?
Solved

Removing a route at boot

Posted on 2004-08-04
3
Medium Priority
?
269 Views
Last Modified: 2010-03-18
Hi,

I have a Linux server that takes a weird route when its booting. The mask for the true IP is 255.255.255.128 and the ip is like 65.x.x.x, but then, linux add a route that is 65.0.0.0 at boot. Therefore, server isn't accessible from people who have an ip beginning with 65

Is there a way to fix that or just even delete the root at boot up ? I'm kind of new in linux and I know there is somewhere you can put things to make them execute at boot, but I don't remember where or how.

Thanks for your help
Eric
0
Comment
Question by:Po_24
  • 2
3 Comments
 
LVL 4

Accepted Solution

by:
jonesy2k earned 150 total points
ID: 11722682
could you please post the output of
ifconfig -a
and
route
here?

In answer to your other question, if you're running redhat, you can add commands to the bottom of
/etc/rc.d/rc.local
if you're running debian, you can use
/etc/init.d/bootmisc.sh

also, can you please post your ethernet config files?
0
 

Author Comment

by:Po_24
ID: 11722879
Thanks for your help

After execuing the ifconfig -a command, I saw the error, the second IP was added without a netmask, so he put the default mask.. I totally forgot to check that before checking somewhere else. Thanks for your tip and for your answer on the config at boot.. since the second IP was added there, I would have needed to know that anyway :)

Eric
0
 
LVL 4

Expert Comment

by:jonesy2k
ID: 11722922
No worries,
glad to help out.
0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
This video shows how to quickly and easily deploy an email signature for all users in Office 365 and prevent it from being added to replies and forwards. (the resulting signature is applied on the server level in Exchange Online) The email signat…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Suggested Courses
Course of the Month9 days, 13 hours left to enroll

612 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question