Solved

Linux and Token Ring

Posted on 1997-06-10
2
258 Views
Last Modified: 2010-03-17
I made my linux kernel by compiling the source code. When I
was configuring make, I was asked if I do have Token Ring
and I have answered Yes (so I hope ibmtr.o is linked in my
kernel) but when I run ifconfig to configure my network, the
answer is 'No such device' and Network unreachable ( route program answer). How to make it working?
0
Comment
Question by:pacho
2 Comments
 
LVL 1

Expert Comment

by:grovedc
ID: 1584828
Are you connected to a TR.  Most cards do not initialize
if not connected.
0
 
LVL 2

Accepted Solution

by:
czamudio earned 100 total points
ID: 1584829
Which distribution do you have?, well anyway

cd to /etc/rc.d
edit the rc.inet1

change the device eth0 in the ifconfig command to tr0

and this may be useful to you.

feel free to contact me using email.

czamudio@arzac.com
0

Featured Post

Master Your Team's Linux and Cloud Stack

Come see why top tech companies like Mailchimp and Media Temple use Linux Academy to build their employee training programs.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
linux / python expert needed 3 98
how to configure multiple subnet in linux ddns server 2 88
linux, squid, exchange 14 175
Linux : how to point the OS to use the new DNS server 11 104
I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
This video shows how to quickly and easily add an email signature for all users on Exchange 2016. The resulting signature is applied on a server level by Exchange Online. The email signature template has been downloaded from: www.mail-signatures…

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question