Refer to the following examples to confirm the network environment that is connected to the machine, and then perform the necessary operations for that environment.