Solved

Transmit Timeouts

Posted on 1997-01-21
3
328 Views
Last Modified: 2010-03-18
I'm using linux for a high-volume proxy server. Occasionally
I get the error "Transmit Timeout: Network cable problem?" in the syslog and the system stops talking to the network until it gets rebooted. How can I stop this?...
0
Comment
Question by:moore031197
3 Comments
 
LVL 2

Expert Comment

by:dux
ID: 1584122
What kind of network adapters do you have? Maybe you have SMC cards...
0
 

Author Comment

by:moore031197
ID: 1584123
The adapter is an Intel EthernetPro...
0
 

Accepted Solution

by:
knowledge021097 earned 200 total points
ID: 1584124
There have been a few comments of failures under load of these cards.  You didn't give many details, but if this is a PCI system, look at
      http://cesdis.gsfc.nasa.gov/linux/drivers
And seek one of the new drivers.

If it is an ISA card, there has been another report of a system
with problems, but no solution. If this is a module, try taking
the interface down, and unloading and reloading the driver.
This should save you from rebooting at least.
0

Featured Post

Master Your Team's Linux and Cloud Stack

Come see why top tech companies like Mailchimp and Media Temple use Linux Academy to build their employee training programs.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question