Solved

RHEL 5.4 on VM Environment - Network issue

Posted on 2011-03-21
5
605 Views
Last Modified: 2013-12-06
RHEL V 5.4 is working as standalone installation in Dell 815 servers where as it is installing in VM Environment but network services are not working.

Can any one please suggest how to proceed?  
0
Comment
Question by:Sriram_pp
5 Comments
 
LVL 40

Accepted Solution

by:
jlevie earned 63 total points
ID: 35186462
What is the host operaing system and the VM implementation? With a linux host and VMware or Virtual Box there won't be any network issues. There probably won't be any network issues with a windows host and VMware, but anything else is problematical.
0
 
LVL 19

Assisted Solution

by:bevhost
bevhost earned 62 total points
ID: 35186878
Sometime there are MAC address issues
Remove the HWADDR=bla line from /etc/sysconfig/network-scripts/ifcfg-eth0
It's not needed anyway.
0
 
LVL 87

Assisted Solution

by:rindi
rindi earned 62 total points
ID: 35187034
Make sure you have installed the "VMware Tools" or equivalent counterpart, depending on the VM product you are using. M$ VM products like Virtual PC probably don't support Linux Guests and wouldn't have such tools, so don't use such products. The Tools provide drivers for the virtualized hardware, particularly Video and NIC drivers, and they make the VM much more responsive.
0
 
LVL 10

Assisted Solution

by:Martin_J_Parker
Martin_J_Parker earned 63 total points
ID: 35213779
Go to System->Administration->Network
Do you have an eth0?
If so, double click it.
Make sure that the settings are correct AND that the "Activate device when computer starts" box is checked.

If eth0 is not there you will need to shut the VM down and look at what network settings you have in the VM machine.
0
 

Author Closing Comment

by:Sriram_pp
ID: 35277585
Thanks..
once BIOS upgraded, the issue was resolved.
0

Featured Post

Better Security Awareness With Threat Intelligence

See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

Join & Write a Comment

After running Ubuntu some time, you will be asked to download updates for fixing bugs and security updates. All the packages you download replace the previous ones, except for the kernel, also called "linux-image". This is due to the fact that w…
The purpose of this article is to fix the unknown display problem in Linux Mint operating system. After installing the OS if you see Display monitor is not recognized then we can install "MESA" utilities to fix this problem or we can install additio…
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now