Solved

eth0 config on red hat 6.1

Posted on 2000-02-22
9
494 Views
Last Modified: 2013-12-15
Have installed rh 6.1 (did the server install)
Need to get the ip address and netmask on the eth0 so I can put the nmachine on a network, it will not be a names server, it will look to another machine that is the nameserver.....what file and how do i do this. I am not running x windows.
0
Comment
Question by:vernk
  • 5
  • 4
9 Comments
 
LVL 40

Accepted Solution

by:
jlevie earned 50 total points
ID: 2547665
linuxconf is the easiet and cleanest way, and it will run from a vt100 terminal emulator over telnet/rlogin as well as from the console.

You configure the basic networking by going to "Config->Network->Client tasks->Basic host information->Adapter1". Select "Enabled" and "Manual", fill in the host name, IP & netmask, and select eth0 as the device. The remainder can be left blank. "Accept" the changes and "Quit" back to "Client tasks".

Select "Name server specification" and fill in the blanks. "Accept" the changes and "Quit" back to "Client tasks".

Select "Routing and gateways-Set defaults" and give it the IP of the gateway. "Accept" the changes and "Quit" all the way back to the main linuxconf pane. Then select "Act/Changes" and "Accept the changes".

I typed that in from memeory, but I think it's awfully close if not exact.
0
 

Author Comment

by:vernk
ID: 2548241
"You configure the basic networking by going to "Config->Network->Client tasks->Basic host information->Adapter1". Select "Enabled" and "Manual", fill in the host name, IP & netmask, and select eth0 as the device. The remainder can be left blank. "Accept" the changes and "Quit" back to "Client tasks".

ok, i see the hostname, then below that the manual
then below that it is blank.......how do I "fill in the host name, IP & netmask, and select eth0 as the device"

eth0 123.456.789.111 255.255.255.0

?????? this is where i dont understand?



0
 
LVL 40

Expert Comment

by:jlevie
ID: 2548373
Okay, fair question, I guess it isn't obvious. If you are on the console you don't have to do anything special, just login as root and run linuxconf. If you are remotely connecting (telnet/rlogin), you want to do so from a VT100 emulator as an ordinary user and then su to root. You also want to be sure Linux knows what the terminal type is "export TERM=vt100".

The up/down arrow keys will navigate through the selection lines. The space bar will toggle the state of a checkbox like the "Enable" field and the left/right arrow keys will move a radio button amoung the choices like the "Manual"/"DCHP"/"BOOTP" selection. The text lines like host name, alias, netmask, and net device you simply type the value in. The tab key navigates around in any of the windows, cycling amoung the "Quit"/"Accept"/"Help" buttons and input areas.

Doe that help?
0
 

Author Comment

by:vernk
ID: 2548401
yes, that helps, but, I still dont know the actual format to type in the parameters,
When you say "alias, netmask, and net device you simply type the value in" would the line below be correct?

eth0 123.456.789.111 255.255.255.0

thanx for bearing with me......
0
Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

 
LVL 40

Expert Comment

by:jlevie
ID: 2548461
Okay, maybe I misunderstood what you were asking. Each input line of "This host configuration" form takes a specific input. Each "Adapter" can be used to configure an ethernet  adapter, but you've only got one so all you need is to fill in the applicable fields of "Adapter1".

For instance the "Host name" and "Adapter1 Primary name" fields get the FQDN of your system (myhost.some-domain.com).  The "Aliases" field gets its short name (myhost). "IP address" would get your IP (123.456.789.111), and so forth.
0
 

Author Comment

by:vernk
ID: 2548475
so, when i open linuxconf and look below the manual dhcp bootp line there should already be there? like

Aliases

IP address


etc??? I don't have anything down there rite now....
0
 
LVL 40

Expert Comment

by:jlevie
ID: 2548509
"Primary host name", "Aliases", "IP address" are the titles of the fields (on the left side of the form). The fields themselves are blank to begin with and you move the cursor to the line and fill it in.
0
 

Author Comment

by:vernk
ID: 2548537
I know I must be driving you crazy....sorry, but the damn book doesn't really explain it in detail, except if you are running x...seems the book is mostly dedicated to people using x!
 Are the field names case sensative?
could you give me an example of all the fields possible? Like:

Alias
Ip address
Netmask
eth0

0
 
LVL 40

Expert Comment

by:jlevie
ID: 2548698
Sure, you betcha. Host name & alias aren't case sensitive, but the Unix convention for most everthing is that it'll be in lower case. The name of the Network device is decidedly case sensitive.

Okay, I can't show you exactly what it will look like, but I can get pretty close:

-------------- This host basic configuration ----------
 You are allowed to control the parameters
 which are specific to this host and related
 to its main connection to the local network


                       _______________________________
                      |-----------Host name-----------
Host name             |chaos.enigma.com
                      |-------------------------------
                      |----------Adapter 1------------
                      |[X] Enabled
config mode           |(o) Manual  ( ) Dhcp ( ) Bootp
Primary name + domain |chaos.enigma.com
Aliases (opt)         |chaos
IP address            |123.456.789.111
Netmask (opt)         |255.255.255.0
Net device            |eth0
Kernel module         |
I/O port (opt)        |
IRQ (opt)             |______________________________


    Accept            Cancel                 Help
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this tutorial I will explain how to make squid prevent malwares in five easy steps: Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. It reduces bandwidth and improves response times by caching and reusing frequently-…
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now