Fedora 21 Networking Guide

Total Page:16

File Type:pdf, Size:1020Kb

Fedora 21 Networking Guide Fedora 21 Networking Guide Configuration and Administration of Networking for Fedora 21 Stephen Wadeley Networking Guide Draft Fedora 21 Networking Guide Configuration and Administration of Networking for Fedora 21 Edition 2 Author Stephen Wadeley [email protected] Copyright © 2015 Red Hat, Inc. and others. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. For guidelines on the permitted uses of the Fedora trademarks, refer to https://fedoraproject.org/wiki/ Legal:Trademark_guidelines. Linux® is the registered trademark of Linus Torvalds in the United States and other countries. Java® is a registered trademark of Oracle and/or its affiliates. XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries. All other trademarks are the property of their respective owners. The Networking Guide documents relevant information regarding the configuration and administration of network interfaces, networks and network services in Fedora 21. It is oriented towards system administrators with a basic understanding of Linux and networking. This book is based on the Deployment Guide from Red Hat Enterprise Linux 6. The chapters related to networking were taken from the Deployment Guide to form the foundation for this book. Draft Draft Preface vii 1. Target Audience ............................................................................................................ vii 2. About This Book ............................................................................................................ vii 3. How to Read this Book .................................................................................................. vii 4. Document Conventions ................................................................................................. viii 4.1. Typographic Conventions .................................................................................... viii 4.2. Pull-quote Conventions ......................................................................................... x 4.3. Notes and Warnings ............................................................................................. x 5. Feedback ....................................................................................................................... xi 6. Acknowledgments ........................................................................................................... xi I. Networking 1 1. Introduction to Fedora Networking 3 1.1. How this Book is Structured .................................................................................. 3 1.2. Introduction to NetworkManager ............................................................................ 3 1.3. Installing NetworkManager .................................................................................... 4 1.3.1. The NetworkManager Daemon ................................................................... 4 1.3.2. Interacting with NetworkManager ................................................................ 4 1.4. Network Configuration Using the Command Line Interface (CLI) .............................. 5 1.5. Network Configuration Using NetworkManager's CLI (nmcli) .................................... 5 1.6. NetworkManager and the Network Scripts ............................................................. 5 1.7. Network Configuration Using sysconfig Files .......................................................... 7 1.8. Additional Resources ............................................................................................ 8 1.8.1. Installed Documentation ............................................................................. 8 2. Configure Networking 9 2.1. Static and Dynamic Interface Settings ................................................................... 9 2.1.1. When to Use Static Network Interface Settings ............................................ 9 2.1.2. When to Use Dynamic Interface Settings .................................................... 9 2.1.3. Selecting Network Configuration Methods ................................................... 9 2.2. Using NetworkManager with the GNOME Graphical User Interface ........................ 10 2.2.1. Connecting to a Network Using a GUI ...................................................... 10 2.2.2. Configuring New and Editing Existing Connections ..................................... 10 2.2.3. Connecting to a Network Automatically ..................................................... 11 2.2.4. System-wide and Private Connection Profiles ............................................ 12 2.2.5. Configuring a Wired (Ethernet) Connection ................................................ 13 2.2.6. Configuring a Wi-Fi Connection ................................................................ 14 2.2.7. Establishing a VPN Connection ................................................................ 16 2.2.8. Establishing a Mobile Broadband Connection ............................................ 19 2.2.9. Establishing a DSL Connection ................................................................ 21 2.2.10. Configuring Connection Settings ............................................................. 23 2.3. Using the Command Line Interface (CLI) ............................................................. 30 2.3.1. Configuring a Network Interface Using ifcfg Files ....................................... 30 2.3.2. Configuring a Network Interface Using ip Commands ................................. 31 2.3.3. Static Routes and the Default Gateway ..................................................... 32 2.3.4. Configuring Static Routes in ifcfg files ....................................................... 33 2.3.5. Configuring IPv6 Tokenized Interface Identifiers ......................................... 35 2.4. Using the NetworkManager Command Line Tool, nmcli ......................................... 36 2.4.1. Understanding the nmcli Options .............................................................. 38 2.4.2. Connecting to a Network Using nmcli ........................................................ 