11-20-2012
What sort of network infrastrucutre is between: hubs, switches, routers, bridges, etc. ? The ping is just an ICMP echo and reply packet pair, and if intermittent, it seems like the network fabric is getting funny, like a bridge crashing and discarding all the ARP or MAC entries for both sides.
10 More Discussions You Might Find Interesting
1. Solaris
Ladies and Gentlemen:
I have successfully configured a Solaris 8 server with Jumpstart! I can Jumpstart Solaris 8 client systems with no problem. My configuration is as follows:
Jumpstart Server: Solaris 8 patched with Recommended Patches from June 05.
I have installed Solaris 8 in... (4 Replies)
Discussion started by: rambo15
4 Replies
2. Cybersecurity
The other day, a friend of mine had his Linux webserver compromised because he was running a vulnerable PHP-script. The "hacker" had used a malformed URL to include a wget-command to fetch some stuff off the net and install it in /dev/shm where it ran undetected. Fortunately, the webserver ran as a... (2 Replies)
Discussion started by: indo1144
2 Replies
3. UNIX for Dummies Questions & Answers
hi all ;;
I have a Tru64 UNIX machine , first i want my employees ( windows clients) to see specific directory on unix , and how can i put a unix command in a visual basic code to copy the contents of that directory to drive c in the client side who request that by clicking a push button.
... (3 Replies)
Discussion started by: kafaween
3 Replies
4. AIX
Good morning to all,
can someone advise me how to setup aix ntp server with aix & wintel clients?
Secondly, I also require to enable the service to autostart on reboot, how do I configure this?
Thirdly, how do I configure daily autosync between clients and server?
Please advice, thanks.... (0 Replies)
Discussion started by: chongkls77
0 Replies
5. AIX
I work for a fairly large organization who recently tasked me with securing our telnet services with IPsec. We have a large mixed environment where most of our servers are running unsecured telnet. ssh was my first suggestion but because of the cost of purchasing an enterprise license for a fips... (2 Replies)
Discussion started by: dgaixsysadm
2 Replies
6. UNIX for Advanced & Expert Users
Hello folks,
I have to conduct a demo session on bash scripting in any unix/linux distro to my colleagues (12 of them). Our company has not appointed a system administrator for linux. So I am seeking help from you all.
We only have thin clients running windows XP and are connected to a blade... (0 Replies)
Discussion started by: AnjaanFauji
0 Replies
7. UNIX for Dummies Questions & Answers
Hello folks,
I have to conduct a demo session on bash scripting in any unix/linux distro to my colleagues (12 of them). Our company has not appointed a system administrator for linux. So I am seeking help from you all.
We only have thin clients running windows XP and are connected to a blade... (1 Reply)
Discussion started by: AnjaanFauji
1 Replies
8. UNIX for Advanced & Expert Users
Hello;
I work now with a team which has based her "applications" on the following schema:
1 NFS client C1 (linux redhat 5) writes a file fic.dat on a NFS SERVER S (RH 5)
Another NFS client C2 is waiting for the same file fic.dat (on NFS server S1), and, when "fic.dat" appears, then makes... (8 Replies)
Discussion started by: SolarMax
8 Replies
9. Programming
Hello,
I have a question: I want to create a n client to one server connection. This is the client-server algorithm.
Enybody help to make the changes? (0 Replies)
Discussion started by: MaHmur
0 Replies
10. UNIX for Dummies Questions & Answers
Hello World,
We have a software repository server in our environment which we use as an NFS server.
Now this has been going on well before I was hired. Now, I observed many users not unmounting the NFS resources after their use. I ran showmount and it showed 513 current sessions.
:wall: Is... (7 Replies)
Discussion started by: satish51392111
7 Replies
LEARN ABOUT NETBSD
bridge
BRIDGE(4) BSD Kernel Interfaces Manual BRIDGE(4)
NAME
bridge -- network bridge device
SYNOPSIS
pseudo-device bridge
DESCRIPTION
The bridge driver creates a logical link between two or more IEEE 802 networks that use the same (or ``similar enough'') framing format. For
example, it is possible to bridge Ethernet and 802.11 networks together, but it is not possible to bridge Ethernet and Token Ring together.
To use bridge, the administrator must first create the interface and configure the bridge parameters. The bridge is created using the
ifconfig(8) create subcommand. The learning and forwarding behavior and other parameters of a bridge are configured by the brconfig(8) util-
ity.
A bridge can be used to provide several services, such as a simple 802.11-to-Ethernet bridge for wireless hosts, and traffic isolation.
A bridge works like a switch, forwarding traffic from one interface to another. Multicast and broadcast packets are always forwarded to all
interfaces that are part of the bridge. For unicast traffic, the bridge learns which MAC addresses are associated with which interfaces and
will forward the traffic selectively.
The bridge driver implements the IEEE 802.1D Spanning Tree protocol (STP). Spanning Tree is used to detect and remove loops in a network
topology.
Transparent filtering for IP and IPv6 packets can be added with the kernel configuration option options BRIDGE_IPF.
When filtering is enabled, bridged packets will pass through the filter inbound on the originating interface and outbound on the appropriate
interfaces. ARP and REVARP packets are forwarded without being filtered and others that are not IP nor IPv6 packets are not forwarded when
filtering is enabled.
Note that packets to and from the bridging host will be seen by the filter on the interface with the appropriate address configured as well
as on the interface on which the packet arrives or departs.
SEE ALSO
etherip(4), options(4), brconfig(8), ipf(8)
HISTORY
The bridge driver first appeared in NetBSD 1.6.
AUTHORS
The bridge driver was originally written by Jason L. Wright <jason@thought.net> as part of an undergraduate independent study at the Univer-
sity of North Carolina at Greensboro.
This version of the bridge driver has been heavily modified from the original version by Jason R. Thorpe <thorpej@wasabisystems.com>.
BUGS
The bridge driver currently supports only Ethernet and Ethernet-like (e.g. 802.11) network devices, with exactly the same interface MTU size
as the bridge device.
The bridge driver currently does not support snooping via bpf(4).
BSD
January 9, 2010 BSD