Solved

how to change my ip address in centos 5

Posted on 2008-11-02
4
8,277 Views
Last Modified: 2012-05-05
I need to change my ip address, DNS , gateway and subnet mask in my centos. How would I do it from command prompt.
Also what is broadcast ip?
thanks
0
Comment
Question by:syedasimmeesaq
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 5

Accepted Solution

by:
bswinnerton earned 500 total points
ID: 22862089
Give this a try:

http://www.linuxdynasty.org/configuring-ip-on-linux-from-the-command-line-redhatcentosfedora.html

And a broadcast IP is just an ip address with the last octet as 255.  For example 192.168.0.1 is your ip, your broadcast ip would be 192.168.0.255
0
 
LVL 8

Expert Comment

by:nahime
ID: 22862090
if your interface is eth0 you need to modify the file:
/etc/sysconfig/network-scripts/ifcfg-eth0

See this link for reference:
http://www.centos.org/docs/5/html/Deployment_Guide-en-US/ch-networkscripts.html
0
 
LVL 14

Expert Comment

by:Deepak Kosaraju
ID: 22862129
use setup command to control the centos system setting
and selected Network Configuration
Gud luck
setup
(or) use
system-config-network if you are using GUI
(or) use
system-config-network-tui

Open in new window

0
 
LVL 12

Expert Comment

by:hfraser
ID: 22862173
The broadcast address has the last octet set to 255 only if your netmask is 255.255.255.0. This is usually the case for home users (usually a class C address), but often not the case in a larger network (such as a class B or a subset thereof).

If you understand bitmasks, logical AND, etc. you can calculate the broadcast address. It's not hard. But it's even easier to reference one of the websites on the Internet that'll do it for you such as:

http://www.subnetmask.info/
0

Featured Post

Don't Cry: How Liquid Web is Ensuring Security

WannaCry is just the start. Read how Liquid Web is protecting itself and its customers against new threats.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I. Introduction There's an interesting discussion going on now in an Experts Exchange Group — Attachments with no extension (http://www.experts-exchange.com/discussions/210281/Attachments-with-no-extension.html). This reminded me of questions tha…
Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial

690 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question