[WBEL-users] 2 NICs Problems !

Steve Anderson steve.anderson@bipsolutions.com
Tue, 18 May 2004 16:34:28 +0100


Have you tried configuring the interface using just ifconfig?

ifconfig eth1 192.168.1.x netmask 255.255.255.0 up

(replace the x)

You probably want to check your routing table and your firewall just to
be on the safe side.

Steve Anderson

> -----Original Message-----
> From: whitebox-users-admin@beau.org 
> [mailto:whitebox-users-admin@beau.org] On Behalf Of Denis Croombs
> Sent: 18 May 2004 15:36
> To: whitebox-users@beau.org
> Subject: [WBEL-users] 2 NICs Problems !
> 
> 
> Hi
> 
> I am trying to setup 2 nics (it accepts both devices are 
> there at a hardware
> level)
> I want 1 to be a fixed public ip & use a public router
> & I want the second one to have an internal 192.168.1.X 
> number, and be accessed by all internal system on that sub-net
> 
> I know I have done this on Rh7.3 but I just cannot get it 
> working The internal (eth0) works OK and I just cannot get 
> eth1 to work, any clues/ links very welcome.
> 
> Regards
> 
> Denis
> 
> 
> ---
> Outgoing mail is certified Virus Free.
> Checked by AVG anti-virus system (http://www.grisoft.com).
> Version: 6.0.687 / Virus Database: 448 - Release Date: 16/05/2004
> 
> 
> -- 
> This message has been scanned for viruses and
> dangerous content by MailScanner, and is
> believed to be clean.
> 
> Marvin the E-Mail scanner
> 
> _______________________________________________
> Whitebox-users mailing list
> Whitebox-users@beau.org 
> http://beau.org/mailman/listinfo/whitebox-> users
> 



****************************************************************************
This e-mail (and any attachment) is intended only for the attention
of the addressee(s). Its unauthorised use, disclosure, storage
or copying is not permitted. If you are not the intended recipient,
please destroy all copies and inform the sender by return e-mail. 
This e-mail (whether you are the sender or the recipient) may be 
monitored, recorded and retained by BiP Solutions Ltd. E-mail
monitoring/ blocking software may be used, and e-mail content 
may be read at any time.You have a responsibility to ensure
laws are not broken when composing or forwarding e-mails and
their contents.
****************************************************************************