Solved

RedHat 9 box with 2 NIC - Speedtouch Home (PPPoE) - how to setup ?

Posted on 2003-11-25
1
994 Views
Last Modified: 2010-03-18
Hello

I read some similar or closely related articles about this kind of issue but I still can't make sense of it. I apologize for my lack of knowledge but I may use a hand here ... I hope my post will be clear and complete

I have a PC on which RedHat 9 is installed, I have two NIC, both correctly installed, eth0 and eth1. I want that box to act as an internet router and gateway for my LAN (with some Windows boxes), on which I plan to later set other things up, hopefully.

- I have a RJ45 running from eth0 (10.0.0.1) to my Speedtouch Home modem (10.0.0.138) and this has been configured using the PPPoE Redhat GUI wizard.
- So far I obtained a "WAN" IP from my provider through the PPP0 adapter
- if there is only one NIC, eth0, I get access to the internet.

- as soon as I add the eth1, it seems the system/routing doesnt know where to "go"/how to proceed ... so no more internet access
- my eth1 (10.0.0.2 or class C 192.168.0.1 maybe) is connected to a switch and I plan on building up my LAN with that eth1 as gateway

I suppose I should specify a route, but I'm completely lost on how to do that. The GUI is no help.

- How do I force traffic from eth1 through eth0 so that it goes through the PPP0 and vice-versa ?
- I suppose I  could I have my eth1 LAN gateway set up using a different IP Class range (such as 192.168.0... ) and keep the eth0 with a Class A 10.0.0... range ?
- Do I have to keep the eth0 IP in the same range as the modem (which is by default 10.0.0.138) ?

thanks
marc
0
Comment
Question by:mhuygh
1 Comment
 
LVL 12

Accepted Solution

by:
paullamhkg earned 125 total points
ID: 9822753
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now