17.6. Establishing a Token Ring Connection

download PDF
A token ring network is a network in which all the computers are connected in a circular pattern. A token, or a special network packet, travels around the token ring and allows computers to send information to each other.


For more information on using token rings under Linux, refer to the Linux Token Ring Project website available at
To add a token ring connection, follow these steps:
  1. Click the Devices tab.
  2. Click the New button on the toolbar.
  3. Select Token Ring connection from the Device Type list and click Forward.
  4. If you have already added the token ring card to the hardware list, select it from the Tokenring card list. Otherwise, select Other Tokenring Card to add the hardware device.
  5. If you selected Other Tokenring Card, the Select Token Ring Adapter window as shown in Figure 17.14, “Token Ring Settings” appears. Select the manufacturer and model of the adapter. Select the device name. If this is the system's first token ring card, select tr0; if this is the second token ring card, select tr1 (and so on). The Network Administration Tool also allows the user to configure the resources for the adapter. Click Forward to continue.
    Token Ring Settings

    Figure 17.14. Token Ring Settings

  6. On the Configure Network Settings page, choose between DHCP and static IP address. You may specify a hostname for the device. If the device receives a dynamic IP address each time the network is started, do not specify a hostname. Click Forward to continue.
  7. Click Apply on the Create Tokenring Device page.
After configuring the token ring device, it appears in the device list as shown in Figure 17.15, “Token Ring Device”.
Token Ring Device

Figure 17.15. Token Ring Device

Be sure to select File > Save to save the changes.
After adding the device, you can edit its configuration by selecting the device from the device list and clicking Edit. For example, you can configure whether the device is started at boot time.
When the device is added, it is not activated immediately, as seen by its Inactive status. To activate the device, select it from the device list, and click the Activate button. If the system is configured to activate the device when the computer starts (the default), this step does not have to be performed again.
Red Hat logoGithubRedditYoutubeTwitter


Try, buy, & sell


About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

© 2024 Red Hat, Inc.