Solved

setsockopt: Protocol not available - what's that?

Posted on 1997-10-31
3
648 Views
Last Modified: 2013-12-15
I am settint up a firewall with IP masquerading. I have followed the HOWTO and compiled the kernel with all the required options. When I follow the HOWTO, I get to a point, where I am supposed to issue the following command:

ipfwadm -F -p deny

At this point I get the following error message:

ipfwadm: setsockopt failed: Protocol not available.

What does it mean and how do I fix it?

Michael Bode
0
Comment
Question by:mbode
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 2

Expert Comment

by:df020797
ID: 1630342
I ran into this problem myself.
I recompiled the kernel checking so that I answered all questions right. I use make zlilo to compile and install the kernel into lilo right away. After this I booted and booted once again :)
Now on /proc/net a few more files showed up :)
They were missing before :) (ip_forward among them aothe rimportant for IP fw:ing). Dont forget to install ipfwadm program and its header files before you compile the kernel.

Good luck!
0
 

Author Comment

by:mbode
ID: 1630343
Recompiling is the first thing that comes to mind, and I have done it over and over again.
0
 
LVL 4

Accepted Solution

by:
unicorntech earned 80 total points
ID: 1630344
Well I feel that what is wrong is the ip networking. The error message you are getting may mean that ipfwadm is notinstalled correctly. Are there files like ip_acct in /proc/net?

Try typing ipfwadm -A -i and then seeing if this file is in /proc/net...

If it si not then the ipfwadm you have is not installed correctly and I would consider reinstalling it. Let me know how it goes,

Jason
0

Featured Post

Secure Your WordPress Site: 5 Essential Approaches

WordPress is the web's most popular CMS, but its dominance also makes it a target for attackers. Our eBook will show you how to:

Prevent costly exploits of core and plugin vulnerabilities
Repel automated attacks
Lock down your dashboard, secure your code, and protect your users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Over the last ten+ years I have seen Linux configuration tools come and go. In the early days there was the tried-and-true, all-powerful linuxconf that many thought would remain the one and only Linux configuration tool until the end of times. Well,…
Google Drive is extremely cheap offsite storage, and it's even possible to get extra storage for free for two years.  You can use the free account 15GB, and if you have an Android device..when you install Google Drive for the first time it will give…
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question