PCI Symphony Network Cards
Establish the IP address for the eth1 interface by typing
ifconfig eth1 192.168.4.1 broadcast 192.168.4.255\ netmask 255.255.255.0
Set the Secid for the Symphony wireless segment with the following command:
rl2cfg dev eth1 secidUse the same Secid you used when setting up the notebook above, making sure you type it the same, including upper/lowercase. The Secid needs to be set only once; it is stored on the card in nvram. The rlmod driver versions after 1.5.1 use proxcfg instead of rl2cfg to set parameters for the Symphony card. Check the man page and READMEs.
Now, establish the route for the eth1 interface by typing
route add -net 192.168.4.0 dev eth1
You can check your results by typing ifconfig eth1 and netstat -r. You should be able to see that the eth1 interface is fully configured with its IP address and that there is a route using eth1 to the 192.168.4.0 network.
There is one more configuration command that sets the Symphony card mode to “master” and sets its name. Type the following, using an appropriate name for your server:
rl2cfg dev eth1 msta
If you don't have a firewall running on your Linux system, you should be able to ping the notebook from Linux and ping Linux from the notebook using the IP addresses. You should also be able to telnet to the Linux system from the notebook, again using the Linux server's IP address. If this works, you're just about there; if not, check your log files for errors.
Add a line to the /etc/hosts table on the Linux server, giving the IP address of the notebook when on the wireless subnet, using your domain as appropriate.
If you don't already have a c:\windows\hosts file with an entry for the Linux server on your notebook from a wired Ethernet configuration, create one now. The pertinent line entry in my c:\windows\hosts is:
192.168.1.254 server1 server1.If you have a firewall running on the Linux server, you will need to add input and output rules for the eth1 interface to allow the packets to be passed. I added lines to these two sections of /etc/rc.boot/masq as shown:
# local interface, local machines, going anywhere # is valid ipfwadm -I -a accept -W eth1 -S 192.168.4.0/24\ -D 0.0.0.0/0 # local interface, any source going to local net # is valid ipfwadm -O -a accept -W eth1 -S 0.0.0.0/0 \ -D 192.168.4.0/24Depending on your Linux distribution and version and whether you are using ipfwadm or ipchains, the location and name of the rules file will vary. Refer to the documentation for your firewall package. At this point, you should be able to ping and use telnet by host name between the notebook and all systems on your original network.
To allow packets to be forwarded to the Internet through the firewall from the wireless segment, you will need to add rules similar to the following:
# Masquerade from local net on local interface to # anywhere ipfwadm -F -a masquerade -W eth0 -S 192.168.4.0/24\ -D 0.0.0.0/0 ipfwadm -F -a masquerade -W ppp0 -S 192.168.4.0/24\ -D 0.0.0.0/0 ipfwadm -F -a masquerade -W sl0 -S 192.168.4.0/24\ -D 0.0.0.0/0
Due to the way diald works, there are rules for both ppp0 and sl0. Remember to restart your firewall rule set after making changes.
Once I had the firewall rules in place, I had full connectivity from the notebook to all local hosts and the Internet. The last service to get working was the Samba sharing from the Linux server. It took a little head scratching, but finally I realized I had a line in /etc/smb.conf that limited which networks had access to the Samba server. Since the wireless segment was new, it needed to be added to the config file, and then Samba needed to be restarted. The revised line in /etc/smb.conf is shown below.
hosts allow = localhost, 192.168.1., 192.168.4.
Once everything is working, you need to add the commands to initialize the wireless eth1 interface on system boot. Debian Linux uses SysV init, so I added the following lines to the /etc/init.d/network file after the eth0 interface section and before the line setting the default route:
insmod rlmod ifconfig eth1 192.168.4.1 netmask 255.255.255.0\ broadcast 192.168.4.255 route add -net 192.168.4.0 dev eth1 \ /usr/local/bin/rl2cfg dev eth1 msta name server1
These lines load the module, configure the eth1 interface, add the route and set the mode to master. Make sure it all comes up on reboot.
|Using Salt Stack and Vagrant for Drupal Development||May 20, 2013|
|Making Linux and Android Get Along (It's Not as Hard as It Sounds)||May 16, 2013|
|Drupal Is a Framework: Why Everyone Needs to Understand This||May 15, 2013|
|Home, My Backup Data Center||May 13, 2013|
|Non-Linux FOSS: Seashore||May 10, 2013|
|Trying to Tame the Tablet||May 08, 2013|
- RSS Feeds
- Making Linux and Android Get Along (It's Not as Hard as It Sounds)
- Using Salt Stack and Vagrant for Drupal Development
- New Products
- Validate an E-Mail Address with PHP, the Right Way
- Drupal Is a Framework: Why Everyone Needs to Understand This
- A Topic for Discussion - Open Source Feature-Richness?
- Download the Free Red Hat White Paper "Using an Open Source Framework to Catch the Bad Guy"
- Tech Tip: Really Simple HTTP Server with Python
- Readers' Choice Awards
- Android is Linux -- why no better inter-operation
2 hours 14 min ago
- Connecting Android device to desktop Linux via USB
2 hours 42 min ago
- Find new cell phone and tablet pc
3 hours 40 min ago
5 hours 9 min ago
- Automatically updating Guest Additions
6 hours 18 min ago
- I like your topic on android
7 hours 4 min ago
- Reply to comment | Linux Journal
7 hours 25 min ago
- This is the easiest tutorial
13 hours 40 min ago
- Ahh, the Koolaid.
19 hours 18 min ago
- git-annex assistant
1 day 1 hour ago
Enter to Win an Adafruit Pi Cobbler Breakout Kit for Raspberry Pi
It's Raspberry Pi month at Linux Journal. Each week in May, Adafruit will be giving away a Pi-related prize to a lucky, randomly drawn LJ reader. Winners will be announced weekly.
Fill out the fields below to enter to win this week's prize-- a Pi Cobbler Breakout Kit for Raspberry Pi.
Congratulations to our winners so far:
- 5-8-13, Pi Starter Pack: Jack Davis
- 5-15-13, Pi Model B 512MB RAM: Patrick Dunn
- 5-21-13, Prototyping Pi Plate Kit: Philip Kirby
- Next winner announced on 5-27-13!
Free Webinar: Hadoop
How to Build an Optimal Hadoop Cluster to Store and Maintain Unlimited Amounts of Data Using Microservers
Realizing the promise of Apache® Hadoop® requires the effective deployment of compute, memory, storage and networking to achieve optimal results. With its flexibility and multitude of options, it is easy to over or under provision the server infrastructure, resulting in poor performance and high TCO. Join us for an in depth, technical discussion with industry experts from leading Hadoop and server companies who will provide insights into the key considerations for designing and deploying an optimal Hadoop cluster.
Some of key questions to be discussed are:
- What is the “typical” Hadoop cluster and what should be installed on the different machine types?
- Why should you consider the typical workload patterns when making your hardware decisions?
- Are all microservers created equal for Hadoop deployments?
- How do I plan for expansion if I require more compute, memory, storage or networking?