39 2.4.3. Configuring Static Routes Using nmcli ....................................................... 44 2.5. Additional Resources .......................................................................................... 45 2.5.1. Installed Documentation ........................................................................... 45 iii Networking Guide Draft 2.5.2. Online Documentation .............................................................................. 45 3. Configure Host Names 47 3.1. Understanding Host Names ................................................................................ 47 3.1.1. Recommended Naming Practices ............................................................. 47 3.2. Configuring Host Names Using hostnamectl ......................................................... 47 3.2.1. View All the Host Names ......................................................................... 47 3.2.2. Set All the Host Names ........................................................................... 48 3.2.3. Set a Particular Host Name ...................................................................... 48 3.2.4. Clear a Particular Host Name ................................................................... 48 3.2.5. Changing Host Names Remotely .............................................................. 48 3.3. Configuring Host Names Using nmcli ................................................................... 48 3.4. Additional Resources .......................................................................................... 49 3.4.1. Installed Documentation ........................................................................... 49 3.4.2. Online Documentation .............................................................................. 49 4. Configure Network Bonding 51 4.1. Understanding the Default Behavior of Master and Slave Interfaces ....................... 51 4.2. Creating a Bond Connection Using a GUI ............................................................ 51 4.2.1. Establishing a Bond Connection ............................................................... 52 4.3. Using the Command Line Interface (CLI) ............................................................. 55 4.3.1. Check if Bonding Kernel Module is Installed .............................................. 55 4.3.2. Create a Channel Bonding Interface ......................................................... 55
Recommended publications
  • Web Layout and Content Guide Table of Contents
    Web Layout and Content Guide Table of Contents Working with Pages ...................................................................................... 3 Adding Media ................................................................................................ 5 Creating Page Intros...................................................................................... 7 Using Text Modules ...................................................................................... 9 Using Additional Modules ............................................................................19 Designing a Page Layout .............................................................................24 Web Layout and Content Guide 2 Working with Pages All University Communications-created sites use Wordpress as their content management system. Content is entered and pages are created through a web browser. A web address will be provided to you, allowing you to access the Wordpress Dashboard for your site with your Unity ID via the “Wrap Account” option. Web Layout and Content Guide 3 Existing and New Pages Site Navigation/Links In the Wordpress Dashboard the “Pages” section — accessible in the left-hand menu — allows you to view all the pages Once a new page has been published it can be added to the appropriate place in the site’s navigation structure under that have been created for your site, and select the one you want to edit. You can also add a new page via the left-hand “Appearance” > “Menus” in the left-hand menu. The new page should appear in the “Most Recent” list on the left. It menu, or the large button in the “All Pages” view or “Tree View.” Once you have created a new page and you are in the can then be selected and put into the navigation by clicking the “Add to Menu” button. The page will be added to the “Edit Page” view, be sure to give the page a proper Title. bottom of the “Menu Structure” by default.
    [Show full text]
  • Glossary of Design Terms
    GLOSSARY OF TERMS Typography - The artistic arrangement of type in a readable and visually appealing way. Typography usually concerns the design and use of various typefaces in a way that helps to better visually communicate ideas. Vector images - Vector-based images (such as those created in Adobe Illustrator) are made up of points, each of which has a defined X and Y coordinate. These points join paths to form shapes, and inside these shapes you can add color fills. Because everything is generated based around this, vectors can be resized to any size without any loss of quality. Adobe Illustrator is a vector-based program. Raster images - (sometimes referred to as bitmap images) are made up of thousands of pixels which determine the color and form of the image. Photos are raster images. Because raster images are made up of a finite amount of pixels, resizing can be tricky. If you make a raster image larger dimensions in Photoshop, the software has to make up data in order to add the size. This results in loss of quality. Adobe Photoshop is a raster-based program. Body Copy - The main part of text in your design or publication – the written website content, the book contents, even this type you’re reading right now, it’s all body copy. Display Type - Type that is designed with the objective of attracting attention. Think of movie titles on posters, article titles in magazines, newspaper headlines, etc. Hierarchy - The visual arrangement of design elements in a way that signifies importance. For example, you might make a title big and bold to ensure it attracts more attention than a small, lightly colored image caption.
