Uncle
14:52
Clear.
14:54
So this is basically ah, the configuration here. This is an example configuration of the new
15:00
names, service switch functionality. And this has to do with Dean s. Okay.
15:03
It's gonna list the order of host name search. Typically, typically look at files.
15:09
Oh,
15:11
been been Miss server than D n a server. And you know you could do that here.
15:16
It's all here for you in this file. Easy to do is you Look at it again. You get edit this files. Well,
15:22
now there's other files that air not pertinent to Bunty.
15:26
And those files are the pet ceases config network, and I'm actually gonna pull up a text editor
15:33
take these out for you, so you can see. And it's well, actually, no. In fact, I'm just gonna go here.
15:46
Just go here and do a
15:52
you donkey.
15:54
Open it up.
15:58
Okay,
16:00
You're some other files. Will type amount for you here so you can actually write that down
16:06
for a red hat.
16:08
Fedora
16:11
were sent us all pretty much in the same family.
16:15
You're gonna see these files Also. These are the files that you're not going to see in a bun too.
16:21
These are the etc.
16:22
This is big
16:25
network.
16:26
And this is going to specify your network configuration. For example, your static I p your D a c p your nous, et cetera. This is where you're gonna see those items. Okay?
16:37
Another files going to be the etc.
16:38
It's just a big
16:41
network
16:44
Cash scripts
16:47
if C f g and then your device name.
16:52
Okay.
16:53
This is gonna be specifying your TCP network information.
16:57
Okay.
16:57
It's gonna show you your interface configurations
17:02
for your devices for zero each one. Look back. Hello? Whatever. Devices that you have for networking the three and see the that information. Okay.
17:11
And then one other one other look and I'll just keep this over here. So you can, uh,
17:15
if you want to take time to jot it down or whatever,
17:18
or if you're using Ah, different destro for using destro Such a sendoff door, Red hat. You can actually try these out in your own head here or your own terminal.
17:27
I'm gonna open up the sea, uh,
17:32
CD into the network.
17:38
Looks like this director doesn't exist here in this.
17:42
See
17:45
secrets here?
17:52
No, no, no network. There it is.
17:55
Okay, to see into that
18:00
quest,
18:02
okay. And interface is someone to cat to face. This
18:06
shows me my interface is right. So it's showing me here the auto for Luke back interfaces that are usually enter. This is my Etsy network interfaces. So there's those were the files that you're most commonly gonna be looking at for a networking.
18:22
I'm scared.
18:23
So a couple of networking commands. Let me just show you a quick command. It'll help you start to get kind of cluttered in your terminal. Sometimes I
18:32
we get a little crazy when it comes to terminal stuff, trying to keep it clean and neat. But when I see this, it's kind of jumbled and I get kind of distracted by all the different commands. A color. So I'm just going to have a clear
18:42
and that clears out the terminal window, takes you back to a clean,
18:47
clean state where you can see that there's nothing there. Okay,
18:51
so in order in order to
18:53
do some other commands of my mom listed here for a walk through the 1st 1 of the most common, I'm gonna go back to, um, we go back a couple of levels.
19:06
Okay.
19:08
All right.
19:11
I'm gonna go here back to my beauty,
19:14
come back to route, and I'm gonna type in
19:17
post name.
19:19
And that command will just give me my host name. This tells me the name of the
19:25
computer virtual machine, et cetera, that I'm on currently. Okay,
19:29
Now, if I do a host name, this most likely is not gonna work. I'll tell you why. In just seconds,
19:36
right?
19:37
If I do a host named Dash D, this is going to give me my domain. The name of my domain. Well, since this is a stand alone box and I don't have any domain currently built out, it's not going to show me anything However, if I did have a domain and for instance, it was named
19:52
cyberia dot local,
19:53
it would actually show me the name of the
19:56
It was Show me cyber dot Local is my domain. Okay?
20:00
Same with the command of host name Dash.
20:04
Yes,
20:07
that's gonna be is showing me the name of the VM once again. But is this would show me if I had a domain this to show me the fully qualified domain name for the machine. Okay.
20:18
And then host name. That's another good one. Dash, I
20:22
gives me this is showing me my look back address, but this is basically look back for the
20:26
bm itself.
20:29
Okay, so this is there a couple of the couple quick commands that you can use? All right,
20:36
now again, Back to if config if config.
