[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Redhat & TokenRing

Posted on 1998-02-09
1
Medium Priority
?
340 Views
Last Modified: 2010-03-18
What is the story about putting a linux redhat (4.1 or 5.0) on a TokenRing Netowrk?? Do i need special drivers and a recompile ??

Thanks
0
Comment
Question by:shaneo072197
1 Comment
 
LVL 4

Accepted Solution

by:
unicorntech earned 200 total points
ID: 1587504
What you will need to do is recompile and under the compile configuration you will seee the section about token ring support and the type of adapter you have. Only certain adapters are natively supported so check the Hardware-How-to and see if your adapter is listed - if not you will need custom drivers or a new adapter.

Rebuild the kernel with the new token ring support and then install it in your boot loader and reboot. this should enable the token ring adapter for you,

let me know how you go.
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
This Micro Tutorial will teach you how to add a cinematic look to any film or video out there. There are very few simple steps that you will follow to do so. This will be demonstrated using Adobe Premiere Pro CS6.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Suggested Courses
Course of the Month18 days, 19 hours left to enroll

834 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question