    [Show full text]
  • PCI-X & PCI Core User's Guide
    PCI-X & PCI Core User's Guide Version 7.1.0 27-Feb-2007 © PLD Applications, 1996-2007 PLD Applications Web: http://www.plda.com Europarc Pichaury A2 Email: [email protected] 1330, rue Guillibert USA : 1 866 513 0362 (toll free) 13856 Aix-en-Provence Intl : + 33 442 393 600 CEDEX 3 - France Fax : + 33 442 394 902 Associate Member PCI-X & PCI Core User's Guide Features General ° 32-bit/64-bit PCI-X & PCI master/target interface ° Supports bus speed up to 133 MHz ° Multi-function core can implement up to 2 independent functions ° Full support for 64-bit addressing ° PCI-X Specification 2.0a mode 1 compliant ° PCI Specification 3.0 compliant ° Supports PCI power management ° Built-in support for in-site programming through JTAG interface ° Supports Message Signalled Interrupts Customization ° Easy customization with the PCI Wizard's user interface and on-line help. ° PCI Wizard has built-in support for VHDL and Verilog. ° All features can be parameterized, removing all unused logic ° Full plug-and-play support Configuration ° Supports all required and optional type 0 configuration registers ° Up to 6 BARs plus expansion ROM can be implemented ° Up to 32 user defined configuration registers Data transfer ° Supports up to 4KB burst transfers with zero wait-state insertion. ° Supports all memory and I/O commands ° Supports interrupt acknowledge cycles in target mode ° Can insert wait-states and generate all types of terminations ° Up to two split channels and 32 outstanding split transactions DMA ° Up to 4 independent DMA channels with rotating priority ° Flexible backend interface can directly control FIFO devices.
    [Show full text]
  • Volume 12: PCIE Configuration Registers (Haswell)
    © 2013 Intel Corporation Intel Open Source Graphics Programmer’s Reference Manual (PRM) for the 2013 Intel® Core™ Processor Family, including Intel HD Graphics, Intel Iris™ Graphics and Intel Iris Pro Graphics Volume 12: PCIE Configuration Registers (Haswell) 12/18/2013 1 Copyright INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL® PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. A "Mission Critical Application" is any application in which failure of the Intel Product could result, directly or indirectly, in personal injury or death. SHOULD YOU PURCHASE OR USE INTEL'S PRODUCTS FOR ANY SUCH MISSION CRITICAL APPLICATION, YOU SHALL INDEMNIFY AND HOLD INTEL AND ITS SUBSIDIARIES, SUBCONTRACTORS AND AFFILIATES, AND THE DIRECTORS, OFFICERS, AND EMPLOYEES OF EACH, HARMLESS AGAINST ALL CLAIMS COSTS, DAMAGES, AND EXPENSES AND REASONABLE ATTORNEYS' FEES ARISING OUT OF, DIRECTLY OR INDIRECTLY, ANY CLAIM OF PRODUCT LIABILITY, PERSONAL INJURY, OR DEATH ARISING IN ANY WAY OUT OF SUCH MISSION CRITICAL APPLICATION, WHETHER OR NOT INTEL OR ITS SUBCONTRACTOR WAS NEGLIGENT IN THE DESIGN, MANUFACTURE, OR WARNING OF THE INTEL PRODUCT OR ANY OF ITS PARTS. Intel may make changes to specifications and product descriptions at any time, without notice.
    [Show full text]
  • National Immunisation Programme Brand Guidelines
    National Immunisation Programme Brand Guidelines National Immunisation Programme Brand Guidelines National Immunisation Programme Brand Guidelines Welcome These brand guidelines are designed to help you work with the Immunise brand in a consistent way across all types of communications and marketing material. It is essential to follow these guidelines as they protect the integrity and equity of the brand, as well as ensuring brand and message recognition by our audiences. If there are any applications of the identity or the brand’s graphic elements that you require assistance with and which are not included in these guidelines, or if you have any questions regarding the application or use of the brand and its elements, please contact the Health Promotion Agency, phone 04 917 0060 or email: Daemon Coyle Senior Account Lead Health Promotion Agency [email protected] Last updated July 2014 National Immunisation Programme Brand Guidelines Contents Our logo 1.0 Introducing our logo 1.1 Logo versions – positive 1.2 Logo versions – inversed 1.3 Logo variations by audience 1.4 Clear space and minimum sizes 1.5 Incorrect usage 1.6 Colour 2.0 The colour system 2.1 The colour system – allocation 2.2 Typography 3.0 Font family – primary 3.1 Type styles 3.2 Font family – secondary 3.3 Supporting graphics 4.0 Circular motifs 4.1 Divider / container graphics 4.2 Imagery 5.0 Poster 5.1 A5 brochure 5.2 Examples 6.0 Schedule wall chart 6.1 Poster 6.2 A5 pamphlet front cover 6.3 A5 pamphlet back cover 6.4 DL leaflet front cover 6.5 DL leaflet back cover 6.6 Text pages 6.7 Misc.
