T.R | Title | User | Personal Name | Date | Lines |
---|
536.1 | | IROCZ::D_NELSON | Dave Nelson LKG1-3/A11 226-5358 | Wed Apr 09 1997 12:05 | 21 |
| RE: .0
> Would you like me to get a dump and escalate with an IPMT case or
> take another route.
That may indeed ultimately be necessary. In the mean time, perhaps you could
give us some additional data. When authentication has "quit":
What messages do you get on an interactive port login (PORT AUTHEN ENA)?
What counters are incrementing? SHO SERVER AUTHEN COUNT
SHO PORT AUTHEN COUNT
SHO INTERNET COUNT
(In the last case, we're interested in UDP packets, and IP packets.)
Beyond this information, a dump will probably be required.
Regards,
Dave
|
536.2 | more info....more to come | CSC32::D_SHAVEY | | Wed Apr 09 1997 14:02 | 17 |
| Dave,
I am waiting for the counters from the customer that you requested
and they will also get a dump for me. Some of the errors are:
remote server reset connection
can't negotiate a compatible set of protocols
they will get more errors and send to me also.
Another thing, when this happens, the authentication host does not show
that anyone has tried to authenticate.
Thanks,
Darrell
|
536.3 | might be a known problem fixed in FT10D09 | IROCZ::RRICHARD | | Thu Apr 10 1997 07:55 | 9 |
|
Hi,
There's a field test image available which may fix this problem. It corrects
several mbuffer leaks associated with using PPP and RADIUS. It's located on
NPSS::PUBLIC$DSK:[INTERCHANGE.DECSERVERS.DNAS]. The images are named
WWENG2_FT10D09.SYS and MNENG2_FT10D09.SYS.
|
536.4 | Thanks..... | CSC32::D_SHAVEY | | Thu Apr 10 1997 12:01 | 5 |
| Thanks. I will copy it over and send to the customer.
Darrell Shavey
CSC32::D_SHAVEY
DTN 592-4712
|