<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Networking &#8211; KrazyWorks</title>
	<atom:link href="https://www.krazyworks.com/category/sysadmin/networking/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.krazyworks.com</link>
	<description>Networking, Systems Design, and Disaster Recovery</description>
	<lastBuildDate>Tue, 18 Jul 2023 15:10:14 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.7.9</generator>
<site xmlns="com-wordpress:feed-additions:1">3542461</site>	<item>
		<title>NFS I/O Stats with Logging</title>
		<link>https://www.krazyworks.com/nfs-i-o-stats-with-logging/</link>
					<comments>https://www.krazyworks.com/nfs-i-o-stats-with-logging/#respond</comments>
		
		<dc:creator><![CDATA[Igor]]></dc:creator>
		<pubDate>Mon, 03 Jan 2022 18:43:42 +0000</pubDate>
				<category><![CDATA[Commands & Shells]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Performance]]></category>
		<guid isPermaLink="false">https://www.krazyworks.com/?p=151977</guid>

					<description><![CDATA[The nfsiostat is an excellent tool for analyzing NFS performance. The only major problem with this utility is that it&#8217;s designed to be used interactively. It does not have logging or timestamping capabilities. I needed ...]]></description>
		
					<wfw:commentRss>https://www.krazyworks.com/nfs-i-o-stats-with-logging/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">151977</post-id>	</item>
		<item>
		<title>Inventorying NFS Mounts and Mount Options</title>
		<link>https://www.krazyworks.com/inventorying-nfs-mounts-and-mount-options/</link>
					<comments>https://www.krazyworks.com/inventorying-nfs-mounts-and-mount-options/#respond</comments>
		
		<dc:creator><![CDATA[Igor]]></dc:creator>
		<pubDate>Sun, 26 Dec 2021 18:41:49 +0000</pubDate>
				<category><![CDATA[Commands & Shells]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Filesystems]]></category>
		<category><![CDATA[Networking]]></category>
		<guid isPermaLink="false">https://www.krazyworks.com/?p=151974</guid>

					<description><![CDATA[As time goes by, NFS mounts multiply like rabbits. Added by many different people over the years, these entries present a dizzying variety of mount options &#8211; most are a copy-paste job that makes little ...]]></description>
		
					<wfw:commentRss>https://www.krazyworks.com/inventorying-nfs-mounts-and-mount-options/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">151974</post-id>	</item>
		<item>
		<title>Generating IP Whitelists</title>
		<link>https://www.krazyworks.com/generating-ip-whitelists/</link>
					<comments>https://www.krazyworks.com/generating-ip-whitelists/#respond</comments>
		
		<dc:creator><![CDATA[Igor]]></dc:creator>
		<pubDate>Thu, 07 Oct 2021 15:44:49 +0000</pubDate>
				<category><![CDATA[Commands & Shells]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.krazyworks.com/?p=151912</guid>

					<description><![CDATA[I have several scripts that scan various log files for signs of suspicious activity and block the offending IPs on my Web servers &#8211; pretty standard stuff. The trick, of course, is not to block ...]]></description>
		
					<wfw:commentRss>https://www.krazyworks.com/generating-ip-whitelists/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">151912</post-id>	</item>
		<item>
		<title>Validating HTTPS Cache Peers for Squid</title>
		<link>https://www.krazyworks.com/validating-https-cache-peers-for-squid/</link>
					<comments>https://www.krazyworks.com/validating-https-cache-peers-for-squid/#respond</comments>
		
		<dc:creator><![CDATA[Igor]]></dc:creator>
		<pubDate>Mon, 06 Jan 2020 05:38:43 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Squid]]></category>
		<guid isPermaLink="false">https://www.krazyworks.com/?p=151720</guid>

					<description><![CDATA[I have a squid proxy server that uses a long list of authenticated cache peers in a round-robin configuration. The process looks something like this:


The key to getting this setup working well is to weed ...]]></description>
		
					<wfw:commentRss>https://www.krazyworks.com/validating-https-cache-peers-for-squid/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">151720</post-id>	</item>
		<item>
		<title>Verifying SNMP Connectivity on Multiple Hosts</title>
		<link>https://www.krazyworks.com/verifying-snmp-connectivity-on-multiple-hosts/</link>
					<comments>https://www.krazyworks.com/verifying-snmp-connectivity-on-multiple-hosts/#respond</comments>
		
		<dc:creator><![CDATA[Igor]]></dc:creator>
		<pubDate>Fri, 20 Dec 2019 02:50:25 +0000</pubDate>
				<category><![CDATA[Commands & Shells]]></category>
		<category><![CDATA[Monitoring]]></category>
		<category><![CDATA[Networking]]></category>
		<guid isPermaLink="false">https://www.krazyworks.com/?p=151699</guid>

					<description><![CDATA[I needed to check if SNMP was accessible on whatever live servers that existed in a particular subnet. Here&#8217;s a quick script to do this.

You will need to specify subnet information and the SNMP community ...]]></description>
		
					<wfw:commentRss>https://www.krazyworks.com/verifying-snmp-connectivity-on-multiple-hosts/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">151699</post-id>	</item>
		<item>
		<title>Bulk-Adding IPTables Rules</title>
		<link>https://www.krazyworks.com/bulk-adding-iptables-rules/</link>
					<comments>https://www.krazyworks.com/bulk-adding-iptables-rules/#respond</comments>
		
		<dc:creator><![CDATA[Igor]]></dc:creator>
		<pubDate>Fri, 13 Dec 2019 02:46:30 +0000</pubDate>
				<category><![CDATA[Commands & Shells]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.krazyworks.com/?p=151693</guid>

					<description><![CDATA[I&#8217;ve been using my mod of this handy script to block countries with iptables. One issue with the script is that it is adding rules one-by-one using the iptables -A syntax. This is the proper ...]]></description>
		
					<wfw:commentRss>https://www.krazyworks.com/bulk-adding-iptables-rules/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">151693</post-id>	</item>
		<item>
		<title>Automatically Block Frequent Visitors</title>
		<link>https://www.krazyworks.com/automatically-block-frequent-visitors/</link>
					<comments>https://www.krazyworks.com/automatically-block-frequent-visitors/#respond</comments>
		
		<dc:creator><![CDATA[Igor]]></dc:creator>
		<pubDate>Tue, 10 Dec 2019 02:45:35 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Networking]]></category>
		<guid isPermaLink="false">https://www.krazyworks.com/?p=151690</guid>

					<description><![CDATA[I had a few similar scripts floating around this site, but this one is a bit more all-inclusive and better organized. The script will analyze your firewall/whatever access log and block particularly active visitors.

I added ...]]></description>
		
					<wfw:commentRss>https://www.krazyworks.com/automatically-block-frequent-visitors/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">151690</post-id>	</item>
		<item>
		<title>Working with iptables Logging</title>
		<link>https://www.krazyworks.com/working-with-iptables-logging/</link>
					<comments>https://www.krazyworks.com/working-with-iptables-logging/#respond</comments>
		
		<dc:creator><![CDATA[Igor]]></dc:creator>
		<pubDate>Sun, 01 Dec 2019 02:41:50 +0000</pubDate>
				<category><![CDATA[Commands & Shells]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.krazyworks.com/?p=151681</guid>

					<description><![CDATA[Most commonly iptables is used to allow, block, or redirect connections. However, it also has a logging feature that can be very useful for network traffic analysis and system security.

In the example below I will ...]]></description>
		
					<wfw:commentRss>https://www.krazyworks.com/working-with-iptables-logging/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">151681</post-id>	</item>
		<item>
		<title>Analyzing Network Performance</title>
		<link>https://www.krazyworks.com/analyzing-network-performance/</link>
					<comments>https://www.krazyworks.com/analyzing-network-performance/#respond</comments>
		
		<dc:creator><![CDATA[Igor]]></dc:creator>
		<pubDate>Tue, 26 Nov 2019 02:37:21 +0000</pubDate>
				<category><![CDATA[Commands & Shells]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Performance]]></category>
		<guid isPermaLink="false">https://www.krazyworks.com/?p=151672</guid>

