Linux - NetworkingThis forum is for any issue related to networks or networking.
Routing, network cards, OSI, etc. Anything is fair game.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Is it possible to have two separate networks off one router so devices in one network will not see the devices/pcs on the other network (subnet?) but they all will share the same internet connection through the router. Is this doable? If so what should I be looking into on how?
Would that be separate subnets? 192.168.1.x 255.255.255.0 and then something like 192.168.0.x 255.255.0.0 (the 192.168.0.x could see the 192.168.1.x but the .1.x could not see the other correct?) Or am I doing this completely wrong?
Yes, in general a router is designed to do exactly that - route! Is there a specific need for the 192.168.0.x network to have visibility of the other, but not the other way around? This could be achieved with a simple routing rule. If you need specific advice on this, you will need to tell us the router vendor/model. I'm assuming the common gateway router will connect to the two networks via switches. Alternatively, the use of VLANs could be used to separate your networks at layer 2.
Yes, in general a router is designed to do exactly that - route! Is there a specific need for the 192.168.0.x network to have visibility of the other, but not the other way around? This could be achieved with a simple routing rule. If you need specific advice on this, you will need to tell us the router vendor/model. I'm assuming the common gateway router will connect to the two networks via switches. Alternatively, the use of VLANs could be used to separate your networks at layer 2.
The router I am using is an ASUS RT-AC66U. I have an app running on one of the pcs (its only going to be 2 pcs on this network only, both pcs will be in the same subnet). I don't want the two pcs to see the one network device on the network, (remove ip kvm switch). The two pcs will be plugged into the kvm switch, I just don't want the kvm on the same network where its detectable from the two pcs. Both the kvm switch and pc's will have the same gateway for internet access.
In layman's terms, VLANs allow you to add a tag to network packets that indicate what network subnet they belong to. This would be done on your router and can be used to split one physical network in to multiple virtual ones. You can also have multiple VLANs that span multiple physical network devices.
This functionality isn't usually included on ISP provided home routers/gateways, so if that's where you were looking to do this you'd need a device that supports it or something you can flash a custom firmware, such as DD-WRT, to.
In layman's terms, VLANs allow you to add a tag to network packets that indicate what network subnet they belong to. This would be done on your router and can be used to split one physical network in to multiple virtual ones. You can also have multiple VLANs that span multiple physical network devices.
This functionality isn't usually included on ISP provided home routers/gateways, so if that's where you were looking to do this you'd need a device that supports it or something you can flash a custom firmware, such as DD-WRT, to.
Okay, I will look into that but if my current router does not support vlans will my initial idea work of the 2 pcs on 192.168.1.x 255.255.255.0 with a gw of 192.168.1.1 and the kvm being 192.168.0.x 255.255.0.0 gw 192.168.1.1 work, so the pcs will not see the kvm at all on the network this way, or could they still see it just not connect to it? Would this work out okay without any network issues?
Do you mean virtual machine (VM) using the KVM hypervisor?
If so, it sounds like you using bridged networking for the VMs. Bridged Networking is what will make the VM appear on the network like any other machine, NAT'ing won't.
If your only requirement is that you don't want physical devices on your network to be able to discovery/see VMs then you could use NAT networking (I think this briefly describes it: http://wiki.libvirt.org/page/Network...networks.22.29).
If you're using bridged networking because you have something on the VM you want physical devices on your network to use, you could use port forwarding.
I'm not entirely sure if your network subnetting idea would work or not to be honest.
Do you mean virtual machine (VM) using the KVM hypervisor?
If so, it sounds like you using bridged networking for the VMs. Bridged Networking is what will make the VM appear on the network like any other machine, NAT'ing won't.
If your only requirement is that you don't want physical devices on your network to be able to discovery/see VMs then you could use NAT networking (I think this briefly describes it: http://wiki.libvirt.org/page/Network...networks.22.29).
If you're using bridged networking because you have something on the VM you want physical devices on your network to use, you could use port forwarding.
I'm not entirely sure if your network subnetting idea would work or not to be honest.
No, not running any virtual machines. By a remote ip based kvm switch.. this.. I am using one of these. (linked below) its an actual kvm switch with the ability for users to remote in over ip to take over a pc (the pcs will be directly connected to the kvm switch, usb mouse/kb, dvi cable to video card etc.. so its like you are sitting in front of the pc. I just don't want the pcs to see the kvm switch on the network.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.