    [Show full text]
  • Creating a Pci Express Interconnect in the Gem5 Simulator
    CREATING A PCI EXPRESS INTERCONNECT IN THE GEM5 SIMULATOR BY KRISHNA PARASURAM SRINIVASAN THESIS Submitted in partial fulfillment of the requirements for the degree of Master of Science in Electrical and Computer Engineering in the Graduate College of the University of Illinois at Urbana-Champaign, 2018 Urbana, Illinois Adviser: Associate Professor Nam Sung Kim ABSTRACT In this thesis, the objective was to implement a PCI (Peripheral Component Interconnect) Express interconnect in the gem5 architecture simulator. The interconnect was designed with the goal of aiding accurate modeling of PCI Express-based devices in gem5 in the future. The PCI Express interconnect that was created consisted of a root complex, PCI Express switch, as well as individual PCI Express links. Each of these created components can work independently, and can be easily integrated into the existing gem5 platforms for the ARM Instruction Set Architecture. The created PCI Express interconnect was evaluated against a real PCI Express interconnect present on an Intel Xeon server platform. The bandwidth offered by both interconnects was compared by reading data from storage devices using the Linux utility “dd”. The results indicate that the gem5 PCI Express interconnect can provide between 81% - 91.6% of the bandwidth of the real PCI Express interconnect. However, architectural differences between the gem5 and Intel Xeon platforms used, as well as unimplemented features of the PCI Express protocol in the gem5 PCI Express interconnect, necessitate more strenuous validation
    [Show full text]
  • What This Code Does Page/Text Formatting
    /* What this code does Page/text formatting - applies optimal length for desktop (approx. 70 characters) - applies optimal length for mobile (approx. 40 characters) Header Formatting - applies proportionate sizing for all headers across mobile devices Pullquote Formatting - applies responsive pullquote formatting Image Formatting - applies responsive image formatting How to implement the code (See CM Business Writing Blog) .page .image-left (left aligned image) .image-right (right aligned image) .pquote-left (left aligned pullquote) .pquote-right (right aligned pullquote) */ /* Page Formatting (line height, mobile responsive width, proportionate font sizing) */ html { font-size: 1em; } body { font-size: 100%; } body, h1, h2, h3, h4, h5, h6 { font-size-adjust: 0.5; } p { margin-bottom: 1.5em; } /* By changing margin-bottom of paragraphs (<p> elements), you change spacing after the paragraph */ .post { font-size: 1em; line-height: 1.5em; font-family: Helvetica; max-width: 40em; margin: auto; } /* By changing max-width of .post you change the maximum width (length) of each line of text. This helps avoid overly long lines. You can also change the alignment of the entire post by changing margin */ @media screen and (min-width: 43.75em) { .post { font-size: 1em; line-height: 1.5em; } } /* Heading Format (proportionate headers across mobile devices) */ /* Level 1 Headings*/ .post h1 { font-size: 2em; line-height: 1.25; } @media screen and (min-width: 43.75em) { h1 { font-size: 2.5em; line-height: 1.125; } } @media screen and (min-width: 56.25em)
    [Show full text]
  • Ag Brand Manual
    Ag Brand Manual 1 Ag Visual Identity A guideline for creative talent. “Too much flexibility results in complete chaos, too much structure results in lifeless communications. Balance is the Design Continuity goal.” These guidelines are not intended to provide every All permissions are denied unless detail regarding graphics expressly granted. applications, production processes and standards, but to Guideline Purpose provide general direction for Promote the Ag visual identity in maintaining consistency with the most convenient, consistent the Ag identity. and efficient way and make sure no mistakes are made. ©2011 DECAGON PRINTED IN USA v1.0 2 Heirarchy & Emphasis Typography and colors are palettes. They have a limited number of choices in a given range. They have shades or weight. Type on a page appears as a gray block to the eye. Weight is a degree of boldness or shade. Weight helps the viewer determine what is most important. It creates interest and attractive design. Varying type weights give the illusion of depth to a page. Darker type moves forwards and lighter type receeds. This helps emphasize what elements should be viewed and in what order. These direct the eye of the observer or reader. This is presentation strategy. If everything is emphasied equally, it creates visual noise. “Emphasizing everything equals emphasizing nothing.” —marketing adage. 3 Logo Application The Decagon logo is described as No scanning logo artwork! a stack logo. Word parts of the logotype are not all on the same Logo Placement line. The logo should appear only once on each printed spread (not each The logo sides are sloped (italic).
