Solved

Very Easy: TCP/IP config in Linux

Posted on 1998-05-24
3
260 Views
Last Modified: 2010-03-18
I've configured my TCP/IP using the Network applet in the RedHat Control Panel in X.
 I can ping my local router but nothing beyond it -- I guess I need to tell linux that THIS is a router. When can I do that?
0
Comment
Question by:dreamPeace
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 12

Accepted Solution

by:
j2 earned 10 total points
ID: 1584373
Not using RedHat, but yo uhave to tell it that it is a "gateway"

/sbin/route add default gw IP-OF-ROUTER metric 1

works for me

0
 
LVL 1

Author Comment

by:dreamPeace
ID: 1584374
Thank you for answering my question. While in discussion, I've found a way od doing that myself, but there are two things:
 a. Sometimes the deault route disappears and I have to add it again.
 b. What's the metric 1 for?

  If you answer these questions I'l accept your answer.
  Thanx again, Roman
0
 
LVL 1

Author Comment

by:dreamPeace
ID: 1584375
K
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question