networks

networks

  • Routing and Filtering Network Traffic

    A brief, high-level introduction to Linux networking architecture. Explains how the Linux kernel manipulates network traffic using a top-down approach and basic framework to route

    ...
  • A Brief History of Linux Networking

    Have you ever wondered why Linux network management is so confusing? You need only make a cursory review of the history of Linux networking tools to understand how it got this way.

  • Bibliography (Networking Articles)

    Andreasson, Oskar. Iptables Tutorial 1.2.1. Chapter 6: Traversing of tables and chains. https://www.frozentux.net/iptables-tutorial/chunkyhtml/c962.html.

    Andreasson, Oskar. 2006.

    ...
  • Policy Based Routing

    A traditional router stores network route information in routing tables. A routing table is a map of a network. Linux uses a policy based routing system, aptly called a

    ...
  • iproute and Routing Tables

    We will begin the detailed discussion of the first component of the Routing Policy DataBase (RPDB) triad: routes (the other two components are ip rules and ip

    ...
  • Special Routing Use-Case Scenarios (iproute2)

    Now that you have a basic understanding of Linux network routing, it's time to delve into some interesting things you can do with this information.

    Dropping Packets

    Here are

    ...
  • Route and Netstat

    This section describes the use of alternative tools to the iproute2 suite for viewing the status of a network. They may be old, but route and netstat can still be useful

    ...
  • Introduction to Split Gateways

    Having explained the process behind gateway routes in the previous article, what is a split

    ...
  • Follow the (ip) Rules

    Hopefully, you have already read and/or understand these concepts:

    ...
  • Routers, Routes, Subnets, and Netmasks

    A critical component of managing routes is understanding the role netmasks play in managing routing traffic. More commonly known as the netmask, the sub-network mask or

    ...
  • Netmask Filtering Deep Dive

    What is a Netmask (or Genmask)? And why is understanding it so important when it comes to network routing?

  • Gateways

    Routers manage routes. Some routers act as gateways. A gateway is a forwarding router that forms a bridge between local and remote networks. A gateway is required when sending a packet

    ...
  • Split Gateway Tutorial

    Thinking of creating split routes or split gateways? This article is a basic introduction, but it is a hands-on tutorial and will walk you through the building blocks of

    ...
  • Linux Networking F.A.Q.

    What is the purpose of routing tables?

    Routing tables inform the Linux kernel where to find destinations on a network. They describe information such as which network interface to send

    ...
  • Linux Routing Table Architecture

    placeholder for routing table architecture discussion
  • Linux Network Routing Best Practices

    Here are some brief concepts to keep in mind when adding new routes and routing tables.

    Master Routing Table Best Practices

    High level concepts to keep in mind when adding new

    ...
  • Netmask/Genmask Conversion Table

    It's much easier for most people to reference charts of netmask/genmask/CIDR values vs. trying to remember them (though some common masks such as 0 and 255 are easy

    ...
  • iptables Commands

    There are a large number of filters you may apply to your server's network rules via the iptables command. Some of these are found in extensions to iptables.

    The following

    ...
  • Helpful Tips (iptables)

    Here are a few helpful tips related to rule and route testing.

    Don't Forget to Flush!

    If you make changes to ip rules, ip routes, or iptables and wish to utilize them prior to

    ...
  • Persistence: Making iptables Changes Stick

    One of the challenges of iptables, routes, and rules (iprules) is making changes to them permanent. Any changes you make on-the-fly only last until the next system restart.

    ...
  • Chart: iptables Command Matrix

    Chart of the most commonly used iptables rule syntax, demonstrating command syntax along with the tables and chains where each command may be utilized. The table scrolls

    ...
  • Bibliography for VPN Articles

    This is a list of sources I found useful while writing my comprehensive guides on VPNs for Small Business Owners, Home Office Workers, and Split VPNs

    Bibliography for VPN

    ...
  • VPN (Virtual Private Network) F.A.Q.

    What does VPN mean?

    VPN is an abbreviation for Virtual Private Network.

    What is a Virtual Private Network (VPN)?

    A VPN is a secure, virtual

    ...
  • Secure Tunneling IP Network Protocol IDs

    Tunnels in the IT networking world refers to a communications channel connecting two (2) networks or devices when those devices reside on different local networks or sub-nets. A tunnel

    ...
  • Networking

    I.T. networking is a HUGE topic, and I am by no means going to cover every concept, tool, and scenario. What you will find here is a series of mini-guides designed to help you gain a basic

    ...
  • Routes, Rules, and Tables

    This category primarily covers:

    1. iptables, iproute, and netfilter
    2. Routing network traffic
    3. How Linux structures network
    ...
  • iptables and iprules

    Primarily covers iptables, ipchains, and ip rules. It also touches on ufw (Uncomplicated FireWall), and nftables ("NetFilter Tables"), the successor

    ...
  • Virtual Private Networks (VPNs)

    This category contains articles about Virtual Private Networks (VPNs), such as what they are, why you may or may not need or want one, how they function, and how to pick the best VPN service

    ...