20:41
Okay, so if configures a great one because we talked about this earlier, gives you your i p address. What are some other things? You can do it if traffic
20:51
right. So I can actually create an interface. I can bring interface up. I could take a interface down
20:57
if I want to take an interface down. I type if
21:03
Thanks.
21:07
Sorry, if I
21:11
zero
21:12
okay.
21:15
Again. Failed. Strung. This is Lucy for to do with studio.
21:19
Yeah,
21:25
okay.
21:26
Ignoring unknown interface easier. Okay, so it's already up, so it's not gonna
21:32
kind of important. Well, it's already up. It's not gonna do anything. If I was doing if down zero,
21:37
you would actually take the interface down on what would happen if the interface down, Well,
21:41
we'd be disconnected from the virtual machine because we just shut down the interface, the network interface.
21:48
So I'm not gonna actually do that. But that's what you would do if you wanted to get the interface up or down. You would actually use that Thio do that. Okay,
21:56
so you can do that. You can also
22:00
actually configure the interface by using the config command.
22:07
So if configures a powerful command and I'm actually gonna clear this out against you, see a better running view.
22:15
So usually the if config man Schiff
22:22
So that if convicted man resides in the ESPN
22:26
directory, Okay, So, in order to use that director and we do already use this command better, we need to be We should have. We should be in this directory. Sometimes it'll let us. We'll go ahead and try it first and see, but less. But well you want to do is tight if config.
22:41
Yes.
22:41
Zero
22:44
Your I P address was 1 68 0 10 I'm just using an arbitrary I p address. Just a show. An example. I'm not actually gonna configure it.
22:53
Next. You want to give it till tell the machine that you're going to give the next net mask coming up next would be for a classy to 55 0
23:03
and you won't tell the broadcast address, which would be, you know, networking be the last
23:10
right after the last usable rights, which had been a classy, which would actually be 2 55 So forethought, that would be 2 to 5.
23:18
Okay, then you hit Enter. And what that's gonna do is actually going to configure eat zero
23:23
to have this dress. Okay,
23:27
so we're not we're not actually gonna do that because we don't wanna miss it in fear are our interface.
23:33
So that's what you want to do. Okay, So you want you can do that and it will actually configure it. So there's different
23:41
interfaces. If there's an each one e 33 accessory 4th 5 actually configure each of those with a different I p address depending on where you're using a machine for
23:49
those are those are really helpful if convict man is really helpful.
23:55
And again, you know, some of the commands you can type in for if if config. All right about here
24:00
is if config
24:07
zero and realized. Now I put the wrong commander.
24:10
Originally, I typed in just
24:12
if, uh, this is wrong.
24:15
So it's actually a full command If config been your interface.
24:21
I'm not just Yeah. Then your interface. And I'm gonna type these in here. So, you know, this is just where you going in, Put something
24:30
in her face,
24:30
okay? And then you're
24:33
your type. What? You want to do your option up?
24:37
We're down.
24:40
Okay. And then you're in the best would join us. He hit. That in turn, takes about
24:45
adversely. If configured in your interface
24:49
down
24:53
another command, you can uses nets. That
24:56
right?
24:57
And what does nets dad do? Well, if you remember, if you've done this with windows, it's fairly the same is pretty much the same thing, right? It's gonna tell you what you're
25:08
what you're
25:11
You know what? You're what you're doing. What you're seeing Come across your for traffic. Okay,
25:15
So what you want to do? It's just type. And we're going back here to the command line.
25:22
That's that.
25:23
I think this is telling me everything that's connected. What is doing? What it's listening on.
25:30
Okay,
25:30
there's different options you can do. Is telling your routes, et cetera, what you want to do? It is controlled by first. But every move just one over falling. So you type in the command and you have to type in the actual argument.
25:41
It's gonna be a tool. It's gonna display your network connections both your incoming and outgoing. It's also gonna display your route tables
25:48
and other network interface and network protocols statistics. Okay,
25:53
so it's also it's also it's it's available on Lennox and UNIX, but it's also available on Windows. What we want to do for net stat. If you want to be a little bit more granular about it
26:04
is let's just let's just display table of all our network interface. It's kay.
26:10
So what we want to do for ness that back man and let me clear the cell
26:14
tight net stat
26:15
bash I
26:18
that's giving me my interfaces occur. I, like currently only have to interface is my eat zero, which my Ethernet connection to the Internet
26:25
and then my lube back. Hello? It's my lube back, Luke. Back address, which is not Obviously it's not giving me anything.
