Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Disabling TCP Offload on DD-WRT

Posted on 2013-01-25
4
Medium Priority
?
590 Views
Last Modified: 2013-03-21
Hi Experts,

Does anyone knows how to disable TCP Offloading on DD-WRT?

Mine is running  "DD-WRT v24-sp2 (08/07/10) std" and the box didn't provide any ethtool utility.

Thanks
0
Comment
Question by:SandMan
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 44

Accepted Solution

by:
Darr247 earned 1500 total points
ID: 38821448
There is no TCP Offloading in DD-WRT that I'm aware of... who told you there is?
DD-WRT is built with a linux kernel, and the last I heard all the linux kernel devs were opposed to building support for hardware TCP Offloading into the kernels.
0
 

Author Comment

by:SandMan
ID: 38823172
Hi Darr247, thanks for that info. the reason why I ask the question is when I run tcpdump on the DD-WRT, I can see that there are checksum occurring.
0
 
LVL 44

Expert Comment

by:Darr247
ID: 38823291
What interface are you dumping?

It seems to me if you're seeing chksum's, that means the interface is calculating them... that function's not being offloaded to anything else.
0
 

Author Closing Comment

by:SandMan
ID: 39006295
.
0

Featured Post

Efficient way to get backups off site to Azure

This user guide provides instructions on how to deploy and configure both a StoneFly Scale Out NAS Enterprise Cloud Drive virtual machine and Veeam Cloud Connect in the Microsoft Azure Cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Backups and Disaster RecoveryIn this post, we’ll look at strategies for backups and disaster recovery.
In this article, WatchGuard's Director of Security Strategy and Research Teri Radichel, takes a look at insider threats, the risk they can pose to your organization, and the best ways to defend against them.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

660 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question