    [Show full text]
  • DTP Design Features
    DTP Design Features 1.03 Demonstrate desktop publishing. Special Features of Publications • Art • Jumpline • Balloon • Pull Quote • Bleed • Rules • Caption • Sidebar • Dropped Cap • Text Box • Running • Watermark Headlines/Footers • End mark • Reverse text Art • Illustrations and photographs used to convey meaning and add appeal Balloon • A circle or bubble enclosing copy in an illustration • Often used in cartoons ??? Bleed • A print effect in which a color, object or image appears to run off the edge of a page. Caption • Brief descriptive text accompanying an image or chart. • Can be in the form of a textbox or balloon. Dropped Cap • An enlarged character at the beginning of a paragraph • Drops below the line of text • Grabs the reader’s attention Running Headlines/Footers • Running text at the top and/or bottom of a document. • Also called headers. • Used for organization, page numbers, date, author, running title, etc. Jumpline • Line which tells readers which page to refer to for the continuation of an article. Continued on B3 Pull Quote • Placement • Quotation taken − Between columns directly from with word wrap the body of the − Alone in a column article. surrounded by • Used to draw white space attention. − Right justified in the last column • Often made − Beneath the larger than headline as a body text. deck Rules • Horizontal or vertical lines that can be applied to paragraphs, text boxes, and objects in a publication. Sidebar • Square box filled with information related to the main story or to a completely separate article. Text Box • Container for text that can be placed and formatted independently of other text.
    [Show full text]
  • Intel® E7230 Chipset Memory Controller Hub (MCH)
    Intel® E7230 Chipset Memory Controller Hub (MCH) Datasheet July 2005 Reference Number: 308333-001 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL® PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. Intel products are not intended for use in medical, life saving, or life sustaining applications. Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence or characteristics of any features or instructions marked “reserved” or “undefined.” Intel reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. The Intel® E7230 MCH may contain design defects or errors known as errata, which may cause the product to deviate from published specifications. Current characterized errata are available on request. Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order. Intel, Pentium, and the Intel logo are trademarks or registered
    [Show full text]
  • Linux Pci Documentation
    Linux Pci Documentation The kernel development community Jul 14, 2020 CONTENTS i ii CHAPTER ONE HOW TO WRITE LINUX PCI DRIVERS Authors • Martin Mares <[email protected]> • Grant Grundler <[email protected]> The world of PCI is vast and full of (mostly unpleasant) surprises. Since each CPU architecture implements different chip-sets and PCI devices have different requirements (erm, “features”), the result is the PCI support in the Linux kernel is not as trivial as one would wish. This short paper tries to introduce all potential driver authors to Linux APIs for PCI device drivers. A more complete resource is the third edition of“Linux Device Drivers”by Jonathan Corbet, Alessandro Rubini, and Greg Kroah-Hartman. LDD3 is available for free (under Creative Commons License) from: http://lwn.net/Kernel/LDD3/. However, keep in mind that all documents are subject to “bit rot”. Refer to the source code if things are not working as described here. Please send questions/comments/patches about Linux PCI API to the “Linux PCI” <[email protected]> mailing list. 1.1 Structure of PCI drivers PCI drivers “discover”PCI devices in a system via pci_register_driver(). Actually, it’s the other way around. When the PCI generic code discovers a new device, the driver with a matching “description”will be notified. Details on this below. pci_register_driver() leaves most of the probing for devices to the PCI layer and supports online insertion/removal of devices [thus supporting hot-pluggable PCI, CardBus, and Express-Card in a single driver]. pci_register_driver() call requires passing in a table of function pointers and thus dictates the high level structure of a driver.
    [Show full text]
  • Realtek Gigabit Ethernet Media Access Controller with Power Management Rtl8169 1
    RTL8169 REALTEK GIGABIT ETHERNET MEDIA ACCESS CONTROLLER WITH POWER MANAGEMENT RTL8169 1. Features........................................................................ 2 8.2.1 Target Read................................................... 37 2. General Description.................................................... 3 8.2.2 Target Write.................................................. 38 3. Block Diagram............................................................. 4 8.2.3 Master Read.................................................. 38 4. Pin Assignments .......................................................... 5 8.2.4 Master Write................................................. 39 5. Pin Description............................................................ 6 8.2.5 Configuration Access ................................... 40 5.1 Power Management/Isolation Interface ................. 6 8.3 Packet Buffering .................................................. 40 5.2 PCI Interface .......................................................... 7 8.3.1 Transmit Buffer Manager ............................. 40 5.3 FLASH/BootPROM/EEPROM/MII Interface ....... 9 8.3.2 Receive Buffer Manager............................... 40 5.4 LED Interface....................................................... 10 8.3.3 Packet Recognition....................................... 40 5.5 GMII, TBI, PHY CP ............................................ 10 8.4 PCI Configuration Space Table............................ 41 5.6 Clock and NC Pins..............................................
    [Show full text]