《关于Toad连接DB2的sqlstate=08001错误.docx》由会员分享,可在线阅读,更多相关《关于Toad连接DB2的sqlstate=08001错误.docx(5页珍藏版)》请在三一办公上搜索。
1、关于Toad连接DB2的sqlstate=08001错误关于Toad连接DB2的sqlstate=08001错误 新装的centos6.3+db29.7,数据库导入完了的之后用Toad连接访问之的时候出错了。 DB2 Database Error: ERROR 08001 IBM SQL30081N A communication error has been detected. Communication protocol being used: TCP/IP. Communication API being used: SOCKETS. Location where the error w
2、as detected: 10.20.51.155. Communication function detecting the error: selectForConnectTimeout. Protocol specific error code(s): 0, *, *. SQLSTATE=08001 (Remembered answer: OK. Enable) 查了好久,网上给了各种解释,其中有个人提到了可能与防火墙有关。 一开始我的做法很黄,就是把防火墙关了,连接下就能连上了。 $ service iptables stop 现在觉得需要添加规则,研究了下iptables相关命令。得出
3、 rootlocalhost # iptables -A INPUT -m state -state NEW -m tcp -p tcp -dport 50000 -j ACCEPT rootlocalhost # /etc/rc.d/init.d/iptables save iptables: Saving firewall rules to /etc/sysconfig/iptables: OK rootlocalhost # service iptables restart iptables: Flushing firewall rules: OK iptables: Setting c
4、hains to policy ACCEPT: filter OK iptables: Unloading modules: OK iptables: Applying firewall rules: OK 再次尝试用客户端连接,依然报错。查看下: rootlocalhost # service iptables status Table: filter Chain INPUT (policy ACCEPT) num target prot opt source destination 1 ACCEPT all - 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTAB
5、LISHED 2 ACCEPT icmp - 0.0.0.0/0 0.0.0.0/0 3 ACCEPT all - 0.0.0.0/0 0.0.0.0/0 4 ACCEPT tcp - 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:22 5 REJECT all - 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited 6 ACCEPT tcp - 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:50000 Chain FORWARD (policy ACCEPT) num targe
6、t prot opt source destination 1 REJECT all - 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited Chain OUTPUT (policy ACCEPT) num target prot opt source destination 原因猜测是优先顺序问题,在我们新规则之前有一个reject all,他禁止了对地发包的访问。 查询了下对应方法,发现我参数 iptables -A INPUT -m state -state NEW -m tcp -p tcp -dport 50000 -j ACCE
7、PT 改成 iptables -I INPUT -m state -state NEW -m tcp -p tcp -dport 50000 -j ACCEPT,应该可以实现 *-A是插入规则到末尾,-I是插入到顶部 把刚刚的规则删除: rootlocalhost # iptables -D INPUT 6 rootlocalhost # service iptables status Table: filter Chain INPUT (policy ACCEPT) num target prot opt source destination 1 ACCEPT all - 0.0.0.0/0
8、 0.0.0.0/0 state RELATED,ESTABLISHED 2 ACCEPT icmp - 0.0.0.0/0 0.0.0.0/0 3 ACCEPT all - 0.0.0.0/0 0.0.0.0/0 4 ACCEPT tcp - 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:22 5 REJECT all - 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited Chain FORWARD (policy ACCEPT) num target prot opt source destination
9、 1 REJECT all - 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited Chain OUTPUT (policy ACCEPT) num target prot opt source destination 删除成功,从新追加: rootlocalhost # iptables -I INPUT -m state -state NEW -m tcp -p tcp -dport 50000 -j ACCEPT rootlocalhost # service iptables status Table: filter Chain I
10、NPUT (policy ACCEPT) num target prot opt source destination 1 ACCEPT tcp - 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:50000 2 ACCEPT all - 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 3 ACCEPT icmp - 0.0.0.0/0 0.0.0.0/0 4 ACCEPT all - 0.0.0.0/0 0.0.0.0/0 5 ACCEPT tcp - 0.0.0.0/0 0.0.0.0/0 state NEW tcp
11、dpt:22 6 REJECT all - 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited Chain FORWARD (policy ACCEPT) num target prot opt source destination 1 REJECT all - 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited Chain OUTPUT (policy ACCEPT) num target prot opt source destination 再次尝试连接,OK连上了。 这个时候要记
12、得保存刚刚的更改。不然下次service iptables restart事件发生的话,那么此次设置无效,连接失败。 rootlocalhost # /etc/rc.d/init.d/iptables save iptables: Saving firewall rules to /etc/sysconfig/iptables: OK rootlocalhost # service iptables restart iptables: Flushing firewall rules: OK iptables: Setting chains to policy ACCEPT: filter OK
13、 iptables: Unloading modules: OK iptables: Applying firewall rules: OK rootlocalhost # service iptables status Table: filter Chain INPUT (policy ACCEPT) num target prot opt source destination 1 ACCEPT tcp - 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:50000 2 ACCEPT all - 0.0.0.0/0 0.0.0.0/0 state RELATED,
14、ESTABLISHED 3 ACCEPT icmp - 0.0.0.0/0 0.0.0.0/0 4 ACCEPT all - 0.0.0.0/0 0.0.0.0/0 5 ACCEPT tcp - 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:22 6 REJECT all - 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited Chain FORWARD (policy ACCEPT) num target prot opt source destination 1 REJECT all - 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited Chain OUTPUT (policy ACCEPT) num target prot opt source destination 到此结束。