Solved

Linux as a Router Help needed

Posted on 2002-05-09
2
180 Views
Last Modified: 2010-04-20


I want to setup Linux box as a Router, can any one guide me on this topic ?

I have a synchornised Lease Line, interface cable from modem to router is v.35 can this connected to serial port .

Does RH7.1 enough.


Thx
0
Comment
Question by:99star
2 Comments
 
LVL 4

Expert Comment

by:MFCRich
ID: 7001205
Linux is certainly capable of performing as a router but your posting suggests you have one.

To be a router the linux box needs two or more interfaces, a properly configured routing table (the 'ip' command) and optionally some firewall rules (the 'iptables' command).

There are HOWTOs on these subjects at www.tdlp.org
0
 
LVL 2

Accepted Solution

by:
barrero earned 50 total points
ID: 7016747
I'm not sure if ipchains and iptable will be enough to set up a router.. with those apps you can have the filters to setup the firewall...  You will also need some router daemon like routed or gated.

  Once I setted up a router with gated in less than 30 minutes, by reading the docs that came with the tgz file.


  that's true that you need at least two interfaces... or one, with two IP addresses, one for each network you want to get together...  if this is your case, take a look about IP aliasing.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Setting up Secure Ubuntu server on VMware 1.      Insert the Ubuntu Server distribution CD or attach the ISO of the CD which is in the “Datastore”. Note that it is important to install the x64 edition on servers, not the X86 editions. 2.      Power on th…
SSH (Secure Shell) - Tips and Tricks As you all know SSH(Secure Shell) is a network protocol, which we use to access/transfer files securely between two networked devices. SSH was actually designed as a replacement for insecure protocols that sen…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question