P. 1
Red Hat - Linux 9 Customization Guide

Red Hat - Linux 9 Customization Guide


|Views: 725|Likes:
Publicado porGeorge
This document contains information on how to customize your RHL system to fit your needs.
This document contains information on how to customize your RHL system to fit your needs.

More info:

Published by: George on Aug 17, 2008
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





A token ring network is a network in which all the computers are connected in a circular pattern.
A token, or a special network packet, travels around the token ring and allows computers to send
information to each other.


For more information on using token ring under Linux, refer to the Linux Token Ring Project website
available at http://www.linuxtr.net/.

To add a token ring connection, follow these steps:

1. Click the Devices tab.

2. Click the New button on the toolbar.

3. Select Token Ring connection from the Device Type list and click Forward.

4. If you have already added the token ring card to the hardware list, select it from the Ethernet
list. Otherwise, select Other Tokenring Card to add the hardware device.

5. If you selected Other Tokenring Card, the Select Token Ring Adapter window as shown
in Figure 12-10 appears. Select the manufacturer and model of the adapter. Select the device
name. If this is the system’s first token ring card, select tr0; if this is the second token ring card,
select tr1 (and so on). The Network Administration Tool also allows the user to configure the
resources for the adapter. Click Forward to continue.

Chapter 12. Network Configuration


Figure 12-10. Token Ring Settings

6. On the Configure Network Settings page, choose between DHCP and static IP address. You
may specify a hostname for the device. If the device receives a dynamic IP address each time
the network is started, do not specify a hostname. Click Forward to continue.

7. Click Apply on the Create Tokenring Device page.

After configuring the token ring device, it appears in the device list as shown in Figure 12-11.

Figure 12-11. Token Ring Device

Be sure to select File => Save to save the changes.

After adding the device, you can edit its configuration by selecting the device from the device list and
clicking Edit. For example, you can configure whether the device is started at boot time.

When the device is added, it is not activated immediately, as seen by its Inactive status. To activate
the device, select it from the device list, and click the Activate button. If the system is configured
to activate the device when the computer starts (the default), this step does not have to be performed


Chapter 12. Network Configuration

12.7. Establishing a CIPE Connection

CIPE stands for Crypto IP Encapsulation. It is used to configure an IP tunneling device. For example,
CIPE can be used to grant access from the outside world into a Virtual Private Network (VPN). If you
need to setup a CIPE device, contact your system administrator for the correct values.

Figure 12-12. CIPE Settings


For more information on CIPE and setting up CIPE, refer to the Red Hat Linux Security Guide.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->