26:30
Um, and then another another
26:33
the commander argument that we can use this for routes. We can do that, stat.
26:38
That's our
26:41
This is gonna tell me my routes. Okay? You're not seeing a whole lot because I'm using a fairly simple insulation.
26:48
Okay, let's look at some others
26:53
statistics. We could see the statistics from each of the protocol each the protocols. That stat.
27:00
Well, this gives me my eyes. Just so I've got UDP statistics for UDP. Stroll up a little bit.
27:07
There's ICMP is TCP
27:11
and you're just a bunch of different ones, right?
27:14
So what I could also look at is the user's right
27:18
minutes that
27:26
leave its users. Yeah,
27:30
stay connected.
27:33
Okay. So, miss, That's also it's a very powerful tool that you can use. All right. It'll help you understand what's coming across your network. On what interface? What protocols it's using.
27:44
You know, if It's listening. It's not listening. What is listening on etcetera? So good tool to use That's that is good for network.
27:51
So what's another command? You think any other other network commands that might be helpful in this situation?
27:57
Obviously, that was there, and we're face to face. You could be able to shout out some answers.
28:02
Let's jump into it. So another command that would be very helpful is the Ping Command. What is Ping? Duping is pretty much the most simple networking command you can give.
28:12
Ping is valid for Windows and UNIX Lennox and it pretty much all of those, right? So what it is is using the I, C and P Protocol
28:19
to reach out and check to see if a target that you're pointing at is actually alive and it will respond back to you.
28:26
So since I'm connected to the Internet, I can actually go ahead and pink something that will try us unless I'm just going to use google dot com is an example of
28:37
funny spelling,
28:41
and I'm getting a response. ***.
28:42
See that? I'm getting 64 bites, which is my pink packet.
28:47
I'm getting it back from I P address 74 1 25 to 27
28:52
to 28. Right here.
28:55
Protocols. ICMP
28:56
timeto live packets from the packet is 128 seconds.
29:00
Thank you. And it is going to keep continuously continuously pinging. Or you can see here is I've actually got a lag
29:07
of 42 milliseconds. It's much fairly high for ah, for home user. Should be should be much less than that.
29:15
But you want to be. You want to try to be around somewhere on 20 milliseconds because of Peking packets, Not that large. Imagine if you were sending a video or trying to upload a video to YouTube or something. Your flag would be much larger if it was ah ping of 42 milliseconds.
29:30
Okay, so it will just keep going much like windows. When I type in peeing the i P address in a space and a dash T that's a terminal ping. That's just gonna keep going until I stop it. We'll let X on the map. It just keeps going until you actually kill it with a control C, which is just did.
29:48
They will tell me that 68 packets were transmitted zero packet loss and the time that it took.
29:53
Okay, So I could do that. I can also use a command. It's commonly used in windows, which is in its look up.
30:03
Look up and it's Look up google dot com
30:07
See what gives me
30:08
again? This is s lookups, his name server lookups Gonna tell me all of Google's name servers and you can see they're all listed here. All the i P addresses,
30:18
etcetera. Great tool. The have great tool to use when you're trying to figure out what I P addresses Tash to what name With Indian s
30:26
one of the best tools you can use in this system administrator when he comes to networking,
30:30
right.
30:32
Another great tool that I love to use when I'm trying to figure out kind of what my experiencing big time, late and see. And I'll understand
30:40
kind of what my my hops are our routes looking like for someone in point to another,
30:45
I can use the command that will allow me to do that
30:48
is trace row tracer. Okay,
30:52
so what I want to do
30:55
is into the trace route command.
30:57
That's gonna be a trace route.
31:03
And I'm going to enter Where I wanted to go, So I'm gonna use google dot com again.
31:10
I'm sorry. Could tell me is I've got it installed. So let's let's going still trace around.
31:17
So
31:18
trees
31:22
Okay, so it's going ahead and go install it for me installed.
31:26
So now I want to use which,
31:29
which trace Rome will tell me where it's located. User been so it should allow me to just launched here about being in that directory.
31:36
So when do you again trace route
31:40
rolled up?
31:41
Okay, it's working. What it does is kicking off is gonna show me how many hops it takes to get to where I'm going.
31:51
So it's going, It's thinking about it.
31:53
As you can see, it's telling me the middle seconds that showed me in my my my original address, which looks like it's probably my gateway.
32:01
Well, 91 68 200 out, too. And it's going to 74 1 25 to 27 to 26.
