Linux - NetworkingThis forum is for any issue related to networks or networking.
Routing, network cards, OSI, etc. Anything is fair game.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Hello All.
I want to launch a virtaul network with some devices like router, Virtual machine and etc and use some tools like metasploit to attack it, is it possible?
I saw some app like Firewall Builder and Gns3, Can I use them to make my labs ?
there's no such thing as a "virtual network". There are plenty of ways to allow VM's to attach to bridge interfaces, which can allow multiple VM's on the same box to communicate without relating to a physical network presence, but it's not a "thing" in itself. if you create a VM whatever framework you use will more than likely to offer to create a private bridge to use if that's what you want.
there's no such thing as a "virtual network". There are plenty of ways to allow VM's to attach to bridge interfaces, which can allow multiple VM's on the same box to communicate without relating to a physical network presence, but it's not a "thing" in itself. if you create a VM whatever framework you use will more than likely to offer to create a private bridge to use if that's what you want.
In your opinion, Can I use GNS3 for simulation a attack? For example, work on sisco routers
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.