Solved

TCP/IP has reached the security limit imposed on the number of concurrent TCP connect attempts.

Posted on 2007-12-03
5
3,646 Views
Last Modified: 2013-11-12
TCP/IP has reached the security limit imposed on the number of concurrent TCP connect attempts.


i just checked the event log. i have wireless card, connects to my AP on the other pc. at some point when i start using many apps, i get this and the network becomes unusable. i have to reboot. i cannot enable the wireless card, nothing.
after i reboot. all works, till i start using my apps.

help?
0
Comment
Question by:rares_dumitrescu
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
5 Comments
 
LVL 2

Accepted Solution

by:
lcit earned 250 total points
ID: 20399159
After you've checked to make sure you're not infected with some kind of worm, take a look at this:

http://www.softpedia.com/get/Tweak/Network-Tweak/TCP-IP-Limit-AutoPatch.shtml

0
 

Author Comment

by:rares_dumitrescu
ID: 20402010
applied the patch
but for some reason the same error popped up and my laptop got disconnected last night.
0
 
LVL 2

Expert Comment

by:lcit
ID: 20402474
What app tends to cause the problem?  P2P?

0
 
LVL 8

Expert Comment

by:YGregersen
ID: 20404114
The half open limit is very small near 10 or 50 - for things like Bittorrent you need well beyond that.


There is a TCP open connection limit patch available out on the net. It was first created for XP but now they have one for Vista. It will solve you issues with Bitorrent.

I would link it for you but my corp firewall won't let me. Search for 'TCP half open limit Vista Patch'
0
 

Author Comment

by:rares_dumitrescu
ID: 20407831
i reapplied the patch from softpedia and it worked for vista. thanks!
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This subject  of securing wireless devices conjures up visions of your PC or mobile phone connecting to the Internet through some hotspot at Starbucks. But it is so much more than that. Let’s look at the facts: devices#sthash.eoFY7dic.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question