>
> Our network masks are now set at FFFFFF00. We spent a day last week
> upgrading to this more restrictive mask on all our iocs when our hosts
> changed to the same mask for security reasons.
>
I'm am guessing that your problem is that there are large numbers of
machines on your network that have not yet configured to the new netmask.
They are all replying to every CA broadcast with "ICMP destination unreachable"
and this is swamping the client's UDP input queue. This can result in very
unreliable behavior that strongly depends on network topology (the responses
that arrive first get through and all others are discarded). As I mentioned,
you can use snoop (or some other sniffer) to obtain a list of hosts that must
be fixed. You may also decide to place your control system behind a firewall.
Jeff
- Replies:
- CA clients on vxWorks Matthieu Bec
- References:
- Re: ca client connection pattern Geoff Savage
- Navigate by Date:
- Prev:
Re: ca client connection pattern Geoff Savage
- Next:
CA clients on vxWorks Matthieu Bec
- Index:
1994
1995
1996
1997
1998
1999
2000
<2001>
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
- Navigate by Thread:
- Prev:
Re: ca client connection pattern Geoff Savage
- Next:
CA clients on vxWorks Matthieu Bec
- Index:
1994
1995
1996
1997
1998
1999
2000
<2001>
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
|