07-25-2008
Thank you.
is there any Reverse arp like command in HP Unix ?
10 More Discussions You Might Find Interesting
1. Cybersecurity
How does ARP take care of uniqueness of physical addresses?
How does an ISP allocate a MAC address when I do not have an NIC( Network interface Card)? (1 Reply)
Discussion started by: ManishSaxena
1 Replies
2. IP Networking
Can someone tell me if I tweak the destination field in an arp request for TCP connection to match it with the the mac addresses of different recivers in an ethernet as the packet passes through them in short each one catches the arp request and replies, what would happen I mean will the sender of... (2 Replies)
Discussion started by: Rakesh Ranjan
2 Replies
3. Solaris
Dear all,
We are testing two of our servers for mq series connectivity. The scenario is, when one machine is shutting down it's services there are some scripts that do a dns update, which removes the ip address and relates it to the ip address of the other node on our dns server, and the update... (7 Replies)
Discussion started by: earlysame55
7 Replies
4. IP Networking
Hi All,
Is there any way to modify or filter the ARP frames??
thanks! (2 Replies)
Discussion started by: lagigliaivan
2 Replies
5. Red Hat
Dear All
i have a linux proxy server which has RHEL-5 64 bit, it has two interfaces, it has the following details
eth0=10.200.14.42
eth3=10.201.14.42
default gateway=10.201.14.254
one static route=192.168.0.0/24 gw 10.200.14.254
i am facing a problem when i ping 10.201.14.42 from... (2 Replies)
Discussion started by: surfer24
2 Replies
6. UNIX for Advanced & Expert Users
Can someone please explain this output to me. Why doesn't ifconfig show the same info?
~ $ arp -a
? (10.71.0.1) at 00:1b:21:2b:eb:0c on eth0 (4 Replies)
Discussion started by: cokedude
4 Replies
7. IP Networking
Hi, I'm trying to find a way to protect my network against arp spoofing.
What it is:
An attacker sends fake arp packets in the network, identifying himself as the router. All network traffic is then redirected to this attacker.
How to protect myself:
In my opinion, the best possible... (2 Replies)
Discussion started by: chrisperry
2 Replies
8. IP Networking
Hello,
I have 2 clients with Unix installed.
host1: eth0 (192.168.5.10) & eth1 (192.168.10.10)
host2: eth0 (192.168.10.20)
I've connected host1-eth1 to host2-eth0. host1-eth0 isn't connected.
I started 'tcpdump' on wonder that host2 got ARP requests for 192.168.5.10.
Any idea why host1... (2 Replies)
Discussion started by: daWonderer
2 Replies
9. War Stories
A customer appears to have drastically misunderstood our instructions for connecting to our WAN. He set his PC IP address to the same as one of the bridges. :mad: :wall: This caused much confusion on the network, to put it mildly. He called to complain about the poor performance of the network... (13 Replies)
Discussion started by: Corona688
13 Replies
10. Red Hat
Hello,
I am setting up a new RedHat server with two network interfaces.
These interfaces are on different subnets, and connected to the same firewall.
I'm trying to reach a remote IP.
It works fine from the first interface.
The second interface however, is making ARP requests instead of... (0 Replies)
Discussion started by: Wanou85
0 Replies
nstrtel(5) File Formats Manual nstrtel(5)
NAME
nstrtel - specifies the number of telnet device files the kernel can support for incoming telnet sessions
VALUES
Failsafe
Default
Allowed values
(Subject to available physical memory.)
It is best to use the default value, and there should not be any need to lower it. However, if the simultaneous telnet connection load is
very high, then the value of could be increased.
Recommended values
(Default value.)
DESCRIPTION
The telnet daemon uses two STREAMS-based pseudo-terminal drivers and The kernel parameter, can be used to tune the number of pseudo-termi-
nals. specifies the number of kernel data structures that are created at system boot time that are required to support the device files
used by incoming telnet sessions on a server. If the command or SAM is used to create more telnet device files, the value of must be
increased accordingly or the device files cannot be used because there are no kernel data structures available for communicating with the
system.
Who Is Expected to Change This Tunable?
Anyone.
Restrictions on Changing
Changes to this tunable take effect at the next reboot.
When Should the Value of This Tunable Be Raised?
When there is an increase in the load of telnet connections and there are no device files available to open telnet connections, then this
kernel parameter should be increased.
When the error is encountered, then the device files have been exhausted and should be raised. Once the value of is raised, should be run
to create new device files. (If SAM is used to raise the value of is run automatically.)
What Are the Side Effects of Raising the Value of This Tunable?
More resources would be consumed. Extra kernel data structures, and extra device files may clog the system.
When Should the Value of This Tunable Be Lowered?
It is not advisable to lower the tunable value from the default value. Consult HP Support before lowering this tunable from the default
value.
What Are the Side Effects of Lowering the Value of This Tunable?
Though not recommended, there would not be any side effects.
What Other Tunables Should Be Changed at the Same Time?
None.
WARNINGS
All HP-UX kernel tunable parameters are release specific. This parameter may be removed or have its meaning changed in future releases of
HP-UX.
Installation of optional kernel software, from HP or other vendors, may cause changes to tunable parameter values. After installation,
some tunable parameters may no longer be at the default or recommended values. For information about the effects of installation on tun-
able values, consult the documentation for the kernel software being installed. For information about optional kernel software that was
factory installed on your system, see at
AUTHOR
was developed by HP.
SEE ALSO
insf(1M), telnetd(1M), telm(7), tels(7).
Tunable Kernel Parameters nstrtel(5)