PC-X connection


 
Thread Tools Search this Thread
Operating Systems Solaris PC-X connection
# 1  
Old 01-28-2011
PC-X connection

Hi all,
I have just installed SunOS 10 at the first PC and exceed (pc-x server) at the second.
I'm trying to connect to the first pc via exceed softvare. After entering login and pass, the exceed window immidiate close without any errors (if CDE or JDS has been chosen). Via exceed working just failsafe mode.

Exceed's log file hasn't any errors. How i can solve my problem if i have terminal connection to the first pc?
Login or Register to Ask a Question

Previous Thread | Next Thread

10 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Remote connection

How can we connect to remote computers with a bash script.? (1 Reply)
Discussion started by: diw10
1 Replies

2. UNIX for Dummies Questions & Answers

DB connection

hi Im unable to find how this script in conencting to DB and which DB and job is scheduled in TWS to run this script. Any sugggestion where to look for or how to get information. please find below part of script for DB conenction. ##### SET VARIABLES ################## rundate=`date... (1 Reply)
Discussion started by: saif2825
1 Replies

3. UNIX for Advanced & Expert Users

How keep running a program n an another computer via a connection ssh when the connection is closed?

Hi everybody, I am running a program on a supercomputer via my personal computer through a ssh connection. My program take more than a day to run, so when I left work with my PC I stop the connection with the supercomputer and the program stop. I am wondering if someone know how I can manage... (2 Replies)
Discussion started by: TomTomGre
2 Replies

4. AIX

IP connection

Hi, I have a server AIX 5.3 Few people have the root password and somebody used the root login to erase a file (command rm in the .sh_history of root). :mad: I would like to know if a file exist with what ip address has been connected. I want to find the guilty!!! :D Thanks guys (2 Replies)
Discussion started by: Castelior
2 Replies

5. Shell Programming and Scripting

db connection

Hi, I'm trying to write a script which will run a select on db. #!/usr/bin/ksh SQL_INPUT_FILE=file_name.sql SQL_OUTPUT_FILE=output.txt MANPATH=/usr/share/man:/opt/SUNWspro/man:/usr/local/man... (2 Replies)
Discussion started by: ozum
2 Replies

6. Solaris

Solaris 10 ftp connection problem (connection refused, connection timed out)

Hi everyone, I am hoping anyone of you could help me in this weird problem we have in 1 of our Solaris 10 servers. Lately, we have been having some ftp problems in this server. Though it can ping any server within the network, it seems that it can only ftp to a select few. For most servers, the... (4 Replies)
Discussion started by: labdakos
4 Replies

7. UNIX for Advanced & Expert Users

Connection reset by peer..closing connection

Hello I'm facing the above problem while doing a performance run. I've a script which I'm launching from my windows desktop using mozilla. The script will invoke backend action on a Solaris host which in turn feeds the records to a driver located on a linux box(Cent OS). What's happening is... (1 Reply)
Discussion started by: subramanyab
1 Replies

8. UNIX for Dummies Questions & Answers

ssh_exchange_identification: Connection closed by remote host Connection closed

Hi Everyone, Good day. Scenario: 2 unix servers -- A (SunOS) and B (AIX) I have an ftp script to sftp 30 files from A to B which happen almost instantaneously i.e 30 sftp's happen at the same time. Some of these sftp's fail with the following error: ssh_exchange_identification: Connection... (1 Reply)
Discussion started by: jeevan_fimare
1 Replies

9. IP Networking

HOw to start a connection?

Hi, I understand assignment qns are not allowed. However, I need major help.. please teach me how to write a tcp/ip programme using C, wad are the websites that i can refer to? wad are the codes required for it? I have never done tcp/ip configurations before, and never learnt C before,... (13 Replies)
Discussion started by: microuniz
13 Replies

10. Cybersecurity

FTP Connection

I just started a new job and inherited a Fedora core 3 server. I wanted to open the ftp ports and I wanted to verify this code before I mess things up. From my reading the two lines below should allow ftp access can anyone confirm my attempt. iptables -A INPUT -p tcp - sport 21 -m state - state... (0 Replies)
Discussion started by: mungaz
0 Replies
Login or Register to Ask a Question
Policing action in tc(8)                                               Linux                                              Policing action in tc(8)

NAME
police - policing action SYNOPSIS
tc ... action police rate RATE burst BYTES[/BYTES] [ mtu BYTES[/BYTES] ] [ peakrate RATE ] [ overhead BYTES ] [ linklayer TYPE ] [ CONTROL ] tc ... filter ... [ estimator SAMPLE AVERAGE ] action police avrate RATE [ CONTROL ] CONTROL := conform-exceed EXCEEDACT[/NOTEXCEEDACT EXCEEDACT/NOTEXCEEDACT := { pipe | ok | reclassify | drop | continue | goto chain CHAIN_INDEX } DESCRIPTION
The police action allows to limit bandwidth of traffic matched by the filter it is attached to. Basically there are two different algo- rithms available to measure the packet rate: The first one uses an internal dual token bucket and is configured using the rate, burst, mtu, peakrate, overhead and linklayer parameters. The second one uses an in-kernel sampling mechanism. It can be fine-tuned using the estimator filter parameter. OPTIONS
rate RATE The maximum traffic rate of packets passing this action. Those exceeding it will be treated as defined by the conform-exceed option. burst BYTES[/BYTES] Set the maximum allowed burst in bytes, optionally followed by a slash ('/') sign and cell size which must be a power of 2. mtu BYTES[/BYTES] This is the maximum packet size handled by the policer (larger ones will be handled like they exceeded the configured rate). Setting this value correctly will improve the scheduler's precision. Value formatting is identical to burst above. Defaults to unlimited. peakrate RATE Set the maximum bucket depletion rate, exceeding rate. avrate RATE Make use of an in-kernel bandwidth rate estimator and match the given RATE against it. overhead BYTES Account for protocol overhead of encapsulating output devices when computing rate and peakrate. linklayer TYPE Specify the link layer type. TYPE may be one of ethernet (the default), atm or adsl (which are synonyms). It is used to align the precomputed rate tables to ATM cell sizes, for ethernet no action is taken. estimator SAMPLE AVERAGE Fine-tune the in-kernel packet rate estimator. SAMPLE and AVERAGE are time values and control the frequency in which samples are taken and over what timespan an average is built. conform-exceed EXCEEDACT[/NOTEXCEEDACT] Define how to handle packets which exceed or conform the configured bandwidth limit. Possible values are: continue Don't do anything, just continue with the next action in line. drop Drop the packet immediately. shot This is a synonym to drop. ok Accept the packet. This is the default for conforming packets. pass This is a synonym to ok. reclassify Treat the packet as non-matching to the filter this action is attached to and continue with the next filter in line (if any). This is the default for exceeding packets. pipe Pass the packet to the next action in line. EXAMPLES
A typical application of the police action is to enforce ingress traffic rate by dropping exceeding packets. Although better done on the sender's side, especially in scenarios with lack of peer control (e.g. with dial-up providers) this is often the best one can do in order to keep latencies low under high load. The following establishes input bandwidth policing to 1mbit/s using the ingress qdisc and u32 fil- ter: # tc qdisc add dev eth0 handle ffff: ingress # tc filter add dev eth0 parent ffff: u32 match u32 0 0 police rate 1mbit burst 100k As an action can not live on it's own, there always has to be a filter involved as link between qdisc and action. The example above uses u32 for that, which is configured to effectively match any packet (passing it to the police action thereby). SEE ALSO
tc(8) iproute2 20 Jan 2015 Policing action in tc(8)