Solved

configuring tunnel interface, tun0, redhat 9 - how?!?

Posted on 2003-12-04
3
653 Views
Last Modified: 2008-01-16
Hi,

im trying to configure a virtual point to point link using the tunnel interface in linux.  Im having a bit of difficultly putting it all together and have not found a definitive guide anywhere on the web.  All i see is links to VTUN.

How do i do it?  I have /dev/net/tun on my system.  How does that translate into tun0?

Im confused.

Any help is appreciated,

David.
0
Comment
Question by:dtod
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 24

Expert Comment

by:shivsa
ID: 9879597
0
 
LVL 24

Accepted Solution

by:
shivsa earned 500 total points
ID: 9879623
u have /dev/net/tun it means that TUN's rpms are there.
1. u have to create nodes for /dev/net/tun
mknod /dev/net/tun c 10 200

for start stuff look at this site too.
http://www.conmicro.cx/hercules/herctcp.html
0
 
LVL 4

Expert Comment

by:Jivko
ID: 9880971
Use iproute2 and modules ipip and ip_gre

http://www.lartc.org/lartc.html#LARTC.TUNNEL

Regards
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Linux Mailserver setup & redundancy 2 124
E-mail settings for Fail2ban 7 164
Ubuntu VNC server rejects access by client 7 231
how to view remote client's ipv6 address? 5 95
I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial
Suggested Courses

751 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question