Solved

Connectivity Lost

Posted on 2014-03-12
3
221 Views
Last Modified: 2014-03-30
I am new to the UNIX , my company internet connection has been terminated unexpectedly, what is the detail steps that should I have to solve this connectivity issue we are facing.
0
Comment
Question by:YaYangTeah
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 25

Expert Comment

by:Zephyr ICT
ID: 39925641
You'll have to give us more information, we can't help you with this without at least knowing some basic stuff.

- Unix, Linux, what is the exact OS (Debian, Centos, Redhat, SCOUnix, *BSD)
- What stopped working, was it terminated deliberately or?
- Did you call your ISP to make sure there's no problem at their end?
- Checked routers/firewalls?
- ...
0
 
LVL 48

Expert Comment

by:Tintin
ID: 39925779
First place to start is with your service provider to see if there is an issue on their end.
0
 
LVL 84

Accepted Solution

by:
ozo earned 500 total points
ID: 39925986
What were the symptoms of the termination?
Have there been similar terminations in the past?  
Have any parts of your connection been more prone to problems than others?  
Have any parts of your connection been reconfigured recently?
Can you verify connections along any part of the path?
Can you try any alternate paths?
Can you get diagnostics from any components along the path?
Can you swap out any components along the path?
Can you try resetting components that seem to have failed?
Is there anyone else familiar with your configuration whom you can consult?
0

Featured Post

Secure Your WordPress Site: 5 Essential Approaches

WordPress is the web's most popular CMS, but its dominance also makes it a target for attackers. Our eBook will show you how to:

Prevent costly exploits of core and plugin vulnerabilities
Repel automated attacks
Lock down your dashboard, secure your code, and protect your users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Meet the world's only “Transparent Cloud™” from Superb Internet Corporation. Now, you can experience firsthand a cloud platform that consistently outperforms Amazon Web Services (AWS), IBM’s Softlayer, and Microsoft’s Azure when it comes to CPU and …
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question