10 More Discussions You Might Find Interesting
1. Solaris
please find the below o/p for your reference
bash-3.00# fcinfo hba-port
HBA Port WWN: 21000024ff295a34
OS Device Name: /dev/cfg/c2
Manufacturer: QLogic Corp.
Model: 375-3356-02
Firmware Version: 05.03.02
FCode/BIOS Version: BIOS: 2.02; fcode: 2.01;... (3 Replies)
Discussion started by: sb200
3 Replies
2. Solaris
I'd like to use SPARC Solaris10 to 'wake up' an old PC on same LAN.
what is the simplest way of doing it? (preferably without installing new software)
thanks. (14 Replies)
Discussion started by: orange47
14 Replies
3. IP Networking
i want to kill a tcp connection by killing its pid
with netstat -an i got the tcp ip connection on port 5914
but when i type ps -a or ps-e there is not such process running on port 5914
is it possible that because i do not log on with proper user account i can not see that process running? (30 Replies)
Discussion started by: alinamadchian
30 Replies
4. IP Networking
Hi!
I'm writing an application (using BSD sockets on a Linux host) which communicates over TCP/IP with an embedded device. This embedded device has an old and real slow integrated circuit (Epson S1S6000) which handles all of the TCP/IP communication for it.
Problem is, this circuit (S1S6000)... (7 Replies)
Discussion started by: olle
7 Replies
5. Shell Programming and Scripting
I have multiple processes running the same program on my linux machine. For each process I want to be able to use a unique (available) TCP port. I have thought of using netstat to check which ports are available for use however, the time-window between checking and selecting might expose some race... (1 Reply)
Discussion started by: timmylita
1 Replies
6. IP Networking
Hello,
I'm having an issue with TCP sockets.
When the TCP connection is terminated on one end, TCP packet with RST flag set is being sent to the sender. All the packets sent so far were carrying the DSCP 'AF21' set by me. But packet with RST flag is carrying DSCP '0'.
Is this expected or... (0 Replies)
Discussion started by: Solace
0 Replies
7. UNIX for Dummies Questions & Answers
Hello, I have a service running (ODBC) and every now and then it will hang and I will have to stop and restart the service. The problem is when I stop the service, it indeed stops the service, but netstat reports a tcp port still open with the fin_wait_2 status. Then I must close the client... (1 Reply)
Discussion started by: raidzero
1 Replies
8. Shell Programming and Scripting
can u tell me from where do i get
TCP/IP Source code plz. (2 Replies)
Discussion started by: pradeep83rawat
2 Replies
9. UNIX for Dummies Questions & Answers
hi,
i am using Sun Solaris 8 (Sparc). Currently there is a SNMP agent running on port 161.
How should I change it to port 8001?
which file to modify and restart is necessary?
pls teach me the information.
thanks (8 Replies)
Discussion started by: champion
8 Replies
10. IP Networking
I am trying to connect via DBACCESS and Informix server to a server on a different computer. When I execute the connect command from dbaccess I get the following message,
Exec format error cannot bind a name to the port.
As far as I know the port is not being used by another client.
How... (1 Reply)
Discussion started by: lopez
1 Replies
FAITH(4) BSD Kernel Interfaces Manual FAITH(4)
NAME
faith -- IPv6-to-IPv4 TCP relay capturing interface
SYNOPSIS
pseudo-device faith [count]
DESCRIPTION
The faith interface captures IPv6 TCP traffic, for implementing userland IPv6-to-IPv4 TCP relay like faithd(8).
Special action will be taken when IPv6 TCP traffic is seen on a router, and routing table suggests to route it to faith interface. In this
case, the packet will be accepted by the router, regardless of list of IPv6 interface addresses assigned to the router. The packet will be
captured by an IPv6 TCP socket, if it has IN6P_FAITH flag turned on and it has matching address/port pairs. In result, faith will let you
capture IPv6 TCP traffic to some specific destination addresses. Userland programs, such as faithd(8) can use this behavior to relay IPv6
TCP traffic to IPv4 TCP traffic. The program can accept some specific IPv6 TCP traffic, perform getsockname(2) to get the IPv6 destination
address specified by the client, and perform application-specific address mapping to relay IPv6 TCP to IPv4 TCP.
The IN6P_FAITH flag on IPv6 TCP socket can be set by using setsockopt(2), with level equals to IPPROTO_IPV6 and optname equals to IPv6_FAITH.
To handle error reports by ICMPv6, some of ICMPv6 packets routed to faith interface will be delivered to IPv6 TCP, as well.
To understand how faith can be used, take a look at source code of faithd(8).
As faith interface implements potentially dangerous operation, great care must be taken when configuring faith interface. To avoid possible
misuse, sysctl(8) variable net.inet6.ip6.keepfaith must be set to 1 prior to the use of the interface. When net.inet6.ip6.keepfaith is 0, no
packet will be captured by faith interface.
faith interface is intended to be used on routers, not on hosts.
SEE ALSO
inet(4), inet6(4), faithd(8)
Jun-ichiro itojun Hagino and Kazu Yamamoto, An IPv6-to-IPv4 transport relay translator, internet draft, draft-ietf-ngtrans-tcpudp-
relay-04.txt, work in progress material.
HISTORY
The FAITH IPv6-to-IPv4 TCP relay translator was first appeared in WIDE hydrangea IPv6 stack.
BSD
April 10, 1999 BSD