32:08
James,
32:09
it's gonna go is because this is 30 hops, Max. You could see this here, right? It timed out of 30 hops. Max
32:15
Chlo, 30 hops. Max is just gonna take 30 hops until you know, at 30 hops gonna go ahead and kill the trace route, but so it's taking a long time. There's a little bit of network late and see involved there
32:25
Should it should have actually gone away. But my my max hop, I had this set to 30 so that's fine. But this is how you can do it and a networked environment, an enterprise areas solution. Architecture
32:39
If you just want test how long it takes you to get to your What kind of latents here, what kind of hops you have to get from a user desktop or an admin desktop
32:49
back to the domain controller. You can do that and you'll see that it will show you exactly where you're going
32:53
or to actual Web site that you're trying to get to. You may have some late and seeing getting to a website. Will shamba hops you're taking? We'll try. One more is to see if it's any different. Here.
33:04
Trace round two
33:07
twitter dot com.
33:09
See, that's let's see if this is any different
33:15
again. With my my heart, you're 30. Max hop
33:21
looks like it's probably going into being the same.
33:28
Okay, well, I'm gonna do is I'm gonna try one just for grins on my home network.
33:32
Trace round made to 1 68 0 11
33:39
We'll see if I can pick first
33:47
camping it. Let's Ping.
33:57
Yeah, we can't be now you.
33:59
So what we would do is he would use trace route and in the i p address or the fully qualified domain name where you want to go and I will tell you you know how he hops it takes to get there.
34:08
Okay,
34:10
so we looked at in s look up. We looked at,
34:14
um, looked in this look up and we looked a trace route. We looked Ping If config
34:20
I'm here again is some of the files that we looked at that you can find on Red Hatter fedora sent toss for utilizing the files That could tell you your network configuration.
34:31
Look what the cat command, It'll show us, we'll have her have it. Prints it out on the screen. There's some really good options because good things. I hope you understand. Basic introduction. Thio Lennox Networking again. If you look at this from a gooey perspective, I'm gonna go here to my little networking right
34:49
or I could just go here to my search for that type of networking.
34:53
And there is.
34:55
Okay,
34:57
let's see what this brings up. Brings up my network. Settings that were a proxy Don't have a proxy set, but I could do one if I wanted.
35:05
My wired connection tells me my address, My default route, which is my default gateway
35:10
and D N s. Which isn't it being my gateways world?
35:15
Okay, good. All settings
35:16
takes me back out or I can go to
35:21
that Were connections.
35:22
That shows me one network connections. I got one that I have one that network connection at the time
35:28
currently. But I could go to credit that if I want to give it a name,
35:32
you can do whatever I want here, Okay? And this doesn't meet with general security settings. I p B B four settings
35:40
currently said the GP, I could give it a static or in a linen. Static is referred to as manual, so I could do manual Oregon to static or just disable interface altogether.
35:52
If I do that, I'm gonna lose my virtual machine because I'm killing the network, and that's I depend on the networks can't my virtual machine.
36:00
So I'm gonna go ahead and close that out.
36:06
So those were some of your basic. This is introduction to networking.
36:09
This is your basic networking items. Some of the files that you can look at
36:14
and a CZ. We get into the system administration portion of the course in the module three. We'll see some more examples of networking how we can troubleshoot it, have been set it up a little bit better
36:25
and give you a better idea and understanding of a little more advanced networking topics.
36:30
But for now, you should be able to in your own Lennox Destro there that you have downloaded and installed.
36:37
You should be able to try to try out some of these files and navigate some of the files. Check him out, try some of the commands, try trace around duping, maybe build a couple of virtual machines and see if you can ping around the virtual machines and
36:50
use your host file to set up the names. If you don't have D N s, you can add the host names to your host file and then you can actually paying with the host name.
36:58
So this is your introduction in Lenox networking
37:01
and should be a good start for you, and we'll talk more about it in the Systems Administration module. Of course,
37:07
we'll talk about the meat of it, so thanks for watching. Hopefully, this was easy for you to understand, and now you can go ahead and try and implement your absolution.

Up Next

Fundamental Linux Administration

An open-source operating system modelled on UNIX, first released by Linus Torvalds in 1991. Why do I need this Certification? With the increasing popularity of cloud based systems and data centers, organizations need system administrators

Instructed By

Instructor Profile Image
Greg Stuart
Instructor