Sponsored Content
Top Forums UNIX for Beginners Questions & Answers Why inactive slave bonding received network package in redhat? Post 303037770 by gull04 on Tuesday 13th of August 2019 07:51:15 AM
Old 08-13-2019
Hi,

It's likely to be because of the link failures on eth0, where it will fail over to eth4.

Regards

Gull04
 

10 More Discussions You Might Find Interesting

1. HP-UX

Connecting To An External Network Using A logical (PACKAGE) IP Address

Hie everyone, I am currently facing a problem whereby I can not connect to an external network from a package ip address on a HP-UX cluster. Below is the illustration: Primary Server IP Address : n.n.n.202 Secondary Server IP Address : n.n.n.212 Package IP Address : n.n.n.211 ... (1 Reply)
Discussion started by: cchilenga
1 Replies

2. SCO

master and slave in lan network

hello , i setup a lan network , but i don't know how configure master and slave in the lan network please help me:confused: (2 Replies)
Discussion started by: hossein
2 Replies

3. Red Hat

how can i get open office package for Redhat Linux 5.0

Dear Team, Any body who have idea to down load the open office package for Redhat linux 5.0. Please send me the URL. so that i can easily down load from net. (2 Replies)
Discussion started by: sahu.tapan
2 Replies

4. Red Hat

Registro Redhat Network

Buenas, Tengo 3 sistemas registrados en redhat network; hace un mes modificamos las ip's de los mismos pero en redhat network igue poniendo las antiguas. Como puedo modificarlas? tengo q registrar los sistemas de nuevo? Otra cosilla, he intentado actualizar packages y erratas: en actualizar ahora... (4 Replies)
Discussion started by: fuentepinel
4 Replies

5. Red Hat

Shutdown server when network inactive

I was referring script to shutdown server from local interface ubuntuforums.org/archive/index.php/t-2017336.html. This is scheduled in CRON. It will run every 20 minutes and check for inactivity. It compares the RX and TX packets from 20 minutes ago to detect if they significantly increased. If... (0 Replies)
Discussion started by: sanjaymp
0 Replies

6. UNIX for Dummies Questions & Answers

Redhat - network question

Hi, I am on Redhat 5. on the /etc/sysconfig/network file I don't see GATEWAY as one line. I also checked /etc/sysconfig/network-scripts/ifcfg-eth0. I don't see GATEWAY. But on the server. But when I do netstat -rn. I see many address. Is there some other settings ? ... (2 Replies)
Discussion started by: samnyc
2 Replies

7. IP Networking

Is bond0 ready and a bonding interface? - 4G Bonding Router Problems (RPI)

HI all, First post on the forum, and my first proper project on the Paspberry Pi, so sorry if this is in the wrong place. I am trying to turn my Pi in to a 3G/4G Bonding router. I have been researching and trying this for a week or so now. The basic plan is to have up to 6 ZTE MF823 USB... (0 Replies)
Discussion started by: elliottlc
0 Replies

8. Red Hat

Network Bonding Issue

I have one production system where my customized application runs.The applications require seamless network connectivity with different machines connected in LAN and WAN. As these applications are very critical, it is very much required to have a seamless network activity.The applications are... (4 Replies)
Discussion started by: Anjan Ganguly
4 Replies

9. Red Hat

Network bonding

Dear All , Very recently we have configured Network bonding in our Linux Server Redhat Linux 5.x. After configuring , we restarted the network services , the link was down after that , we could not login in to the Server. So after that , we logged in to console and tried to... (2 Replies)
Discussion started by: jegaraman
2 Replies

10. UNIX for Advanced & Expert Users

Redhat check when package was updated

Is there a way to check when a package was updated on your redhat system? (2 Replies)
Discussion started by: cokedude
2 Replies
NE_SSL_SET_VERIFY(3)						neon API reference					      NE_SSL_SET_VERIFY(3)

NAME
ne_ssl_set_verify - register an SSL certificate verification callback SYNOPSIS
#include <ne_session.h> typedef int (*ne_ssl_verify_fn) (void *userdata, int failures, const ne_ssl_certificate *cert); void ne_ssl_set_verify (ne_session *session, ne_ssl_verify_fn verify_fn, void *userdata); DESCRIPTION
To enable manual SSL certificate verification, a callback can be registered using ne_ssl_set_verify. If such a callback is not registered, when a connection is established to an SSL server which does not present a certificate signed by a trusted CA (see ne_ssl_load_ca(3)), or if the certificate presented is invalid in some way, the connection will fail. When the callback is invoked, the failures parameter gives a bitmask indicating in what way the automatic certificate verification failed. The value is equal to the bit-wise OR of one or more of the following constants (and is guaranteed to be non-zero): NE_SSL_NOTYETVALID The certificate is not yet valid. NE_SSL_EXPIRED The certificate has expired. NE_SSL_CNMISMATCH The hostname used for the session does not match the hostname to which the certificate was issued: this could mean that the connec- tion has been intercepted. NE_SSL_UNKNOWNCA The Certificate Authority which signed the certificate is not trusted. The cert parameter passed to the callback describes the certificate which was presented by the server, see ne_ssl_certificate(3) for more details. The certificate object given is only valid until the callback returns. RETURN VALUE
The verification callback must return zero to indicate that the certificate should be trusted; and non-zero otherwise (in which case, the connection will fail). EXAMPLES
Manual certificate verification: static int my_verify(void *userdata, int failures, const ne_ssl_certificate *cert) { /* leak the return values of ne_ssl_readable_dname for simplicity! */ printf("Issuer: %s ", ne_ssl_readable_dname(cert->issuer); printf("Subject: %s ", ne_ssl_readable_dname(cert->subject); if (failures & NE_SSL_CNMISMATCH) { printf("Server certificate was issued to `%s'; " "connection may have been intercepted! ", cert->subject->commonName); } if (failures & NE_SSL_EXPIRED) { printf("Server certificate expired on %s!", cert->until); } /* ... check for other failures ... */ if (prompt_user()) return 1; /* fail verification */ else return 0; /* trust certificate */ } int main(...) { ne_session *sess = ne_session_create("https", "some.host.name", 443); ne_ssl_set_verify(sess, my_verify, NULL); ... } SEE ALSO
ne_ssl_certificate(3), ne_ssl_load_ca(3), ne_ssl_dname(3), ne_ssl_readable_dname(3) AUTHOR
Joe Orton <neon@webdav.org>. neon 0.23.5 8 October 2002 NE_SSL_SET_VERIFY(3)
All times are GMT -4. The time now is 06:45 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy