Sponsored Content
Full Discussion: CAPWAP implementation
Operating Systems Linux CAPWAP implementation Post 302552679 by ran789 on Monday 5th of September 2011 06:00:10 AM
Old 09-05-2011
CAPWAP implementation

Hi
I'm trying to implement CAPWAP protocol for my application.i'm able to configure my server side but i'm getting error at client(WTP) side as IOCTL error.while running the command
Code:
                                 #./WTP /mnt/cf/capwap/ 



  : wlan2  
  Starting WTP...  
 [Admin@MTM6 capwap]#  WTP Loads Configuration  
  </WTP_FORCE_MTU>1500  
  </AC_LOG_FILE_ENABLE>1  
  </AC_LOG_FILE_SIZE>30000000  
  WTPDriverInteraction.c 230 Ioctl error Error Init Configuration








please anyone help me how to debug it.i'm using open source code.i have changed the interface wl0 to my interface of WTP




Thank you

Last edited by pludi; 09-05-2011 at 07:07 AM..
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Shell Implementation

I want to implement my own simple multi tasking shell in Unix which will take care of redirection (<, >, >>) and piping. I am just unable to get a concrete idea of how exactly I have to start. I have several books...some are.. 1. Maurice Bach- Design Of Unix Operating System 2. Richard... (3 Replies)
Discussion started by: clickonline1
3 Replies

2. UNIX for Advanced & Expert Users

Implementation of ls - i command

It is possible for me to obtain the Inode of the path name using ls -i <pathname> command Can anyone tell me how its implemented... (3 Replies)
Discussion started by: ganapathy.psgit
3 Replies

3. Shell Programming and Scripting

Need help on AWK implementation

Hi, I am accepting a string from user. compare this output with the awk output as below... echo "\n\n\tDay : \c" read day awk '{ if($day == $2) { if ($mon == $1) { print "Yes" }}}' syslog.txt I am getting the follwoing error awk: Field $() is not correct. The input line... (5 Replies)
Discussion started by: EmbedUX
5 Replies

4. Programming

Malloc implementation in C

Hey Guys I am trying to implement the malloc function for my OS class and I am having a little trouble with it. I would be really grateful if I could get some hints on this problem. So I am using a doubly-linked list as my data structure and I have to allocate memory for it (duh...). The... (1 Reply)
Discussion started by: Gambit_b
1 Replies

5. UNIX for Advanced & Expert Users

Malloc Implementation in C

Hey Guys Some of my friends have got together and we are trying to write a basic kernel similar to Linux. I am trying to implement the malloc function in C and I am using a doubly linked list as the primary data structure. I need to allocate memory for this link list (duh...) and I don't feel... (2 Replies)
Discussion started by: rbansal2
2 Replies

6. Programming

Implementation of dup2

Hi all,I'm reading <Advanced programming in the UNIX environment>,that book asked the reader to implement a function which has same functions with dup2 without calling fcntl.Could anyone give me a tip?Any help will be appreciated.:) (8 Replies)
Discussion started by: homeboy
8 Replies

7. UNIX for Dummies Questions & Answers

Lseek implementation

Hi everybody, i've been googling for ages now and gotten kinda desperate... The question, however, might be rather trivial for the experts: What is it exactly, i.e. physically, the POSIX function (for a file) "lseek" does? Does it trigger some kind of synchronization on disk? Is it just for the... (4 Replies)
Discussion started by: Humudituu
4 Replies

8. UNIX for Advanced & Expert Users

Ipsec implementation

How can i implement Ipsec between two machines in linux_ ubuntu? any link?? suggestion?? (0 Replies)
Discussion started by: elinaz
0 Replies

9. Shell Programming and Scripting

Back up implementation

Is there any command to take create back up of a file as soon as when it is created?If not is it possible to create something like that? (3 Replies)
Discussion started by: Sindhu R
3 Replies

10. Programming

C: CSV implementation

I have this code from a programming book: #include <stdio.h> #include <string.h> char buf; /* input line buffer */ char* field; /* fields */ char* unquote( char* ); /* csvgetline: read and parse line, return field count */ /* sample input:... (3 Replies)
Discussion started by: totoro125
3 Replies
kcweb(1M)																 kcweb(1M)

NAME
kcweb - starts the HP-UX kernel configuration tool (a Web interface) SYNOPSIS
[ ] [ ] DESCRIPTION
The HP-UX Kernel Configuration tool ( ) is used to manage kernel tunables, modules and alarms. The HP-UX Kernel Configuration tool provides both Web-based and terminal user interface. The Web-based interface is launched through the HP System Management Homepage. Superuser privileges are required to access the HP-UX Kernel Configuration tool. A user who does not have superuser privileges has read- only access to the Tunables, Modules and Alarms area in the HP-UX Kernel Configuration tool and cannot modify kernel tunables, modules, alarms or reboot the system. An attempt will be made to connect to a Mozilla/Netscape Web browser running on the X server defined by the DISPLAY environment variable. If a running Mozilla/Netscape client is found, it will be used, otherwise a new Mozilla/Netscape session will be initiated. This will only happen if the Mozilla/Netscape process is running in the same system as that referenced by the DISPLAY variable, unless the -F option is used. Note: By default, the HP-UX kernel configuration tool (kcweb) invokes the Mozilla Web browser. If you want to support any other browser (Netscape), set the $BROWSER environment variable as shown below: The terminal user interface is invoked if any of the following conditions are true: o The command is invoked with the option. o The environment variable is not set. The Web-based interface is launched if all the following conditions are true: o The command is invoked with option. o The environment variable is set. o The command is available on the system. If the Web-based interface cannot be launched, invokes the terminal user interface. Options recognizes the following options: Forces a client browser to be used in less secure ways. The option forces the client browser to be used or started, even when the X-traffic between the X-server and the Mozilla browser is not secure. Use this option only when you are sure the network traffic between the host where Mozilla is running and the host in the DISPLAY variable is secure. If cannot start the Web browser, the terminal interface is started. When the HP-UX Kernel Configuration Web interface is invoked by SAM, the option is used. If a privileged user (root) executes the command with the option, a temporary login bypass key is generated. The bypass key enables the user to access the Web interface without having to provide login information again. When the HP-UX Kernel Configuration Web interface is invoked by SAM, the option is used. Opens the terminal interface for managing kernel tunables, modules and alarms regardless of the current setting of the environment variable. You can also start the HP-UX Kernel Configuration tool using one of the following methods: o Invoke and select the Kernel Configuration (character mode) functional area to launch the terminal user interface and the Kernel Configuration (Web-based Interface) to launch the Web-based tool o Invoke the HP-UX Kernel Configuration tool Web interface by typing the URL in the address bar of your browser, where hostname is the name of the server o Launch the HP-UX Systems Insight Manager on the server and select the Kernel Configuration tool from the Configure -> HP-UX Con- figuration menu Online Help After the HP-UX Kernel Configuration tool is started, the online help provides details on how to use the tool. RETURN VALUES
Upon completion, kcweb returns one of the following values: o 0 Successful o 1 An error occurred AUTHOR
was developed by Hewlett-Packard. SEE ALSO
kctune(1M), kcalarm(1M), kcusage(1M), kclog(1M), kcmond(1M), kcmodule(1M) kcweb(1M)
All times are GMT -4. The time now is 02:31 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy