11-09-2008
Usually when ssh/telnet does not respond in a timely fashion, then it is usually pointing to the network configuration.
Check:
1. netmask
2. network speed and plex settings on both NIC and Switch side
3. switch side lost or request for duplicate packets
4. Return route between the client and server, if there are 2 routes which are taken then it is routing issue on your server or router end.
-GGR
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
I have a file called "library" with the following content
libnxrdbmgr.a
libnxrdbmgr.so
libnxtk.a
libnxtk.so
libora0d_nsc_osi.so
I am trying to locate if these libraries are on my machine or not. find command runs for about few seconds and hangs after this.
Can someone please help me and... (3 Replies)
Discussion started by: knijjar
3 Replies
2. Solaris
getting delayed to connect to my database in solaris
Does anyone help me to get out of this issue
help will be more appreciated. (2 Replies)
Discussion started by: Gods_help
2 Replies
3. Shell Programming and Scripting
Dear experts
I have a 200MG text file in this format:
text \tab number
I try to sort using options -fd and it takes very long! is that normal or I can speed it up in some ways?
I dont want to split the file since this one is already splitted.
I use this command: sort -fd file >... (12 Replies)
Discussion started by: voolek
12 Replies
4. UNIX for Advanced & Expert Users
Hi,
I am running the following command, and it tries to delete some dn from ldap, however, it takes lot of time before it finally request LDAP server to delete it.
I am trying to find why it is taking lot of time. Could you anyone help me in this regard. I have copies the pstack output, and... (3 Replies)
Discussion started by: john_prince
3 Replies
5. Red Hat
When I am trying to login to a server using Putty ssh from my windows xp machine it is taking too much time for login.
My server name is http2 and when I enter this address into putty I immediately get
login as:
screen, but after I put my username root and enter the cursor moves downwards... (14 Replies)
Discussion started by: abhilashkrishn
14 Replies
6. AIX
telnet or rsh or ftp to an AIX machine takes too much time, like have to wait 3 minutes before the prompt appears.
What can I look to troubleshoot this problem
thanks (4 Replies)
Discussion started by: filosophizer
4 Replies
7. UNIX for Advanced & Expert Users
Hi everybody,
I am running a program on a supercomputer via my personal computer through a ssh connection. My program take more than a day to run, so when I left work with my PC I stop the connection with the supercomputer and the program stop.
I am wondering if someone know how I can manage... (2 Replies)
Discussion started by: TomTomGre
2 Replies
8. AIX
Hi,
i am seeing some strange things on a lpar which we have at this moment.
With nmon i see a process aix_timeout_thread which is using lots of cpu (70-80%, all cpu which is "free" is used). This is a kernel process (for as far i can find out) but i am wondering what is causing this to happen... (5 Replies)
Discussion started by: aixvinnie
5 Replies
9. Shell Programming and Scripting
Hi,
I am running a ssh connection test in a script, how can I add a timeout to abolish the process if it takes too long?
ssh -i ~/.ssh/ssl_key useraccount@computer1
Thank you.
- j (1 Reply)
Discussion started by: hce
1 Replies
10. UNIX for Beginners Questions & Answers
Hi,
I want to validate ssh connection one after one for multiple servers..... password less keys already setup but now i want to validate if ssh is working fine or not...
I have .sh script like below and i have servers.txt contains all the list of servers
#/bin/bash
for host in $(cat... (3 Replies)
Discussion started by: sreeram4
3 Replies
LEARN ABOUT SUSE
ssh-copy-id
SSH-COPY-ID(1) General Commands Manual SSH-COPY-ID(1)
NAME
ssh-copy-id - install your public key in a remote machine's authorized_keys
SYNOPSIS
ssh-copy-id [-i [identity_file]] [user@]machine
DESCRIPTION
ssh-copy-id is a script that uses ssh to log into a remote machine (presumably using a login password, so password authentication should be
enabled, unless you've done some clever use of multiple identities)
It also changes the permissions of the remote user's home, ~/.ssh, and ~/.ssh/authorized_keys to remove group writability (which would oth-
erwise prevent you from logging in, if the remote sshd has StrictModes set in its configuration).
If the -i option is given then the identity file (defaults to ~/.ssh/id_rsa.pub) is used, regardless of whether there are any keys in your
ssh-agent. Otherwise, if this:
ssh-add -L
provides any output, it uses that in preference to the identity file.
If the -i option is used, or the ssh-add produced no output, then it uses the contents of the identity file. Once it has one or more fin-
gerprints (by whatever means) it uses ssh to append them to ~/.ssh/authorized_keys on the remote machine (creating the file, and directory,
if necessary)
SEE ALSO
ssh(1), ssh-agent(1), sshd(8)
OpenSSH 14 November 1999 SSH-COPY-ID(1)