Information Technology Reference
In-Depth Information
Table 11-1 outlines the problems that might cause this symptom and describes solutions to those
problems.
Table11-1
DECnet: Connections to DEC Hosts Fail over Router (End Node Problem)
Possible Problem
Solution
Misconfigured
end node
1. Check the end node configuration using the show executor
characteristics NCP 1 command.
2. Make sure that the end node type (nonrouting Phase IV,
routing Phase IV, area), node address, node name, and
routing and link parameters are correctly specified.
3. Check the circuit characteristics using the show known
circuit characteristics NCP command.
4. Make sure that the designated router, hello timer, router
priority (if the node is a routing node), and other circuit
characteristics are properly configured.
The following decnet commands are used to set the designated
router, hello timers, and router priority on a Cisco router:
decnet hello-timer seconds
seconds —Interval at which the Cisco IOS software sends
hello messages. It can be a decimal number in the range 1 to
8191 seconds. The default is 15 seconds.
decnet router-priority value
To elect a designated router to which packets will be sent when
no destination is specified, use the decnet router-priority
interface configuration command.
value —Priority of the router. This can be a number in the
range 0 through 127. The larger the number, the higher the
priority. The default priority is 64.
Misconfigured
end node
(continued)
5.
Reconfigure the end node if any of the end node or circuit
characteristics are misconfigured. For information on
configuring end nodes, refer to the vendor documentation.
Host access
control rejects
connection
With this problem, users see the message “connect failed, access
control rejected.” This is typically a session-layer problem.
Make sure that the following requirements are satisfied:
1.
User-supplied access control information is correct
Proxy access is set up correctly
Proxy database and proxy account are correct
Make sure that the user's security access matches the access
specifications for the user on the remote systems.
2.
If there are problems in any of these areas, make changes as
necessary.
3.
Search WWH ::




Custom Search