Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

configuring tunnel interface, tun0, redhat 9 - how?!?

Posted on 2003-12-04
3
Medium Priority
?
670 Views
Last Modified: 2008-01-16
Hi,

im trying to configure a virtual point to point link using the tunnel interface in linux.  Im having a bit of difficultly putting it all together and have not found a definitive guide anywhere on the web.  All i see is links to VTUN.

How do i do it?  I have /dev/net/tun on my system.  How does that translate into tun0?

Im confused.

Any help is appreciated,

David.
0
Comment
Question by:dtod
  • 2
3 Comments
 
LVL 24

Expert Comment

by:shivsa
ID: 9879597
0
 
LVL 24

Accepted Solution

by:
shivsa earned 2000 total points
ID: 9879623
u have /dev/net/tun it means that TUN's rpms are there.
1. u have to create nodes for /dev/net/tun
mknod /dev/net/tun c 10 200

for start stuff look at this site too.
http://www.conmicro.cx/hercules/herctcp.html
0
 
LVL 4

Expert Comment

by:Jivko
ID: 9880971
Use iproute2 and modules ipip and ip_gre

http://www.lartc.org/lartc.html#LARTC.TUNNEL

Regards
0

Featured Post

VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…

782 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question