Sponsored Content
Operating Systems Solaris Large number of ulcm_sctp messages Post 303039183 by ron323232 on Wednesday 25th of September 2019 01:08:45 PM
Old 09-25-2019
Oh.. I was about to throw it to application team.

I tried to understand from pages mentioned by you, but I am not getting clue, what must be failing. Here is config for this server, if you can see something helpful and suggest.
Code:
bash-3.2# ps -ef | grep -i ulcm
    root  1417     1   0   Mar 21 ?        7463:54 /opt/ulcm/bin/DFdaemon
    root  1420     1   0   Mar 21 ?           1:13 /usr/sbin/sctpd -omni_home /opt/ulcm
    root 29870     1   0   Dec 06 ?         238:58 /opt/ulcm/bin/slan /opt/ulcm/conf/slan.cf -sctp
  appadm 20326     1   0   Apr 18 ?         732:09 /bin/bash -p /opt/ulcm/bin/go.omni
    root 29929     1   0   Dec 06 ?          91:28 /opt/ulcm/bin/port_daemon -f portConf.100
    root 23587 23567   0 10:00:25 pts/2       0:00 grep -i ulcm
  appadm 21062 20326   0   Apr 18 ?           0:00 /opt/ulcm/bin/nrplinker
bash-3.2# cat /opt/ulcm/conf/slan.cf
dpserv-icp1-prod dpserv-icp2-prod none
dpserv-icp2-prod none dpserv-icp1-prod
bash-3.2#
bash-3.2# ifconfig -a
lo0: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL> mtu 8232 index 1
        inet 127.0.0.1 netmask ff000000
e1000g0: flags=9040843<UP,BROADCAST,RUNNING,MULTICAST,DEPRECATED,IPv4,NOFAILOVER> mtu 1500 index 2
        inet 172.30.68.208 netmask fffffe00 broadcast 172.30.69.255
        groupname data
        ether 0:21:28:44:7:d6
e1000g0:1: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 2
        inet 172.30.64.208 netmask ffffff00 broadcast 172.30.64.255
e1000g1: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 3
        inet 172.30.96.208 netmask ffffff00 broadcast 172.30.96.255
        ether 0:21:28:44:7:d7
e1000g3: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 4
        inet 1.1.1.1 netmask fffffffc broadcast 1.1.1.3
        ether 0:21:28:44:7:d9
nxge3: flags=69040843<UP,BROADCAST,RUNNING,MULTICAST,DEPRECATED,IPv4,NOFAILOVER,STANDBY,INACTIVE> mtu 1500 index 5
        inet 172.30.69.208 netmask fffffe00 broadcast 172.30.69.255
        groupname data
        ether 0:21:28:4b:57:31
bash-3.2# netstat -nr

Routing Table: IPv4
  Destination           Gateway           Flags  Ref     Use     Interface
-------------------- -------------------- ----- ----- ---------- ---------
default              172.30.64.1          UG        1    6624951
1.1.1.0              1.1.1.1              U         1      51480 e1000g3
10.0.0.0             172.30.96.1          UG        1      42652
172.30.64.0          172.30.64.208        U         1        126 e1000g0:1
172.30.68.0          172.30.69.208        U         1       9550 e1000g0
172.30.68.0          172.30.69.208        U         1       9629 nxge3
172.30.68.210        172.30.68.210        UGH       1         20
172.30.68.211        172.30.68.211        UGH       1          0
172.30.68.212        172.30.68.212        UGH       1          1
172.30.69.210        172.30.69.210        UGH       1          1
172.30.69.211        172.30.69.211        UGH       1          1
172.30.69.212        172.30.69.212        UGH       1          1
172.30.96.0          172.30.96.208        U         1      35786 e1000g1
172.30.96.0          172.30.96.1          UG        1        300
172.30.99.0          172.30.96.1          UG        1     100602
172.30.160.0         172.30.96.1          UG        1          0
192.168.64.0         172.30.96.1          UG        1        738
192.168.110.0        172.30.96.1          UG        1        396
192.168.115.0        172.30.96.1          UG        1          0
192.168.201.0        172.30.96.1          UG        1          0
192.168.202.0        172.30.96.1          UG        1          0
224.0.0.0            172.30.64.208        U         1          0 e1000g0:1
127.0.0.1            127.0.0.1            UH       53   78379273 lo0
bash-3.2#

 

10 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

moving large number of files

I have a task to move more than 35000 files every two hours, from the same directory to another directory based on a file that has the list of filenames I tried the following logics (1) find . -name \*.dat > list for i in `cat list` do mv $i test/ done (2) cat list|xargs -i mv "{}"... (7 Replies)
Discussion started by: bryan
7 Replies

2. Shell Programming and Scripting

remove a large number of user from oracle

Hi on solaris and oracle 10g2, I have number of users created in Oracle, I wonder if I have a list of the usernames will it be possible to remove the users quickly ? I want to keep the users access to system but oracle. some thing like shell script may be ?:confused: I am trying to... (4 Replies)
Discussion started by: upengan78
4 Replies

3. UNIX for Dummies Questions & Answers

questing regarding tar large number of files

I want to tar large number of files about 150k. i am using the find command as below to create a file with all file names. & then trying to use the tar -I command as below. # find . -type f -name "gpi*" > include-file # tar -I include-file -cvf newfile.tar This i got from one of the posts... (2 Replies)
Discussion started by: crux123
2 Replies

4. Shell Programming and Scripting

Concatenation of a large number of files

Hellow i have a large number of files that i want to concatenate to one. these files start with the word 'VOICE_' for example VOICE_0000000000 VOICE_1223o23u0 VOICE_934934927349 I use the following code: cat /ODS/prepaid/CDR_FLOW/MEDIATION/VOICE_* >> /ODS/prepaid/CDR_FLOW/WORK/VOICE ... (10 Replies)
Discussion started by: chriss_58
10 Replies

5. UNIX for Dummies Questions & Answers

Delete large number of files

Hi. I need to delete a large number of files listed in a txt file. There are over 90000 files in the list. Some of the directory names and some of the file names do have spaces in them. In the file, each line is a full path to a file: /path/to/the files/file1 /path/to/some other/files/file 2... (4 Replies)
Discussion started by: inakajin
4 Replies

6. Shell Programming and Scripting

Using find in a directory containing large number of files

Hi All, I have searched this forum for related posts but could not find one that fits mine. I have a shell script which removes all the XML tags including the text inside the tags from some 4 million XML files. The shell script looks like this (MODIFIED): find . "*.xml" -print | while read... (6 Replies)
Discussion started by: shoaibjameel123
6 Replies

7. Shell Programming and Scripting

Copying number by looking a large file

Hi All, I have a big file which looks like this: abc 34.32 cdf 343.45 computer 1.34 ladder 2.3422 I have some 100000 .TXT files which look like this: computer cdf align I have to open each of the text files and read the words from the text files. Then I have to look into that... (2 Replies)
Discussion started by: shoaibjameel123
2 Replies

8. UNIX for Dummies Questions & Answers

Rename a large number of files in subdirectories

Hi, I have a large number of subdirectories (>200), and in each of these directories there is a file with a name like "opp1234.dat". I'd like to know how I could change the names of these files to say "out.dat" in all these subdirectories in one go. Thanks! (5 Replies)
Discussion started by: lost.identity
5 Replies

9. Shell Programming and Scripting

Sftp large number of files

Want to sftp large number of files ... approx 150 files will come to server every minute. (AIX box) Also need make sure file has been sftped successfully... Please let me know : 1. What is the best / faster way to transfer files? 2. should I use batch option -b so that connectivity will be... (3 Replies)
Discussion started by: vegasluxor
3 Replies

10. Shell Programming and Scripting

Removing large number of temp files

Hi All, I am having a situation now to delete a huge number of temp files created during run times approx. 16700+ files. We have never imagined that we will get this this much big list of files during run time. It worked fine for lesser no of files in the list. But when list is huge we are... (7 Replies)
Discussion started by: mad man
7 Replies
RACOON-TOOL.CONF(5)						File Formats Manual					       RACOON-TOOL.CONF(5)

NAME
racoon-tool.conf - configuration file for racoon-tool(8). DESCRIPTION
This manual page documents briefly the racoon-tool.conf(5), configuration file format. Please consult the racoon.conf(5) man-page first to better understand what is written about here. SYNTAX
The racoon-tool.conf(5) file is laid out in sections. Comments are delimited on the left by `#', and can be on a line by themselves, or at the end of a line. The possible sections are global, connection, and peer. The possible templates are spdadd, spdadd_transport_ip4, spdadd_transport_ip6, spdinit, sadinit, sadadd, remote, sainfo, and racooninit. Sections start with section: and then continue with their properties (name terminated by `:' then value), and templates ALWAYS have to have each line started with template: Sections and templates can be named, with the name occurring in parenthesis between the last character of their type and the final colon. SECTIONS
The possible sections are: global: Contains global parameters for the generated racoon.conf(5), and global settings used by racoon-tool(8). Available settings are: path_pre_shared_key, path_certificate, path_racoon_conf, privsep, privsep_chroot, privsep_user, privsep_group, racoon_command, racoon_pid_file, log, listen[[0-9a-z]], and complex_bundle. Apart from racoon_command, and racoon_pid_file, the setting map across to the similar names in racoon.conf(5). These items privsep, privsep_chroot, privsep_user, privsep_group, are related to the privsep section in racoon.conf(5) Privsep is a boolean option to turn on privilege separation. The default is to chroot to '/', as quite a bit of setup is required in the chroot directory. The listen directive is a bit different from the man-page and takes multiple {ip-address} [[port]] statements by attaching an index `0-9',`a-z' in square brackets immediately before the colon. connection(%default|%anonymous|[-_a-z0-9]+): Connection as described by the complementary SPD entries. Creates `sainfo' sections in the generated racoon.conf(5), and associated SPD entries. Directives and values are basically one for one with the relevant entries in racoon.conf(5). Spdadd: can be used to override the template automatically selected. The templates that are automatically selected depending om connection mode and IPv4 or IPv6 addresssing are spdadd, spdadd_transport_ip4, and spdadd_transport_ip6. The supplied default transport mode templates do not encrypt ICMP as this can easily result in SPD policy difficulties. Boolean parameters auto_ah_on_esp, always_ah_on_esp can be used to add AH encapsulation to the `esp' mode transform supplied by the default spdadd templates. The IKE phase 2 identifier type can be set with the id_type option, either `address' or `subnet'. Compression can be added to the default transforms by using the com- pression boolean. Multiple SPD rule pairs can be entered in place of the pair supplied by the default spdadd templates. They are signified by adding an index made up from the characters (case-insensitive) in the regular expression `[-_0-9a-z]+' to the src_port, and/or dst_port entries, within square brackets immediately before the colon. Only one port needs to be defined, with the other defaulting to `[any]'. Additional properties for the rule pair can be given by encap, and policy entries, with the appropriate index entry in square brackets before the colon. Please note that on the FreeBSD kernel ( ipsec(4) ) nested ipsec policy transforms are not supported, and that ipcomp is buggy. The `%default' VPN connection fills in entries in other specified connections, unless they are otherwise defined within the specific connection. The `%anonymous' connection is there for a passive VPN server. peer(%default|%anonymous|[a-f0-9:.]+): Defines the phase 1 attributes associated with a peer. This creates `remote' entries in the generated racoon.conf(5). Directives and values are basically one for one with the relevant entries in racoon.conf(5). Different proposals are signified by adding an index `0-9', `a-z', or made up from characters (case-insensitive) in the regular expression `[-_0-9a-z]+' to the encryp- tion_algorithm, hash_algorithm, dh_group, and authentication_method entries, within square brackets immediately before the colon. The `%default' VPN connection fills in entries in other specified connections, unless they are otherwise defined within the specific connection. The `%anonymous' connection is there for a passive VPN server. TEMPLATES
Templates are described briefly here. You will have to look inside the racoon-tool(8) perl script to see exactly what you can do. spdinit: Portion that can be used to initialise the SPD. Uses setkey syntax. See setkey(8). sadinit: Portion that can be used to initialise the SAD. Uses setkey syntax. See setkey(8). spdadd(%default|[-_a-z0-9]+): Template for adding SPD entries. Different templates can be used. Keys for replacement are of the form `___setkey_name___', with names found in setkey(8). The built in template is named `%default'. spdadd_transport_ip4(%transport_ip4_default|[-_a-z0-9]+): Template for adding SPD entries for IPv4 when transport mode is desired. Different templates can be used, but have to be selected with the spdadd connection property. Keys for replacement are of the form `___setkey_name___', with names found in setkey(8). The built in template is named `%transport_ip4_default'. spdadd_transport_ip6(%transport_ip6_default|[-_a-z0-9]+): Template for adding SPD entries for IPv6 when transport mode is desired. Different templates can be used, but have to be selected with the spdadd connection property. Keys for replacement are of the form `___setkey_name___', with names found in setkey(8). The built in template is named `%transport_ip4_default'. sadadd(%default|[-_a-z0-9]+): Template for adding SAD entries. Different templates can be used. Keys for replacement are of the form `___setkey_name___', with names found in setkey(8). The built in template is named `%default'. remote(%default|[-_a-z0-9]+): Template for adding 'remote' entries to the generated racoon.conf(5). Different templates can be used. Keys for replacement are of the form `___setkey_name___', with names found in setkey(8). The built in template is named `%default'. sainfo(%default|[-_a-z0-9]+): Template for adding 'sainfo' entries to the generated racoon.conf(5). Different templates can be used. Keys for replacement are of the form `___setkey_name___', with names found in setkey(8). The built in template is named `%default'. racooninit: Template for adding your own section to the start of the generated racoon.conf(5). EXAMPLES
Example of a simple configuration using PSK authentication. # # Configuration file for racoon-tool # # See racoon-tool.conf(5) for details # # # Simple PSK - authentication defaults to pre_shared_key # connection(bacckdoor-doormat): src_range: 192.168.223.1/32 dst_range: 192.168.200.0/24 src_ip: 172.31.1.1 dst_ip: 10.0.0.1 admin_status: enabled compression: no lifetime: time 20 min authentication_algorithm: hmac_sha1 encryption_algorithm: 3des peer(10.0.0.1): verify_cert: on passive: off verify_identifier: off lifetime: time 60 min hash_algorithm[0]: sha1 encryption_algorithm[0]: 3des Example of a complex configuration with multple networks betweenthe same endpoints, as well as use of `%default' for common settings. # # Configuration file for racoon-tool # global: log: notify # default settings to save typing peer(%default): certificate_type: x509 blurke-ipsec.crt blurke-ipsec.key my_identifier: fqdn blurke.bar.com lifetime: time 60 min verify_identifier: on verify_cert: on hash_algorithm[0]: sha1 encryption_algorithm[0]: 3des authentication_method[0]: rsasig connection(%default): authentication_algorithm: hmac_sha1 encryption_algorithm: 3des src_ip: 172.31.1.1 lifetime: time 20 min # Connection to work peer(10.0.0.1): peers_identifier: fqdn blue.sky.com connection(blurke-blue-sky-work): src_range: 192.168.203.1/32 dst_range: 172.16.0.0/24 dst_ip: 10.0.0.1 admin_status: enabled # Connection to telehoused servers connection(blurke-mail): src_range: 192.168.203.0/24 dst_range: 172.20.1.1 dst_ip: 10.100.0.1 encryption_algorithm: blowfish compression: on admin_status: yes peer(10.100.0.1): peers_identifier: fqdn mail.bar.com connection(blurke-web1): src_range: 192.168.203.0/24 dst_range: 172.20.1.23 dst_ip: 10.100.0.1 encryption_algorithm: blowfish admin_status: yes connection(blurke-web2): src_range: 192.168.203.0/24 dst_range: 172.20.1.24 dst_ip: 10.100.0.1 encryption_algorithm: blowfish admin_status: yes # Test connection to Free S/WAN connection(blurke-freeswan): src_range: 192.168.203.0/24 dst_range: 172.17.100.0/24 dst_ip: 172.30.1.1 admin_status: yes peer(172.30.1.1): peers_identifier: fqdn banshee FILES
/etc/racoon/racoon-tool.conf (configuration header file) /etc/racoon/racoon-tool.conf.d/*.conf optional portions. The file(s) that this man page describes. /var/lib/racoon/racoon.conf The generated racoon.conf. SEE ALSO
racoon.conf(5), racoon-tool(8), racoon(8), setkey(8), ipsec(4) on FreeBSD. BUGS
This man page is by no means complete. AUTHOR
This manual page was written by Matthew Grant <matthewgrant5@gmail.com> for the Debian GNU/Linux system (but may be used by others). RACOON-TOOL.CONF(5)
All times are GMT -4. The time now is 03:51 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy