Book Image

Red Hat Enterprise Linux 8 Essentials

By : Neil Smyth
1 (1)
Book Image

Red Hat Enterprise Linux 8 Essentials

1 (1)
By: Neil Smyth

Overview of this book

Red Hat Enterprise Linux 8 is one of the most secure and dependable operating systems available. For this reason, the ambitious system or network engineer will find a working knowledge of Red Hat Enterprise 8 to be an invaluable advantage in their respective fields. This book, now updated for RHEL 8.1, begins with a history of Red Enterprise Linux and its installation. You will be virtually perform remote system administration tasks with cockpit web interface and write shell scripts to maintain server-based systems without desktop installation. Then, you will set up a firewall system using a secure shell and enable remote access to Gnome desktop environment with virtual network computing (VNC). You’ll share files between the Red Hat Enterprise Linux 8 (RHEL 8) and Windows System using Samba client and NFS. You will also run multiple guest operating systems using virtualization and Linux containers, and host websites using RHEL 8 by installing an Apache web server. Finally, you will create logical disks using logical volume management and implement swap space to maintain the performance of a RHEL 8 system. By the end of this book, you will be armed with the skills and knowledge to install the RHEL 8 operating system and use it expertly.
Table of Contents (32 chapters)
32
Index

19.3 Virtual Machine Networking

Virtual machines will invariably need to be connected to a network to be of any practical use. One option is for the guest to be connected to a virtual network running within the operating system of the host computer. In this configuration any virtual machines on the virtual network can see each other but access to the external network is provided by Network Address Translation (NAT). When using the virtual network and NAT, each virtual machine is represented on the external network (the network to which the host is connected) using the IP address of the host system. This is the default behavior for KVM virtualization on RHEL 8 and generally requires no additional configuration. Typically, a single virtual network is created by default, represented by the name default and the device virbr0.

In order for guests to appear as individual and independent systems on the external network (i.e. with their own IP addresses), they must be configured to share...