Solved

Long mount time thro Samba

Posted on 2000-03-29
6
161 Views
Last Modified: 2011-09-20
I am able to mount a Win 98 drive through Samba over a simple home network, but it is taking 3-4 mins before I'm asked for the password.   Any ideas on what might be causing this?   Both machines have Genius cards with simple coaxil cable.  

Cliff
0
Comment
Question by:cliffhanger121599
6 Comments
 
LVL 1

Expert Comment

by:Nick
ID: 2667305
I am no expert, but what network IP class are you using?

Should be for simple home network class C

IP 192.168.0.X
SM 255.255.255.0

Sounds like you may have a class A, and it's a big permutation?

Nick
0
 
LVL 40

Expert Comment

by:jlevie
ID: 2667638
If you are using coax, do you have tee's & 50 ohm terminators at each end of the coax cable?
0
 
LVL 3

Expert Comment

by:handrich
ID: 2669739
Hi

howmany protocols are installed?
usualy tcp/ip should be the one and only used protocol. you must also assign ip-networknumbers to both machines.

try 192.168.10.10 with 255.255.255.0
and 192.168.10.20 with 255.255.255.0
as netmask.

Michael
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 
LVL 40

Accepted Solution

by:
jlevie earned 10 total points
ID: 2669775
Also it might be a DNS timeout. The Linux box may be trying to look up the name of the cwindows client in DNS. Solve that by adding the client IP & hostname to your /etc/hosts file.
0
 

Author Comment

by:cliffhanger121599
ID: 2670914
Yes, the coaxial has tees and 50ohm terminators at each end.   I'm using 192.168.0.1 and 192.168.0.2 and 255.255.255.0 as IP's and netmask.   What I do have is the wrong hostname under /etc/hosts - have just changed it and will let you know if this is it when my son gets off AvP!
0
 

Author Comment

by:cliffhanger121599
ID: 2678151
Thanks,obvious when you know how.
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Suggested Solutions

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
This video explains how to create simple products associated to Magento configurable product and offers fast way of their generation with Store Manager for Magento tool.

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now