6.4. Recommended Practices for Configuring Host Networks