Group8 Assingment
Group8 Assingment
Network Configuration
Setting/Changing an IP address
1. Determine the Name of Your Network Interface
First, make sure you are aware of the precise name of your Ethernet interface (current
Ubuntu versions no longer use the old eth0 naming scheme). To get a list of every
network interface, use the following command:
On an Ubuntu system (or any Linux-based system), the IP addresses assigned to each
network interface are shown with the “ip addr show” command. It is a component of
the IP command suite, which is used to manage networks.
Verify Installation:
You can check the status of NetworkManager after installation to make sure it's operational
by using command “sudo systemctl status NetworkManager”
Setting/Changing an IP address
The command “sudo nmcli connection edit ens33” is used to edit the network connection
associated with the interfaces ens33 using nmclil.
From this mode, you can view the current settings, modify settings, set static IP or change to
DHCP and save the changes as given below:
By using goto ipv4 inside the nmcli tool to acces the ipv4 settings:
On an Ubuntu system (or any Linux-based system), the IP addresses assigned to each
network interface are shown with the “ip addr show” command. It is a component of
the IP command suite, which is used to manage networks.
If you want to modify the hosts file in Ubuntu you should use the command 'sudo
nano /etc/hosts'. The file opens allowing users to update hostname and IP address data
within it. Navigation to the exit leads through pressing Ctrl + X while using Ctrl + O
to save your work.
This directory can be used to create symbolic links pointing to the Easy-RSA
package files located in the /usr/share/easy-rsa folder on the CA server.
The command chmod 700 /home/np069790/easy-rsa is used to secure the
new PKI directory, ensuring that only the owner has access to it.
You must first create a file named vars and fill it with certain default values before
you can construct your CA's private key and certificate. After cding into the easy-rsa
directory, you can use Nano or your favorite text editor to create and modify the vars
file:
Save and close the file when you're done. To verify if you are using Nano, hit
CTRL+X, followed by Y and ENTER. The time has come for you to develop your CA.
By using the build-ca option, execute the ./easyrsa build-ca command to
generate the root public and private key pair for your Certificate Authority.
Now your CA is configured and ready to act as a root of trust for any systems that
you want to configure to use it. You can add the CA’s certificate to your OpenVPN
servers, web servers, mail servers, and so on. Any user or server that needs to verify
the identity of another user or server in your network should have a copy of the
ca.crt file imported into their operating system’s certificate store.
To import the CA’s public certificate into a second Linux system like another server
or a local computer, first obtain a copy of the ca.crt file from your CA server. You
can use the cat command to output it in a terminal, and then copy and paste it into a
file on the second computer that is importing the certificate. You can also use tools
like scp, rsync to transfer the file between systems. However we’ll use copy and
paste with nano in this step since it will work on all systems.
On your second Linux system use nano or your preferred text editor to open a file
called /tmp/ca.crt: