First  |  Prev |  Next  |  Last
Pages: 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29
Intermittent vpn problems
Hi all, When connecting to a Microsoft VPN server using GRE and pppd, sometimes I cannot get any responses to these sends: sent [LCP ConfReq id=0x1 <mru 1000> <asyncmap 0x0> <magic 0x4d35fa6> <pcomp> <accomp>] Using nmap to the ip and port works: /root> nmap -p1723 x. 99.45.107 Starting Nmap 5.00 ( ht... 30 Dec 2009 15:22
Ethereal on cygwin - 'which Packet.dll' and 'which wpcap.dll'??
On Fri, 25 Dec 2009 08:12:54 -0800, karthikbalaguru wrote: Hi, I am setting up the Ethereal in Cygwin. Good for you! Now stop posting Windows-related stuff to Linux groups, please. ... 30 Dec 2009 22:02
Ethereal on cygwin - 'which Packet.dll' and 'which wpcap.dll' ??
Hi, I am setting up the Ethereal in Cygwin. I downloaded the ethreal source code file ethereal-0.99.0-1.src.rpm and followed the instructions as mentioned in INSTALL file to set it up in cygwin environment. I did the following - Step 1 - ./configure But, i got the below error after i executed the abov... 27 Dec 2009 13:00
Getting traffic rate traces bound to each active tcp link
Hi NG, I need to track each TCP link traffic load (rate). I already have the information regarding all opened TCP links, but I don't know what the best way could be to retrieve traffic information to associate to those. To do the job what I need is basically a) to bind a packet to the correct flow, hence knowi... 22 Dec 2009 05:58
Combination of Leaky-Bucket and Token Bucket
Hi, It seems that the leaky-bucket and token bucket implementations can be combined to provide maximum efficiency and control of the traffic flows into a network. Reference - Section 'Inefficienty of leaky bucket implementation' in http://en.wikipedia.org/wiki/Leaky_bucket What is the name of the algorithm ... 20 Dec 2009 22:21
ip rule with fwmark not working in 2.6.31?
Hi, I have a setup where I do policy routing based on a mangle-table with ip rule fwmark. This worked until 2.6.30 with 2.6.31 ip rule does work eg with a source address ip rule from 1.2.3.4 lookup 1 but not with ip rule from all fwmark 0x01 lookup 1 The problem is, that the answer packets are dropped. I use ... 23 Dec 2009 13:42
Encryption only ?
Hi, ESP supports both 'encryption only' and 'authentication only' configurations. Interestingly, the the usage of encryption without authentication is strongly discouraged. So, why should ESP provide the support for 'encryption only' configuration ? Any specific reasons for that configuration ? Any ideas ? Thx ... 23 Dec 2009 13:42
Virtual IP setup Problem
I am trying to run multiple network nodes (A, B, C, D and E). Each node requires unique IP address to be assigned. Due to crunch of linux machines at home, I planned to use Virtual IP, running A, B, C and D on Machine 1 and E on Machine 2. An IP packet is expected to travel from D to C, C to B and B to outside netw... 19 Dec 2009 15:59
Encapsulation in VPN
Hi, For data ecapsulation, VPN relies on either of the following technologies like GRE , IPSec, L2F, PPTP and L2TP . But, which of the above technologies is popular ? If they vary based on the requirements, can you pls lemme know a document/link that maps the technologies against the requirements w.r.t VPN ? ... 6 Jan 2010 08:41
Identifying NFS Timeout issue using NFSSTAT
Hi , The issue is regarding some NFS issue we are seeing in our production hosts. One of our process is failing regularly because of unable to read some files from a NFS filer . The following are the error messages that can be seen . ====== /net/edw12/warehouse/stores//links//20091112/... 16 Dec 2009 00:26
First  |  Prev |  Next  |  Last
Pages: 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29