					<description><![CDATA[Much of network performance analysis will be comparative in nature. Thus, seeing the output of multiple commands side by side can be quite useful. Bash has a useful little utility called pr and we&#8217;ll make ...]]></description>
		
					<wfw:commentRss>https://www.krazyworks.com/analyzing-network-performance/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">151672</post-id>	</item>
		<item>
		<title>Adding and Removing sshd instances on CentOS 7</title>
		<link>https://www.krazyworks.com/adding-and-removing-sshd-instances-on-centos-7/</link>
					<comments>https://www.krazyworks.com/adding-and-removing-sshd-instances-on-centos-7/#respond</comments>
		
		<dc:creator><![CDATA[Igor]]></dc:creator>
		<pubDate>Thu, 20 Jun 2019 15:09:40 +0000</pubDate>
				<category><![CDATA[Commands & Shells]]></category>
		<category><![CDATA[Networking]]></category>
		<guid isPermaLink="false">https://www.krazyworks.com/?p=151605</guid>

					<description><![CDATA[As a follow-up to my previous post about adding sshd instances on CentOS 5 &#38; 6, here&#8217;s a script that does the same on RHEL/CentOS 7.

The script still checks for iptables and if it is ...]]></description>
		
					<wfw:commentRss>https://www.krazyworks.com/adding-and-removing-sshd-instances-on-centos-7/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">151605</post-id>	</item>
		<item>
		<title>Adding and Removing sshd instances on CentOS 6</title>
		<link>https://www.krazyworks.com/adding-and-removing-sshd-instances-on-centos-6/</link>
					<comments>https://www.krazyworks.com/adding-and-removing-sshd-instances-on-centos-6/#respond</comments>
		
		<dc:creator><![CDATA[Igor]]></dc:creator>
		<pubDate>Sun, 21 Apr 2019 00:24:29 +0000</pubDate>
				<category><![CDATA[Commands & Shells]]></category>
		<category><![CDATA[Networking]]></category>
		<guid isPermaLink="false">https://www.krazyworks.com/?p=151586</guid>

					<description><![CDATA[This is a process and a couple of script to allow you to setup an additional sshd service on an alternate port.

The two scripts below are for CentOS/RHEL 6, but they can be easily adapted ...]]></description>
		
					<wfw:commentRss>https://www.krazyworks.com/adding-and-removing-sshd-instances-on-centos-6/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">151586</post-id>	</item>
		<item>
		<title>Measure DNS Server Performance</title>
		<link>https://www.krazyworks.com/measure-dns-server-performance/</link>
					<comments>https://www.krazyworks.com/measure-dns-server-performance/#respond</comments>
		
		<dc:creator><![CDATA[Igor]]></dc:creator>
		<pubDate>Mon, 25 Mar 2019 20:04:35 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Performance]]></category>
		<guid isPermaLink="false">https://www.krazyworks.com/?p=151556</guid>

					<description><![CDATA[This is not an entirely proper way to benchmark a DNS server, but, in a pinch, it should give you some idea of its responsiveness and stability.

The commands below require dig (provided by the bind-utils ...]]></description>
		
					<wfw:commentRss>https://www.krazyworks.com/measure-dns-server-performance/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">151556</post-id>	</item>
		<item>
		<title>Inventory Network Services with Nmap</title>
		<link>https://www.krazyworks.com/inventory-network-services-with-nmap/</link>
					<comments>https://www.krazyworks.com/inventory-network-services-with-nmap/#respond</comments>
		
		<dc:creator><![CDATA[Igor]]></dc:creator>
		<pubDate>Mon, 14 Jan 2019 21:32:06 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Networking]]></category>
		<guid isPermaLink="false">https://www.krazyworks.com/?p=151499</guid>

					<description><![CDATA[With the growing number of network-enabled devices in your home, meaningful security becomes elusive. The first step to addressing the situation is knowing what you have. A few examples below use the <code>nmap</code> utility to scan your local network and detect active devices and services.
]]></description>
		
					<wfw:commentRss>https://www.krazyworks.com/inventory-network-services-with-nmap/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">151499</post-id>	</item>
		<item>
		<title>Verify Network Port Access</title>
		<link>https://www.krazyworks.com/verify-network-port-access-2/</link>
					<comments>https://www.krazyworks.com/verify-network-port-access-2/#respond</comments>
		
		<dc:creator><![CDATA[Igor]]></dc:creator>
		<pubDate>Wed, 08 Aug 2018 20:15:54 +0000</pubDate>
				<category><![CDATA[Commands & Shells]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Networking]]></category>
		<guid isPermaLink="false">https://www.krazyworks.com/?p=151444</guid>

					<description><![CDATA[There are several tools you can use to verify access to a remote network port: nc, tcping, telnet. Unfortunately, nc&#160;from the netcat&#160;package has been replaced by the one from nmap, which lacks the -z&#160;option, making ...]]></description>
		
					<wfw:commentRss>https://www.krazyworks.com/verify-network-port-access-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">151444</post-id>	</item>
		<item>
		<title>Detect SSL Certificate Injection</title>
		<link>https://www.krazyworks.com/detect-ssl-certificate-injection/</link>
					<comments>https://www.krazyworks.com/detect-ssl-certificate-injection/#respond</comments>
		
		<dc:creator><![CDATA[Igor]]></dc:creator>
		<pubDate>Wed, 21 Feb 2018 20:05:30 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.krazyworks.com/?p=151294</guid>

					<description><![CDATA[When the SSL Digital Certificate is intercepted and replaced by a device between your browser and the Web site, we call it certificate injection. This method is more commonly used not by hackers, but by ...]]></description>
		
					<wfw:commentRss>https://www.krazyworks.com/detect-ssl-certificate-injection/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">151294</post-id>	</item>
		<item>
		<title>Extracting Email Addresses from TCP Streams</title>
		<link>https://www.krazyworks.com/extracting-email-addresses-from-tcp-streams/</link>
					<comments>https://www.krazyworks.com/extracting-email-addresses-from-tcp-streams/#respond</comments>
		
		<dc:creator><![CDATA[Igor]]></dc:creator>
		<pubDate>Wed, 06 Dec 2017 00:06:47 +0000</pubDate>
				<category><![CDATA[Commands & Shells]]></category>
		<category><![CDATA[Email]]></category>
		<guid isPermaLink="false">http://www.krazyworks.com/?p=148380</guid>

					<description><![CDATA[Here&#8217;s a quick example of using tshark to extract email addresses from TCP streams. Let&#8217;s say some application on your server is sending emails and you want to find out who is receiving those emails. ...]]></description>
		
					<wfw:commentRss>https://www.krazyworks.com/extracting-email-addresses-from-tcp-streams/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">148380</post-id>	</item>
		<item>
		<title>Occupy Subnet</title>
		<link>https://www.krazyworks.com/occupy-subnet/</link>
		
		<dc:creator><![CDATA[Igor]]></dc:creator>
		<pubDate>Fri, 01 Dec 2017 19:15:58 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Scripts]]></category>
		<guid isPermaLink="false">http://www.krazyworks.com/?p=148125</guid>

					<description><![CDATA[The script below (tested on RHEL 7) will use arp-scan&#160;to identify unused IPs on your subnet and configure virtual interfaces attached to your primary NIC to take over every available IP.&#160;

Additionally, the script can also ...]]></description>
		
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">148125</post-id>	</item>
		<item>
		<title>Using IPTables to Allow Access to Private Networks</title>
		<link>https://www.krazyworks.com/using-iptables-to-allow-access-to-all-local-networks/</link>
					<comments>https://www.krazyworks.com/using-iptables-to-allow-access-to-all-local-networks/#respond</comments>
		
		<dc:creator><![CDATA[Igor]]></dc:creator>
		<pubDate>Thu, 22 Jun 2017 13:46:27 +0000</pubDate>
				<category><![CDATA[Commands & Shells]]></category>
		<category><![CDATA[Networking]]></category>
		<guid isPermaLink="false">http://www.krazyworks.com/?p=135626</guid>

					<description><![CDATA[Below is a quick example of how to use iptables&#160;to allow port access for all types of private networks. In this case we&#8217;re allowing access to ports 10000&#160;and 20000, commonly used by webmin&#160;and usermin.
for i ...]]></description>
		
					<wfw:commentRss>https://www.krazyworks.com/using-iptables-to-allow-access-to-all-local-networks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">135626</post-id>	</item>
		<item>
		<title>Sun T-Series ILOM and Solaris 11 Network Configuration</title>
		<link>https://www.krazyworks.com/sun-t-series-ilom-and-solaris-11-network-configuration/</link>
					<comments>https://www.krazyworks.com/sun-t-series-ilom-and-solaris-11-network-configuration/#respond</comments>
		
		<dc:creator><![CDATA[Igor]]></dc:creator>
		<pubDate>Mon, 20 Feb 2017 16:16:30 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<guid isPermaLink="false">http://www.krazyworks.com/?p=124535</guid>

					<description><![CDATA[Just some quick notes on setting up Oracle Sun T-series server ILOM and network aggregation with LACP. I don&#8217;t get to do this very often, so every time it&#8217;s a struggle to remember, with much ...]]></description>
		
					<wfw:commentRss>https://www.krazyworks.com/sun-t-series-ilom-and-solaris-11-network-configuration/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">124535</post-id>	</item>
		<item>
		<title>Tracking Emails in Postfix Logs</title>
		<link>https://www.krazyworks.com/tracking-emails-in-postfix-logs/</link>
					<comments>https://www.krazyworks.com/tracking-emails-in-postfix-logs/#comments</comments>
		
		<dc:creator><![CDATA[Igor]]></dc:creator>
		<pubDate>Thu, 27 Oct 2016 22:02:39 +0000</pubDate>
				<category><![CDATA[Email]]></category>
		<guid isPermaLink="false">http://www.krazyworks.com/?p=111478</guid>

					<description><![CDATA[Depending on your Postfix configuration, the same email may cycle through the postfix queue several times, changing it&#8217;s queue ID and making it difficult to track. For example, if you have Amavis configured for spam and ...]]></description>
		
					<wfw:commentRss>https://www.krazyworks.com/tracking-emails-in-postfix-logs/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">111478</post-id>	</item>
		<item>
		<title>Socket Statistics ss Command</title>
		<link>https://www.krazyworks.com/socket-statistics-ss-command/</link>
					<comments>https://www.krazyworks.com/socket-statistics-ss-command/#respond</comments>
		
		<dc:creator><![CDATA[Igor]]></dc:creator>
		<pubDate>Tue, 12 Jul 2016 00:10:39 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<guid isPermaLink="false">http://www.krazyworks.com/?p=99048</guid>

					<description><![CDATA[This is a small collection of useful ss (written by Alexey Kuznetsov of the Russian Nuclear Research Institute) syntax examples that go beyond the basics covered by other sources. Here&#8217;s one I use often: it shows established connections to ...]]></description>
		
					<wfw:commentRss>https://www.krazyworks.com/socket-statistics-ss-command/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">99048</post-id>	</item>
		<item>
		<title>Fixing NIC Name in Cloned VMWare Linux Machines</title>
		<link>https://www.krazyworks.com/fixing-nic-name-in-cloned-vmware-linux-machines/</link>
					<comments>https://www.krazyworks.com/fixing-nic-name-in-cloned-vmware-linux-machines/#respond</comments>
		
		<dc:creator><![CDATA[Igor]]></dc:creator>
		<pubDate>Tue, 28 Jun 2016 16:32:30 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Virtualization]]></category>
		<guid isPermaLink="false">http://www.krazyworks.com/?p=97550</guid>

					<description><![CDATA[A suspected bug with certain versions of VMware ESX causes cloned Linux VMs to obtain a sequentially-number NIC. For example, if the parent VM had eth0, the clone will have eth1, and the clone of ...]]></description>
		
					<wfw:commentRss>https://www.krazyworks.com/fixing-nic-name-in-cloned-vmware-linux-machines/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">97550</post-id>	</item>
	</channel>
</rss>
