关于Toad连接DB2的sqlstate=08001错误.docx

上传人:牧羊曲112 文档编号:3305993 上传时间:2023-03-12 格式:DOCX 页数:5 大小:37.42KB
返回 下载 相关 举报
关于Toad连接DB2的sqlstate=08001错误.docx_第1页
第1页 / 共5页
关于Toad连接DB2的sqlstate=08001错误.docx_第2页
第2页 / 共5页
关于Toad连接DB2的sqlstate=08001错误.docx_第3页
第3页 / 共5页
关于Toad连接DB2的sqlstate=08001错误.docx_第4页
第4页 / 共5页
关于Toad连接DB2的sqlstate=08001错误.docx_第5页
第5页 / 共5页
亲,该文档总共5页,全部预览完了,如果喜欢就下载吧!
资源描述

《关于Toad连接DB2的sqlstate=08001错误.docx》由会员分享,可在线阅读,更多相关《关于Toad连接DB2的sqlstate=08001错误.docx(5页珍藏版)》请在三一办公上搜索。

1、关于Toad连接DB2的sqlstate=08001错误关于Toad连接DB2的sqlstate=08001错误 新装的centos6.3+db29.7,数据库导入完了的之后用Toad连接访问之的时候出错了。 DB2 Database Error: ERROR 08001 IBM SQL30081N A communication error has been detected. Communication protocol being used: TCP/IP. Communication API being used: SOCKETS. Location where the error w

2、as detected: 10.20.51.155. Communication function detecting the error: selectForConnectTimeout. Protocol specific error code(s): 0, *, *. SQLSTATE=08001 (Remembered answer: OK. Enable) 查了好久,网上给了各种解释,其中有个人提到了可能与防火墙有关。 一开始我的做法很黄,就是把防火墙关了,连接下就能连上了。 $ service iptables stop 现在觉得需要添加规则,研究了下iptables相关命令。得出

3、 rootlocalhost # iptables -A INPUT -m state -state NEW -m tcp -p tcp -dport 50000 -j ACCEPT rootlocalhost # /etc/rc.d/init.d/iptables save iptables: Saving firewall rules to /etc/sysconfig/iptables: OK rootlocalhost # service iptables restart iptables: Flushing firewall rules: OK iptables: Setting c

4、hains to policy ACCEPT: filter OK iptables: Unloading modules: OK iptables: Applying firewall rules: OK 再次尝试用客户端连接,依然报错。查看下: rootlocalhost # service iptables status Table: filter Chain INPUT (policy ACCEPT) num target prot opt source destination 1 ACCEPT all - 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTAB

5、LISHED 2 ACCEPT icmp - 0.0.0.0/0 0.0.0.0/0 3 ACCEPT all - 0.0.0.0/0 0.0.0.0/0 4 ACCEPT tcp - 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:22 5 REJECT all - 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited 6 ACCEPT tcp - 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:50000 Chain FORWARD (policy ACCEPT) num targe

6、t prot opt source destination 1 REJECT all - 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited Chain OUTPUT (policy ACCEPT) num target prot opt source destination 原因猜测是优先顺序问题,在我们新规则之前有一个reject all,他禁止了对地发包的访问。 查询了下对应方法,发现我参数 iptables -A INPUT -m state -state NEW -m tcp -p tcp -dport 50000 -j ACCE

7、PT 改成 iptables -I INPUT -m state -state NEW -m tcp -p tcp -dport 50000 -j ACCEPT,应该可以实现 *-A是插入规则到末尾,-I是插入到顶部 把刚刚的规则删除: rootlocalhost # iptables -D INPUT 6 rootlocalhost # service iptables status Table: filter Chain INPUT (policy ACCEPT) num target prot opt source destination 1 ACCEPT all - 0.0.0.0/0

8、 0.0.0.0/0 state RELATED,ESTABLISHED 2 ACCEPT icmp - 0.0.0.0/0 0.0.0.0/0 3 ACCEPT all - 0.0.0.0/0 0.0.0.0/0 4 ACCEPT tcp - 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:22 5 REJECT all - 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited Chain FORWARD (policy ACCEPT) num target prot opt source destination

9、 1 REJECT all - 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited Chain OUTPUT (policy ACCEPT) num target prot opt source destination 删除成功,从新追加: rootlocalhost # iptables -I INPUT -m state -state NEW -m tcp -p tcp -dport 50000 -j ACCEPT rootlocalhost # service iptables status Table: filter Chain I

10、NPUT (policy ACCEPT) num target prot opt source destination 1 ACCEPT tcp - 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:50000 2 ACCEPT all - 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 3 ACCEPT icmp - 0.0.0.0/0 0.0.0.0/0 4 ACCEPT all - 0.0.0.0/0 0.0.0.0/0 5 ACCEPT tcp - 0.0.0.0/0 0.0.0.0/0 state NEW tcp

11、dpt:22 6 REJECT all - 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited Chain FORWARD (policy ACCEPT) num target prot opt source destination 1 REJECT all - 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited Chain OUTPUT (policy ACCEPT) num target prot opt source destination 再次尝试连接,OK连上了。 这个时候要记

12、得保存刚刚的更改。不然下次service iptables restart事件发生的话,那么此次设置无效,连接失败。 rootlocalhost # /etc/rc.d/init.d/iptables save iptables: Saving firewall rules to /etc/sysconfig/iptables: OK rootlocalhost # service iptables restart iptables: Flushing firewall rules: OK iptables: Setting chains to policy ACCEPT: filter OK

13、 iptables: Unloading modules: OK iptables: Applying firewall rules: OK rootlocalhost # service iptables status Table: filter Chain INPUT (policy ACCEPT) num target prot opt source destination 1 ACCEPT tcp - 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:50000 2 ACCEPT all - 0.0.0.0/0 0.0.0.0/0 state RELATED,

14、ESTABLISHED 3 ACCEPT icmp - 0.0.0.0/0 0.0.0.0/0 4 ACCEPT all - 0.0.0.0/0 0.0.0.0/0 5 ACCEPT tcp - 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:22 6 REJECT all - 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited Chain FORWARD (policy ACCEPT) num target prot opt source destination 1 REJECT all - 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited Chain OUTPUT (policy ACCEPT) num target prot opt source destination 到此结束。

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 生活休闲 > 在线阅读


备案号:宁ICP备20000045号-2

经营许可证:宁B2-20210002

宁公网安备 64010402000987号