how to create alias interfaces

suse

Verified User
Joined
Sep 11, 2019
Messages
10
How can using nmcli for crate alias interfaces for GCP?

e.g.
eth0:0

NOTE: Network scripts are deprecated in Red Hat Enterprise Linux 8 and they are no longer provided by default.
 
Refer my last posted.
https://forum.directadmin.com/showthread.php?t=59159

Try for download...

#wget -O /dev/null https://www.apple.com/index.html
--2019-10-08 23:18:19-- https://www.apple.com/index.html
Resolving www.apple.com (www.apple.com)... 23.199.129.155, 2600:1417:3f:29d::1aca, 2600:1417:3f:2ab::1aca
Connecting to www.apple.com (www.apple.com)|23.199.129.155|:443...


FORWARD
Code:
iptables -v -L FORWARD 
Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination         
    0     0 ACCEPT     all  --  any    any     anywhere             anywhere             ctstate RELATED,ESTABLISHED
    0     0 ACCEPT     all  --  lo     any     anywhere             anywhere            
    0     0 FORWARD_direct  all  --  any    any     anywhere             anywhere            
    0     0 FORWARD_IN_ZONES_SOURCE  all  --  any    any     anywhere             anywhere            
    0     0 FORWARD_IN_ZONES  all  --  any    any     anywhere             anywhere            
    0     0 FORWARD_OUT_ZONES_SOURCE  all  --  any    any     anywhere             anywhere            
    0     0 FORWARD_OUT_ZONES  all  --  any    any     anywhere             anywhere            
    0     0 DROP       all  --  any    any     anywhere             anywhere             ctstate INVALID
    0     0 REJECT     all  --  any    any     anywhere             anywhere             reject-with icmp-host-prohibited


OUTPUT
Code:
iptables -v -L OUTPUT
Chain OUTPUT (policy ACCEPT 322 packets, 150K bytes)
 pkts bytes target     prot opt in     out     source               destination         
 1836   13M ACCEPT     all  --  any    lo      anywhere             anywhere            
  322  150K OUTPUT_direct  all  --  any    any     anywhere             anywhere

INPUT
Code:
iptables -v -L INPUT
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination         
36813  146M ACCEPT     all  --  any    any     anywhere             anywhere             ctstate RELATED,ESTABLISHED
  425 25500 ACCEPT     all  --  lo     any     anywhere             anywhere            
  792 52738 INPUT_direct  all  --  any    any     anywhere             anywhere            
  792 52738 INPUT_ZONES_SOURCE  all  --  any    any     anywhere             anywhere            
  792 52738 INPUT_ZONES  all  --  any    any     anywhere             anywhere            
    0     0 DROP       all  --  any    any     anywhere             anywhere             ctstate INVALID
    0     0 REJECT     all  --  any    any     anywhere             anywhere             reject-with icmp-host-prohibited
[/QUOTE]
 
Please do not doublepost. This has nothing to do with your network interfaces or creating them.
I already answered about firewalling in your other post about this question.
 
Back
Top