Solved

Does this 127.0.0.2 is needed in SLES /etc/hosts file?

Posted on 2011-02-18
7
1,999 Views
Last Modified: 2012-08-13
This is using SUSE Linux Enterprise server 11 SP1. After setting the IP on the NIC, I found that there are 127.0.0.2 record created in /etc/hosts. Does this is needed? As pinging from other machine failed. What would be the best way to tackle this issue?
0
Comment
Question by:Balack
  • 4
  • 2
7 Comments
 
LVL 12

Expert Comment

by:upanwar
ID: 34931361
Pinging from different machine. Check the firewall of your system then disable it and also check whether you have configured network settings correctly.

for 127.0.0.2 please follow the URL.

http://www.mail-archive.com/linux-390@vm.marist.edu/msg49744.html
0
 

Author Comment

by:Balack
ID: 34931991
I don't think I get any answer from the suggested URL...
0
 
LVL 9

Expert Comment

by:svs
ID: 34932287
any address withtin 127/8 netblock is a 'localhost' address and is not reachable from outside.  I think you should leave it alone.
0
Efficient way to get backups off site to Azure

This user guide provides instructions on how to deploy and configure both a StoneFly Scale Out NAS Enterprise Cloud Drive virtual machine and Veeam Cloud Connect in the Microsoft Azure Cloud.

 
LVL 12

Expert Comment

by:upanwar
ID: 34932819
127.x.x.x addresses are all local. 127.0.0.2 is a loopback device for second NIC.



0
 
LVL 12

Expert Comment

by:upanwar
ID: 34932835
This is a work arround i found at Novel where somebody was facing issue due this second loopback address. If you face any issue you can try the same as well.

Anyways there is no harm to remove that second loopback address as well.
0
 
LVL 12

Accepted Solution

by:
upanwar earned 500 total points
ID: 34932863
0
 

Author Closing Comment

by:Balack
ID: 34938081
ok
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
A company’s greatest vulnerability is their email. CEO fraud, ransomware and spear phishing attacks are the no1 threat to a company’s security. Cybercrime is responsible for the largest loss of money to companies today with losses projected to r…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

947 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now