Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Redhat & TokenRing

Posted on 1998-02-09
1
Medium Priority
?
335 Views
Last Modified: 2010-03-18
What is the story about putting a linux redhat (4.1 or 5.0) on a TokenRing Netowrk?? Do i need special drivers and a recompile ??

Thanks
0
Comment
Question by:shaneo072197
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 4

Accepted Solution

by:
unicorntech earned 200 total points
ID: 1587504
What you will need to do is recompile and under the compile configuration you will seee the section about token ring support and the type of adapter you have. Only certain adapters are natively supported so check the Hardware-How-to and see if your adapter is listed - if not you will need custom drivers or a new adapter.

Rebuild the kernel with the new token ring support and then install it in your boot loader and reboot. this should enable the token ring adapter for you,

let me know how you go.
0

Featured Post

Enroll in October's Free Course of the Month

Do you work with and analyze data? Enroll in October's Course of the Month for 7+ hours of SQL training, allowing you to quickly and efficiently store or retrieve data. It's free for Premium Members, Team Accounts, and Qualified Experts!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

609 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question