Chapter 15. Network Configuration

Chapter 15. Network Configuration

15.1. Overview
15.2. Establishing an Ethernet Connection
15.3. Establishing an ISDN Connection
15.4. Establishing a Modem Connection
15.5. Establishing an xDSL Connection
15.6. Establishing a Token Ring Connection
15.7. Establishing a Wireless Connection
15.8. Managing DNS Settings
15.9. Managing Hosts
15.10. Working with Profiles
15.11. Device Aliases
15.12. Saving and Restoring the Network Configuration

To communicate with each other, computers must have a network connection. This is accomplished by having the operating system recognize an interface card (such as Ethernet, ISDN modem, or token ring) and configuring the interface to connect to the network.

The Network Administration Tool can be used to configure the following types of network interfaces:

It can also be used to configure IPsec connections, manage DNS settings, and manage the /etc/hosts file used to store additional hostnames and IP address combinations.

To use the Network Administration Tool, you must have root privileges. To start the application, go to the Applications (the main menu on the panel) => System Settings => Network, or type the command system-config-network at a shell prompt (for example, in an XTerm or a GNOME terminal). If you type the command, the graphical version is displayed if X is running; otherwise, the text-based version is displayed.

To use the command line version, execute the command system-config-network-cmd --help as root to view all of the options.

Network Administration Tool

Main Window

Figure 15.1. Network Administration Tool

Tip

Use the Red Hat Hardware Compatibility List (http://hardware.redhat.com/hcl/) to determine if Red Hat Enterprise Linux supports your hardware device.


Note: This documentation is provided {and copyrighted} by Red Hat®, Inc. and is released via the Open Publication License. The copyright holder has added the further requirement that Distribution of substantively modified versions of this document is prohibited without the explicit permission of the copyright holder. The CentOS project redistributes these original works (in their unmodified form) as a reference for CentOS-5 because CentOS-5 is built from publicly available, open source SRPMS. The documentation is unmodified to be compliant with upstream distribution policy. Neither CentOS-5 nor the CentOS Project are in any way affiliated with or sponsored by Red Hat®, Inc.