Solved

TCP-IP Addresses for 2 machine (linux and windows) home network

Posted on 2001-08-14
4
190 Views
Last Modified: 2010-04-20
0
Comment
Question by:elmendor
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 17

Expert Comment

by:dorward
ID: 6385606
You've got a no text error (So I'll guess at your question).

Just use a class C private network.

suitable ip addresses include:
192.168.1.1
and
192.168.1.2
0
 
LVL 5

Expert Comment

by:moonbeam012200
ID: 6385644
 The Internet Assigned Numbers Authority (IANA) has reserved the
  following three blocks of the IP address space for private networks:

                10.0.0.0        -   10.255.255.255
                172.16.0.0      -   172.31.255.255
                192.168.0.0     -   192.168.255.255

I tend to prefer the class C 192.168.x.x block. For example, I'll name my boxes 192.168.1.1 ... 192.168.1.2 etc.

Finally, I suggest you take a look at the IP Masquerade and the Home-Network-mini-HOWTO howtos.
0
 
LVL 1

Expert Comment

by:Moondancer
ID: 6386087
I am refunding points and PAQing this item, due to the NO TEXT problem so that elmendor can post this again.  The problem should now be resolved.

Moondancer
Community Support Moderator @ Experts Exchange
0
 
LVL 1

Accepted Solution

by:
Moondancer earned 0 total points
ID: 6386094
If you continue to have this NO TEXT problem, please click this link and read the workarounds that may help you.

http://www.experts-exchange.com/jsp/qManageQuestion.jsp?ta=commspt&qid=20157348

Moondancer
Community Support Moderator @ Experts Exchange
0

Featured Post

Secure Your WordPress Site: 5 Essential Approaches

WordPress is the web's most popular CMS, but its dominance also makes it a target for attackers. Our eBook will show you how to:

Prevent costly exploits of core and plugin vulnerabilities
Repel automated attacks
Lock down your dashboard, secure your code, and protect your users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The purpose of this article is to show how we can create Linux Mint virtual machine using Oracle Virtual Box. To install Linux Mint we have to download the ISO file from its website i.e. http://www.linuxmint.com. Once you open the link you will see …
The purpose of this article is to demonstrate how we can upgrade Python from version 2.7.6 to Python 2.7.10 on the Linux Mint operating system. I am using an Oracle Virtual Box where I have installed Linux Mint operating system version 17.2. Once yo…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question