Solved

What are the frequently used configuration files in linux/unix?

Posted on 2008-06-13
13
280 Views
Last Modified: 2013-12-23
Can you list what are the frequently used configuration files in Linux/Unix/networking.

Its purpose and location/name in brief?
0
Comment
Question by:jaisonshereen
  • 5
  • 4
  • 2
  • +1
13 Comments
 
LVL 40

Expert Comment

by:omarfarid
Comment Utility
your question is general and answer is that it depends on you as system administrator.

It could be

/etc/hosts
/etc/group
/etc/passwd
0
 

Author Comment

by:jaisonshereen
Comment Utility
what is ifconf-eth0.conf  and ifconf-eth1.conf what is its use ?

i seen below entries :

Gateway ,network, broadcast ...and so on... is this custom entries or inbuilt one?
 
0
 
LVL 40

Expert Comment

by:omarfarid
Comment Utility
which system are you using? From what you showed, it looks like configuration info for ethernet interfaces.
0
 

Author Comment

by:jaisonshereen
Comment Utility
unix system i am using ..yes it is configuration of ethernet interface ..is it default in linux machines ?

what are the listing inside and why it is used?

what is eth0 and eth1 ? what the propose of this interface ?
0
 
LVL 8

Expert Comment

by:Rance_Hall
Comment Utility
different linux distros use different configuration files to do things like setup networking etc.  so somethings are not common accross linuxes

the ones that are are things like

/etc/fstab - lists file systems automatically mounted at startup
/etc/group and /etc/passwd - manages user accounts/group settings
/etc/hosts - part of your networking core
...
...


Id recommend you get a good book on unix/linux and it will help you through some of what you are asking.
0
 
LVL 8

Assisted Solution

by:Rance_Hall
Rance_Hall earned 150 total points
Comment Utility
eth0 is your first ethernet device, eth1 your second, etc.
0
IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

 

Author Comment

by:jaisonshereen
Comment Utility
btb... what is an ethernet device ? :-)

is this a thing for networking?
or is this the only thing?
0
 
LVL 40

Accepted Solution

by:
omarfarid earned 200 total points
Comment Utility
ethernet device is the name for ethernet card or NIC that connects the computer to ethernet network. Ethernet is a networking protocol by which computers communicate over local network.

http://www.wisegeek.com/what-is-ethernet.htm
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212080,00.html
0
 
LVL 48

Assisted Solution

by:Tintin
Tintin earned 150 total points
Comment Utility
jaisonshereen, please be aware that configuration files differ greatly between Linux distros and Unix flavours.

There's only a handful of configuration files that you'd find common across all Linux/Unix systems.
0
 

Author Comment

by:jaisonshereen
Comment Utility
Is there anything other than ethernet and that is popular?
0
 

Author Comment

by:jaisonshereen
Comment Utility
what is the difference between tcp and ethernet?
0
 
LVL 40

Expert Comment

by:omarfarid
Comment Utility
if you are familiar with the 7 layers OSI networking model, then ethernet is in layer 2 and tcp is in layer 4 transport.

http://en.wikipedia.org/wiki/OSI_model
http://en.wikipedia.org/wiki/Tcp/ip_model
0
 
LVL 48

Expert Comment

by:Tintin
Comment Utility
>Is there anything other than ethernet and that is popular?

This question doesn't make much sense to me.  In the olden days of networking, Token Ring was popular, but Ethernet became the defacto-standard.
0

Featured Post

Give your grad a cloud of their own!

With up to 8TB of storage, give your favorite graduate their own personal cloud to centralize all their photos, videos and music in one safe place. They can save, sync and share all their stuff, and automatic photo backup helps free up space on their smartphone and tablet.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
How to clone solaris 10 machine 33 71
Network Connection 5 31
NSD FAIL 2 19
cisco nexus experiance 2 27
Meet the world's only “Transparent Cloud™” from Superb Internet Corporation. Now, you can experience firsthand a cloud platform that consistently outperforms Amazon Web Services (AWS), IBM’s Softlayer, and Microsoft’s Azure when it comes to CPU and …
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now