Microsoft KB Archive/241985

From BetaArchive Wiki
Knowledge Base


Article ID: 241985

Article Last Modified on 2/22/2007



APPLIES TO

  • Microsoft SNA Server 3.0 Service Pack 4
  • Microsoft SNA Server 4.0
  • Microsoft SNA Server 3.0 Service Pack 2
  • Microsoft SNA Server 3.0 Service Pack 3
  • Microsoft SNA Server 3.0 Service Pack 4
  • Microsoft SNA Server 4.0
  • Microsoft SNA Server 4.0 Service Pack 1
  • Microsoft SNA Server 4.0 Service Pack 2
  • Microsoft SNA Server 4.0 Service Pack 3
  • Microsoft SNA Server 4.0 Service Pack 4
  • Microsoft Host Integration Server 2000 Standard Edition
  • Microsoft Host Integration Server 2000 Service Pack 1



This article was previously published under Q241985

Important This article contains information about modifying the registry. Before you modify the registry, make sure to back it up and make sure that you understand how to restore the registry if a problem occurs. For information about how to back up, restore, and edit the registry, click the following article number to view the article in the Microsoft Knowledge Base:

256986 Description of the Microsoft Windows Registry


SYMPTOMS

SNA Clients connecting to the SNA Server computer through TCP/IP may have intermittent problems with 3270 sessions dropping. The user's emulator may go to a blank screen, or it may be returned to the mainframe sign-on screen. In either case, the session must be restarted.

The following event may be logged in the Application event log on the SNA Server computer:

Event 21
(1124) Negative Response Sent on Connection value (SENSE = 831)
SUBCODE INFORMATION:

X'1124' A negative response was sent and logged. This error normally follows a more specific error message, depending on the type of negative response sent and its cause. The SNA sense data provides details about the type of error.

ACTION: See IBM Systems Network Architecture: Formats for an explanation of the sense data.

CAUSE

When the SNA Client is configured to use the TCP/IP sockets interface to communicate with the SNA Server computer, the TCP/IP messages flowing between the computers have the "Don't Fragment" bit set. A TCP/IP router may not return a "destination unreachable" message to the host when it needs to fragment a TCP segment with the "Don't Fragment" bit set. Instead, it drops the segment, and the host gets a "destination not receiving data" message. Consequently, the host retransmits the segment until the retransmission limit is reached (the default is 5). After reaching this limit, the session is reset.

Note: This is just one cause of the Event 21 error. There may be other issues that cause this error to be logged.

RESOLUTION

On the SNA Server computer, set the following registry value to 1. The server must be restarted for the change to take affect.

Warning If you use Registry Editor incorrectly, you may cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that you can solve problems that result from using Registry Editor incorrectly. Use Registry Editor at your own risk.

  1. Start Registry Editor (Regedt32.exe).
  2. Locate the following key in the registry:

    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\tcpip\parameters

  3. On the Edit menu, click Add Value, and then add the following registry value:

    Value Name: EnablePMTUBHDetect
    Data Type: REG_DWORD
    Value: 1

  4. Quit Registry Editor.


MORE INFORMATION

When a TCP/IP segment is sent from the host to the router with the "Don't Fragment" bit set, and the segment is too large for the router to handle, the router should notify the host with a "Destination Unreachable" message. However, sometimes the router does not send the notification to the host, and instead, it drops the segment. A router that simply drops packets in this manner is called a "Black Hole" router.

Setting the registry parameter to 1 (True) enables TCP to try to detect "Black Hole" routers. With this feature enabled, TCP attempts to send segments without the "Don't Fragment" bit set if several retransmissions of a segment are unacknowledged. If the segment is acknowledged as a result, the TCP Maximum Segment Size (MSS) is decreased and the "Don't Fragment" bit is set in future packets on the connection.

For additional information, click the following article numbers to view the articles in the Microsoft Knowledge Base:

120642 TCP/IP and NBT configuration parameters for Windows 2000 or Windows NT


136970 PMTU black hole detection algorithm change for Windows NT 3.51


159211 Diagnoses and treatment of black hole routers


Keywords: kbprb KB241985