search for: tcpp

Displaying 5 results from an estimated 5 matches for "tcpp".

Did you mean: cpp
2008 May 14
3
tcptop_snv connp->conn_tcp != connp->conn_proto_priv.cp_tcp
Tried to start up tcptop_snv on snv87 x86 and got <i>dtrace: failed to compile script /dev/fd/11: line 168: conn_tcp is not a member of struct conn_s</i> Line 288 has this line: <i>this->tcpp = (tcp_t *)this->connp->conn_tcp;</i> which, after looking at line 168 of <a href="http://cvs.opensolaris.org/source/xref/onnv/onnv-gate/usr/src/uts/common/inet/ipclassifier.h">ipclassifier.h</a> (#define conn_tcp conn_proto_priv.cp_tcp) I changed to <i>this-...
2006 Jan 24
13
Nortel Meridian Opt 81C and PRI
We've been trying unsuccessfully to connect our Meridian Option 81C to a TE110P via PRI. We've followed the directions in asterisk-meridian-a1.pdf (link on http://www.voip-info.org/wiki/view/Asterisk+legacy+integration), but it doesn't seem to work on our 81C (even though many, many users report it works very well on Option 11's). Has anyone had any success in getting the above
2007 Feb 13
4
Nortel 81C MSDL Trunking to Asterisk TE110P, Nortel Resetting PRI Channels
...ISDN YES MODE PRA IFC ESS5 SBN NO PNI 00001 SRVC NNSF NCNA YES NCRD YES CHTY BCH CTYP CDP INAC YES ISAR NO CPUB OFF DAPC NO BCOT 0 DSEL VOD PTYP PRI AUTO NO DNIS NO DCDR NO ICOG IAO SRCH LIN TRMB YES STEP ACOD 7930 TCPP NO PII NO TARG CLEN 1 BILN NO OABS INST IDC NO DCNO 0 * NDNO 0 DEXT NO ANTK SIGO STD ICIS YES TIMR ICF 512 OGF 512 EOD 13952 NRD 10112 DDL 70 ODT 4096 RGV 640 GRD 896 SFB 3 NBS 2048 NBL 4096 IENB 5 T...
2004 Oct 08
6
clean install with 3 ip addresses
...domain #TCP DNS from #the Firewall ACCEPT dmz:69.17.65.22 net udp domain #UDP DNS to #the Internet ACCEPT dmz:69.17.65.22 net tcp domain #TCPP DNS to #the Internet #the Internet #server 2 ACCEPT net dmz:69.17.65.161 tcp smtp #Mail from #Inter...
2004 Sep 11
5
Bridge Interface without an IP Address?
We are using Shorewall 2.0.8 with SuSE 9.1 and have built a bridging firewall primarily to defend against syn flood and smurf DoS attacks. We are a small ISP using Cisco routers for a total of 5-6 subnets. Since bridges are based on use of MAC addresses, if we could use one bridging firewall system instead of 5-6 ... is this possible? practical? (Other than introducing a single point of failure