Actually you will see significant slowdowns with XP-SP2. This is not a
problem with WUP. The slowdown is because of changes to the TCP stack made
by Microsoft. I have attached a web page(from Microsoft) that vaguely
describes one aspect of the problem.
Basically WUP will work just fine on XP-SP2. It just runs significantly
slower in some circumstances.
Mitch
-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Ken Meyer
Sent: Monday, March 14, 2005 07:50 AM
To: [email protected]
Subject: Re: Antwort: [WhatsUp Forum] WUP.. Was it a misstake?
Hi,
After applying SP1, response time went way down. It became so bad, the
product was unusable.
I erased and reinstalled it without SP1, and things went back to normal.
It is currently running on a pc with XP-SP2. Do you know of any
compatability issues?
We have a server on order. When it arrives, I'll try WUP on that.
>>> [EMAIL PROTECTED] 3/14/2005 7:38 AM >>>
Magnus, Maillist,
> Is it just me or am I doing something wrong?
I'm also experiencing lack of speed in WUP. Connecting trough MSTSC to my
Windows hosts, WUP application is extremely slow. Network runs smooth,
MSTSC also does. Simply WUP runs at snail pace. NmService.exe permanantly
uses 50%+ CPU ressources on a dual 1.4GHz Sun LX50 with 1GB Ram Win2kSrv.
MSDE Database on same host.
>
http://www.ipswitch.com/Products/WhatsUp/professional/WhatsUp_Professional_D
atasheet.pdf
> System Requirements
> ? Windows 2003 Server, Windows XP (SP1 or later), or Windows 2000 (SP4
or later recommended)
> ? 260 MB of disk space
> ? 256 MB RAM
> ? To use beeper or pager notifications, a local modem and phone line is
required (WhatsUp Professional
> does not support modem pooling)
So, my host is adequate H/W, isn't it?
Are there others experiencing this? I'd be pleased to get some feedback on
this.
Regards,
Daniel
--
Daniel Blaser System Engineer ISP
Abt. Lie-Comtel Tel: +423 / 236 17 60
Liechtensteinische Kraftwerke Fax: +423 / 236 17 41
Im alten Riet 17, 9494 Schaan Web: http://www.lkw.li
Please visit http://www.ipswitch.com/support/mailing-lists.html
to be removed from this list.
An Archive of this list is available at:
http://www.mail-archive.com/whatsup_forum%40list.ipswitch.com/
IMPORTANT NOTICE: This e-mail is meant only for the use of the intended
recipient. It may contain confidential information which is legally
privileged or otherwise protected by law. If you received this e-mail
in error or from someone who was not authorized to send it to you, you
are strictly prohibited from reviewing, using, disseminating,
distributing or copying the e-mail. PLEASE NOTIFY US IMMEDIATELY OF THE
ERROR BY RETURN E-MAIL AND DELETE THIS MESSAGE FROM YOUR SYSTEM. Thank
you for your cooperation.
Please visit http://www.ipswitch.com/support/mailing-lists.html
to be removed from this list.
An Archive of this list is available at:
http://www.mail-archive.com/whatsup_forum%40list.ipswitch.com/
| Details |
| Product: |
Windows Operating System |
| ID: |
4226 |
| Source: |
Tcpip |
| Version: |
5.2 |
| Symbolic Name: |
EVENT_TCPIP_TCP_CONNECT_LIMIT_REACHED |
| Message: |
TCP/IP has reached the security limit imposed on the
number of concurrent (incomplete) TCP connect attempts. |
| |
| Explanation |
|
The TCP/IP stack in Windows XP with Service Pack 2 (SP2)
installed limits the number of concurrent, incomplete outbound TCP
connection attempts. When the limit is reached, subsequent
connection attempts are put in a queue and resolved at a fixed rate
so that there are only a limited number of connections in the
incomplete state. During normal operation, when programs are
connecting to available hosts at valid IP addresses, no limit is
imposed on the number of connections in the incomplete state. When
the number of incomplete connections exceeds the limit, for example,
as a result of programs connecting to IP addresses that are not
valid, connection-rate limitations are invoked, and this event is
logged.
Establishing connection–rate limitations helps to limit the speed
at which malicious programs, such as viruses and worms, spread to
uninfected computers. Malicious programs often attempt to reach
uninfected computers by opening simultaneous connections to random
IP addresses. Most of these random addresses result in failed
connections, so a burst of such activity on a computer is a signal
that it may have been infected by a malicious program.
Connection-rate limitations may cause certain security tools,
such as port scanners, to run more slowly. |
| |
| User Action |
|
This event is a warning that a malicious program or a virus might
be running on the system. To troubleshoot the issue, find the
program that is responsible for the failing connection attempts and,
if the program might be malicious, close the program as follows.
To close the program
- At the command prompt, type
Netstat –no
- Find the process with a large number of open connections that
are not yet established.
These connections are indicated by the
TCP state SYN_SEND in the State column of the Active Connections
information.
- Note the process identification number (PID) of the process in
the PID column.
- Press CTRL+ALT+DELETE and then click Task Manager.
- On the Processes tab, select the processes with the matching
PID, and then click End Process.
If you need to select
the option to view the PID for processes, on the View menu, click
Select Columns, select the PID (Process Identifier)
check box, and then click
OK. | |
|
|
| Currently there are no Microsoft Knowledge Base
articles available for this specific error or event message. For
information about other support options you can use to find answers
online, see http://support.microsoft.com/default.aspx. |
|
| |
|