Solved

Slackware IP Forwarding

Posted on 1997-07-05
2
503 Views
Last Modified: 2013-12-15
Hi.  I'm running Slackware 2.0 on a 386DX40, installed from the Infomagic Sept 96 CD set.  An application (TNOS) I run says I need to have IP Forwarding enabled in the kernel in order for it to talk to Linux. Since I haven't been able to make it work, I'm wondering if this is the problem.   My question is, how can I tell if IP Forwarding is in the kernel?  Also, how can I determine what kernel I have now?  If I have to upgrade the kernel, it means I need to install compilers and download the source code, which I can do but don't have enough free disk space.
Thanks for your help.
-Mark
0
Comment
Question by:dexter
2 Comments
 
LVL 3

Accepted Solution

by:
handrich earned 50 total points
ID: 1628534
Hi Dexter

your first quedtion adresses ip forwarding. To find out if it is enabled you should also have the /proc filesystem compiled. many precomliled kernels have /proc filesystem enabled so you will find the file /proc/ksyms (it is no real file). If you don't find this file /proc was not enabled and this answer will not help.

So if the file is there you can find out if ip forward is enabled with the following command: cat /proc/ksyms | grep ip_forward

if you get back something like this

08154711 ip_forward

you have ip_forward aktivated.

your linux version is usualy displayed while booting, with the shift pg_up key you can scroll trough the bootmessages.

Precompiled kernels can be found at:
ftp://wcarchive.cdrom.com/pub/linux/slackware/bootdsks.144
ftp://ftp.delix.de/pub/Linux/Kernels
maybe you will find a kernel that meets your requirements

maybe have a look at http://www.linux.org

bye Michael
0
 

Author Comment

by:dexter
ID: 1628535
Thanks.  I will check it out.  It should tell me what I need to know.  
-Mark
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Introduction We as admins face situation where we need to redirect websites to another. This may be required as a part of an upgrade keeping the old URL but website should be served from new URL. This document would brief you on different ways ca…
Fine Tune your automatic Updates for Ubuntu / Debian
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now