Today's newly built LNMP environment, install WordPress Blog to do testing, installation to fill in the database information, has been error database connection errors, re-create the library, re-authorized users, all prompt the same error, and later
Original: http://www.cnblogs.com/Security-Darren/p/4700387.htmlA network failure to troubleshoot a Linux system.Network troubleshooting is generally a certain way of thinking and order, in fact, the idea of troubleshooting is based on the specific
I. Network Complexity
General networks include routing, dialing, switching, video, WAN (ISDN, frame relay, ATM ,...) , LAN, VLAN ,...
Ii. Fault Handling Model
1. Define the Problem)
Detailed and accurate description of fault symptoms and potential
Configure jumbo frame for RAC optimization and jumboframe for rac Optimization
Configure jumbo frame for RAC Optimization)
First, let's talk about the concept of MTU: in network communication, there is a concept of MTU (Max Transmission Unit), that
I. MPLS IN BGP Theory
No mpls ip propagate-ttl [forwarded | local]
Note: you only need to configure this command on the entry PE!
If you want to hide the P router in the public network, and the PE router entry PE at the egress, you can use this
Network troubleshooting and viewing in linux, and network troubleshooting in linux
Basic troubleshooting errors
Troubleshooting must be simple and complex. Some people repeatedly configure the above files, but they cannot access the network. They
A better alternative to basic command line tools
The command line may sound scary sometimes, especially when you are new to it, you may even have a nightmare about the command line. Gradually, however, we will realize that the command line is not so
1. ACK Scan
>>>ans,unans=sr(IP(dst=)/TCP(dport=[,],flags=)
After scanning, find the unused Port:
s,r s[TCP].dport==+
Filtered:
s +
2. Xmas Scan
>>>ans,unans=sr(IP(dst=)/TCP(dport=,flags=))
RST indicates that the port is closed.
3. IP Scan
>>> ans,
Translator Note: This article is "High performance Browser Networking" translation version, using Google Translator Tookit tool translation, the original text in many formats lost, follow-up needs to be unified.Please refer to the original text:
TCP/IP OverviewTCP/IP is generally considered to be a four-layer protocol:
Link layer. Also known as the data Link layer or network interface layer, including device drivers and network interface cards, which work together with the physical
1.udpThe traditional, ancient method of tracerouting. Used by default.Probe packets is UDP datagrams with so-called "unlikely" destination ports. The "unlikely" Port of the first probe is 33434 and then for each next probe it's incremented by one.
Over the past few days, I have been browsing the TCP/IP protocol stated vol1 (hereinafter referred to as distributed strated) and internetworking with TCPIP vol1. I found that many key knowledge points I have learned are almost forgotten, I was a
A gadget that displays IP geolocation information under Linux-naliFirst, IntroductionNali, the name is taken from the Chinese "where" pinyin. Nali contains a set of command-line programs whose main function is to attach the IP strings of the output
Basic Troubleshooting ErrorsTroubleshooting must be simple after the complex, some people put the above-mentioned files repeatedly configured, is not on the net, has been thought to be a system failure, want to re-installed son. It turns out that
7. Network Commands7.1 send message to user to Ctr+d save end(1) Write command
Command name
Write
Command path
/user/bin/write
Execute permissions
All Users
Grammar
Swiss Army Knife protocol-ICMP
ICMP protocol
An important supplement to the IP protocol is the ICMP protocol. ICMP (Internet Control Message Protocol) is a Protocol between the network layer and the transport layer. Its main function is to transmit
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.