Solved

Adding NIC on Ultra SparcII

Posted on 2000-04-07
7
313 Views
Last Modified: 2013-12-23
I just added one more NIC to SUN Ultra II but can not seem to add it.
Here is ifconfig output
# ifconfig -a
lo0: flags=849<UP,LOOPBACK,RUNNING,MULTICAST> mtu 8232
        inet 127.0.0.1 netmask ff000000
hme0: flags=863<UP,BROADCAST,NOTRAILERS,RUNNING,MULTICAST> mtu 1500
        inet xx.xxx.xxx.xx netmask ffffff00 broadcast 161.69.56.255
        ether 8:dd:50:9d:e6:e0
And when I try
# ifconfig hme1 10.10.4.1 netmask 255.255.255.0
ifconfig: SIOCSIFNETMASK: hme1: no such interface

Now the question is how do I troubleshoot whther the card is ok. I did try net test at boot but it does not report hme1

0
Comment
Question by:wallstreetx
  • 4
  • 3
7 Comments
 

Author Comment

by:wallstreetx
ID: 2695376
Adjusted points from 150 to 250
0
 
LVL 40

Accepted Solution

by:
jlevie earned 250 total points
ID: 2696486
Did you do a reconfigure boot after adding the card (boot -r at the prom prompt or "touch /reconfigure; reboot")? Oh yeah, does this card use an hme driver or something else?

Once Solaris knows about the card (via a reconfig boot) you can either simply create a /etc/hostname.hme1 file containing either a hostname (as found in /etc/hosts) or an IP address and the card will be configured at the next boot. Or you can manually set the card up from a shell with:

> ifconfig hme1 plumb
> ifconfig hme1 10.10.4.1 netmask 255.255.255.0 -trailers up
0
 

Author Comment

by:wallstreetx
ID: 2696833
Awesome!
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 
LVL 40

Expert Comment

by:jlevie
ID: 2696850
Did it work for you? I'm guessing that it did by your comment.
0
 

Author Comment

by:wallstreetx
ID: 2697390
Yes, it did. I created a file /etc/hostname.hme1 with ip 10.10.4.1.
touch /reconfigure and reboot and it was what I required...so thanks a lot

BTW,
Do you know how I can bring x-windows on my NT machine at home. I use secure crt to telnet into sun box amd is there any freeware which I can use?
0
 

Author Comment

by:wallstreetx
ID: 2697391
Yes, it did. I created a file /etc/hostname.hme1 with ip 10.10.4.1.
touch /reconfigure and reboot and it was what I required...so thanks a lot

BTW,
Do you know how I can bring x-windows on my NT machine at home. I use secure crt to telnet into sun box amd is there any freeware which I can use?
0
 
LVL 40

Expert Comment

by:jlevie
ID: 2697717
There is at least one free X server for win95/98 but I don't know if it works on NT. We looked at it last fall and weren't impressed, but it may be better now. Also there are several commercial vendors (Hummingbird, NCD, etc).

Another option is to make your NT system dual boot to NT & Linux and use Linux for Xwindows. What I do (and has gotten tremendously popular at work) is to use a pure Linux system and run windows in a virtual machine from VMware (http://www.vmware.com). It's not free ($99 for home use) but it works really, really well. And I can treat the windows installation just like an ordinary Unix file, copy it to another box, back it up to tape, have a second copy, etc. One of the guys at work runs linux, win95, and NT all at the same time.
0

Featured Post

Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

Join & Write a Comment

I was recently sitting at a desk at work with one of my colleagues and needed some information on my home computer. He watched as I turned on my home computer, established a remote session into it, got the information I needed and then shut it down …
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now