Solved

eth0 config on red hat 6.1

Posted on 2000-02-22
9
493 Views
Last Modified: 2013-12-15
Have installed rh 6.1 (did the server install)
Need to get the ip address and netmask on the eth0 so I can put the nmachine on a network, it will not be a names server, it will look to another machine that is the nameserver.....what file and how do i do this. I am not running x windows.
0
Comment
Question by:vernk
  • 5
  • 4
9 Comments
 
LVL 40

Accepted Solution

by:
jlevie earned 50 total points
Comment Utility
linuxconf is the easiet and cleanest way, and it will run from a vt100 terminal emulator over telnet/rlogin as well as from the console.

You configure the basic networking by going to "Config->Network->Client tasks->Basic host information->Adapter1". Select "Enabled" and "Manual", fill in the host name, IP & netmask, and select eth0 as the device. The remainder can be left blank. "Accept" the changes and "Quit" back to "Client tasks".

Select "Name server specification" and fill in the blanks. "Accept" the changes and "Quit" back to "Client tasks".

Select "Routing and gateways-Set defaults" and give it the IP of the gateway. "Accept" the changes and "Quit" all the way back to the main linuxconf pane. Then select "Act/Changes" and "Accept the changes".

I typed that in from memeory, but I think it's awfully close if not exact.
0
 

Author Comment

by:vernk
Comment Utility
"You configure the basic networking by going to "Config->Network->Client tasks->Basic host information->Adapter1". Select "Enabled" and "Manual", fill in the host name, IP & netmask, and select eth0 as the device. The remainder can be left blank. "Accept" the changes and "Quit" back to "Client tasks".

ok, i see the hostname, then below that the manual
then below that it is blank.......how do I "fill in the host name, IP & netmask, and select eth0 as the device"

eth0 123.456.789.111 255.255.255.0

?????? this is where i dont understand?



0
 
LVL 40

Expert Comment

by:jlevie
Comment Utility
Okay, fair question, I guess it isn't obvious. If you are on the console you don't have to do anything special, just login as root and run linuxconf. If you are remotely connecting (telnet/rlogin), you want to do so from a VT100 emulator as an ordinary user and then su to root. You also want to be sure Linux knows what the terminal type is "export TERM=vt100".

The up/down arrow keys will navigate through the selection lines. The space bar will toggle the state of a checkbox like the "Enable" field and the left/right arrow keys will move a radio button amoung the choices like the "Manual"/"DCHP"/"BOOTP" selection. The text lines like host name, alias, netmask, and net device you simply type the value in. The tab key navigates around in any of the windows, cycling amoung the "Quit"/"Accept"/"Help" buttons and input areas.

Doe that help?
0
 

Author Comment

by:vernk
Comment Utility
yes, that helps, but, I still dont know the actual format to type in the parameters,
When you say "alias, netmask, and net device you simply type the value in" would the line below be correct?

eth0 123.456.789.111 255.255.255.0

thanx for bearing with me......
0
IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

 
LVL 40

Expert Comment

by:jlevie
Comment Utility
Okay, maybe I misunderstood what you were asking. Each input line of "This host configuration" form takes a specific input. Each "Adapter" can be used to configure an ethernet  adapter, but you've only got one so all you need is to fill in the applicable fields of "Adapter1".

For instance the "Host name" and "Adapter1 Primary name" fields get the FQDN of your system (myhost.some-domain.com).  The "Aliases" field gets its short name (myhost). "IP address" would get your IP (123.456.789.111), and so forth.
0
 

Author Comment

by:vernk
Comment Utility
so, when i open linuxconf and look below the manual dhcp bootp line there should already be there? like

Aliases

IP address


etc??? I don't have anything down there rite now....
0
 
LVL 40

Expert Comment

by:jlevie
Comment Utility
"Primary host name", "Aliases", "IP address" are the titles of the fields (on the left side of the form). The fields themselves are blank to begin with and you move the cursor to the line and fill it in.
0
 

Author Comment

by:vernk
Comment Utility
I know I must be driving you crazy....sorry, but the damn book doesn't really explain it in detail, except if you are running x...seems the book is mostly dedicated to people using x!
 Are the field names case sensative?
could you give me an example of all the fields possible? Like:

Alias
Ip address
Netmask
eth0

0
 
LVL 40

Expert Comment

by:jlevie
Comment Utility
Sure, you betcha. Host name & alias aren't case sensitive, but the Unix convention for most everthing is that it'll be in lower case. The name of the Network device is decidedly case sensitive.

Okay, I can't show you exactly what it will look like, but I can get pretty close:

-------------- This host basic configuration ----------
 You are allowed to control the parameters
 which are specific to this host and related
 to its main connection to the local network


                       _______________________________
                      |-----------Host name-----------
Host name             |chaos.enigma.com
                      |-------------------------------
                      |----------Adapter 1------------
                      |[X] Enabled
config mode           |(o) Manual  ( ) Dhcp ( ) Bootp
Primary name + domain |chaos.enigma.com
Aliases (opt)         |chaos
IP address            |123.456.789.111
Netmask (opt)         |255.255.255.0
Net device            |eth0
Kernel module         |
I/O port (opt)        |
IRQ (opt)             |______________________________


    Accept            Cancel                 Help
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

I. Introduction There's an interesting discussion going on now in an Experts Exchange Group — Attachments with no extension (http://www.experts-exchange.com/discussions/210281/Attachments-with-no-extension.html). This reminded me of questions tha…
Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now