| T.R | Title | User | Personal Name
 | Date | Lines | 
|---|
| 536.1 |  | IROCZ::D_NELSON | Dave Nelson LKG1-3/A11 226-5358 | Wed Apr 09 1997 11:05 | 21 | 
|  | RE: .0
>       Would you like me to get a dump and escalate with an IPMT case or 
>	take another route.
That may indeed ultimately be necessary.  In the mean time, perhaps you could
give us some additional data.  When authentication has "quit":
  What messages do you get on an interactive port login (PORT AUTHEN ENA)?
  What counters are incrementing?	SHO SERVER AUTHEN COUNT
					SHO PORT AUTHEN COUNT
					SHO INTERNET COUNT
  (In the last case, we're interested in UDP packets, and IP packets.)
Beyond this information, a dump will probably be required.
Regards,
Dave
 | 
| 536.2 | more info....more to come | CSC32::D_SHAVEY |  | Wed Apr 09 1997 13:02 | 17 | 
|  |     Dave,
    
    	I am waiting for the counters from the customer that you requested
    and they will also get a dump for me. Some of the errors are:
    
    remote server reset connection
    can't negotiate a compatible set of protocols
    
    they will get more errors and send to me also.
    
    Another thing, when this happens, the authentication host does not show
    that anyone has tried to authenticate.
    
    Thanks,
    
    Darrell
    
 | 
| 536.3 | might be a known problem fixed in FT10D09 | IROCZ::RRICHARD |  | Thu Apr 10 1997 06:55 | 9 | 
|  | 
  Hi,
  There's a field test image available which may fix this problem. It corrects
  several mbuffer leaks associated with using PPP and RADIUS. It's located on
  NPSS::PUBLIC$DSK:[INTERCHANGE.DECSERVERS.DNAS].  The images are named
  WWENG2_FT10D09.SYS and MNENG2_FT10D09.SYS.
 | 
| 536.4 | Thanks..... | CSC32::D_SHAVEY |  | Thu Apr 10 1997 11:01 | 5 | 
|  |     Thanks. I will copy it over and send to the customer. 
    
    Darrell Shavey
    CSC32::D_SHAVEY
    DTN 592-4712
 |