Sponsored Content
Operating Systems Solaris SUNW, hme0: Link Down - Cable problem Post 302328936 by AlSmith1964 on Thursday 25th of June 2009 01:26:04 PM
Old 06-25-2009
excellent, will do. There is definitely no other interface when plumbing, unless you count le0?
 

10 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

hme0 babble -- ?

Dear Reader, I have a very unique problem. Quite often my on board ethernet port( hme0 ) related message is appearing in /var/adm/messages. The message is hme0: babble.. The port is up and alive. What does this message mean.. Is the on board port is about to fail?? Thanks in advance, (2 Replies)
Discussion started by: joseph_shibu
2 Replies

2. UNIX for Advanced & Expert Users

Hme0 interfaces...

How do you configure more than one network on a single hme0 interface under SunOS? And why would you want to do this? Thanx :) -Michelle (1 Reply)
Discussion started by: Michelle1977
1 Replies

3. BSD

cable modem problem

hi I want to setup my cable modem under OpenBSD. I did not configure my network while installing the system. When I type, I get # ifconfig -a lo0 : .... ... ... rl0 : .... ... ... vr0 : ... ... ... I have two network cards (the machine will be a router). I created... (1 Reply)
Discussion started by: fnoyan
1 Replies

4. Solaris

Is the cable you are using a null modem cable or a modem cable

Hi all, Is there any difference between a null modem cable or a modem cable ? i assume that a null modem cable is a normal cable that i used from cpu serial ports to a modem for dialup. please correct if i am wrong, thks (2 Replies)
Discussion started by: waterbear
2 Replies

5. Solaris

hme0 problem after reboot

Hi ..... My problem is that when i reboot the system i can't connect to the network because my ethernet ( hme0 ) is down , i must up it by ifconfig command after reboot : # ifconfig -a lo0: flags=1000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4> mtu 8232 index 1 inet 127.0.0.1 netmask... (1 Reply)
Discussion started by: tt155
1 Replies

6. Solaris

sun 420r hme0 not responding

I have a 420r server it boots up all of the network settings are correct, however the machines network connection is not working. Cant ping anything from it, cant ping it from another machine on the network. If I ping 127.0.0.1 it says alive. Is there a chance the network card has been... (2 Replies)
Discussion started by: alanj4
2 Replies

7. Solaris

cannot telnet/ftp to solaris machine by straight cable makes problem ..

Hi All, 1. modify /etc/default/login file as make commented # console= 2.put my laptops ip at both /etc/inet/ipnodes and /etc/host file still i can login via telnet/ftp through a DB9-serial cable, but when i tried through a lan stratight cable directly connected that machine... (7 Replies)
Discussion started by: mahadib
7 Replies

8. Solaris

what is going on with SUNW.HAStoragePlus?!!!!!

Hi all, really interesting thing I have encountered . So : root@host4 # uname -a SunOS host4 5.9 Generic_122300-31 sun4u sparc SUNW,Sun-Fire-880 root@host4 # scinstall -p 3.2 latest recommended patches applied ..all SUN cluster patches applied. SUN cluster software installed without... (2 Replies)
Discussion started by: samar
2 Replies

9. Solaris

Cable link down

We are unable to ping from Sun Ultra 60 to Ultra 10 machine and vice versa. We are getting an error message Cable Link Down ?. It was working fine. Troubleshooting steps taken. 1) Changed the IPaddresses on both machines 192.168.10.10 and 192.168.10.20. These machines connected through 8 port... (2 Replies)
Discussion started by: vijaykrishna
2 Replies

10. Red Hat

Different hostnames with reboot while lan cable, no lan cable

I am facing strange problem regarding hostname on my Linux(2.6.18-164.el5xen x86_64 GNU/Linux), the hostname changes if reboot with lan cable and with NO lan cable Reboot with lan cable: The hostname is ubunut Unable to connect Oracle database using sqlplus some times database is not... (2 Replies)
Discussion started by: LinuxLearner
2 Replies
ipftest(1)						      General Commands Manual							ipftest(1)

NAME
ipftest - test packet filter rules with arbitrary input. SYNOPSIS
ipftest [ -6bCdDoRvx ] [ -F input-format ] [ -i <filename> ] [ -I interface ] [ -l <filename> ] [ -N <filename> ] [ -P <filename> ] [ -r <filename> ] [ -S <ip_address> ] [ -T <optionlist> ] DESCRIPTION
ipftest is provided for the purpose of being able to test a set of filter rules without having to put them in place, in operation and pro- ceed to test their effectiveness. The hope is that this minimises disruptions in providing a secure IP environment. ipftest will parse any standard ruleset for use with ipf, ipnat and/or ippool and apply input, returning output as to the result. However, ipftest will return one of three values for packets passed through the filter: pass, block or nomatch. This is intended to give the opera- tor a better idea of what is happening with packets passing through their filter ruleset. At least one of -N, -P or -r must be specified. OPTIONS
-6 Use IPv6. -b Cause the output to be a brief summary (one-word) of the result of passing the packet through the filter; either "pass", "block" or "nomatch". This is used in the regression testing. -C Force the checksums to be (re)calculated for all packets being input into ipftest. This may be necessary if pcap files from tcpdump are being fed in where there are partial checksums present due to hardware offloading. -d Turn on filter rule debugging. Currently, this only shows you what caused the rule to not match in the IP header checking (addresses/netmasks, etc). -D Dump internal tables before exiting. This excludes log messages. -F This option is used to select which input format the input file is in. The following formats are available: etherfind, hex, pcap, snoop, tcpdump,text. etherfind The input file is to be text output from etherfind. The text formats which are currently supported are those which result from the following etherfind option combinations: etherfind -n etherfind -n -t hex The input file is to be hex digits, representing the binary makeup of the packet. No length correction is made, if an incor- rect length is put in the IP header. A packet may be broken up over several lines of hex digits, a blank line indicating the end of the packet. It is possible to specify both the interface name and direction of the packet (for filtering purposes) at the start of the line using this format: [direction,interface] To define a packet going in on le0, we would use [in,le0] - the []'s are required and part of the input syntax. pcap The input file specified by -i is a binary file produced using libpcap (i.e., tcpdump version 3). Packets are read from this file as being input (for rule purposes). An interface maybe specified using -I. snoop The input file is to be in "snoop" format (see RFC 1761). Packets are read from this file and used as input from any inter- face. This is perhaps the most useful input type, currently. tcpdump The input file is to be text output from tcpdump. The text formats which are currently supported are those which result from the following tcpdump option combinations: tcpdump -n tcpdump -nq tcpdump -nqt tcpdump -nqtt tcpdump -nqte text The input file is in ipftest text input format. This is the default if no -F argument is specified. The format used is as follows: "in"|"out" "on" if ["tcp"|"udp"|"icmp"] srchost[,srcport] dsthost[,destport] [FSRPAU] This allows for a packet going "in" or "out" of an interface (if) to be generated, being one of the three main protocols (option- ally), and if either TCP or UDP, a port parameter is also expected. If TCP is selected, it is possible to (optionally) supply TCP flags at the end. Some examples are: # a UDP packet coming in on le0 in on le0 udp 10.1.1.1,2210 10.2.1.5,23 # an IP packet coming in on le0 from localhost - hmm :) in on le0 localhost 10.4.12.1 # a TCP packet going out of le0 with the SYN flag set. out on le0 tcp 10.4.12.1,2245 10.1.1.1,23 S -i <filename> Specify the filename from which to take input. Default is stdin. -I <interface> Set the interface name (used in rule matching) to be the name supplied. This is useful where it is not otherwise possible to asso- ciate a packet with an interface. Normal "text packets" can override this setting. -l <filename> Dump log messages generated during testing to the specified file. -N <filename> Specify the filename from which to read NAT rules in ipnat(5) format. -o Save output packets that would have been written to each interface in a file /tmp/interface_name in raw format. -P <filename> Read IP pool configuration information in ippool(5) format from the specified file. -r <filename> Specify the filename from which to read filter rules in ipf(5) format. -R Don't attempt to convert IP addresses to hostnames. -S <ip_address> The IP address specifived with this option is used by ipftest to determine whether a packet should be treated as "input" or "out- put". If the source address in an IP packet matches then it is considered to be inbound. If it does not match then it is consid- ered to be outbound. This is primarily for use with tcpdump (pcap) files where there is no in/out information saved with each packet. -T <optionlist> This option simulates the run-time changing of IPFilter kernel variables available with the -T option of ipf. The optionlist param- eter is a comma separated list of tuning commands. A tuning command is either "list" (retrieve a list of all variables in the ker- nel, their maximum, minimum and current value), a single variable name (retrieve its current value) and a variable name with a fol- lowing assignment to set a new value. See ipf(8) for examples. -v Verbose mode. This provides more information about which parts of rule matching the input packet passes and fails. -x Print a hex dump of each packet before printing the decoded contents. SEE ALSO
ipf(5), ipf(8), snoop(1m), tcpdump(8), etherfind(8c) BUGS
Not all of the input formats are sufficiently capable of introducing a wide enough variety of packets for them to be all useful in testing. ipftest(1)
All times are GMT -4. The time now is 08:15 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy