This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

TCP RST FLAG

Hi all,

I've been testing one ethernet server device by a software client for a while.
I'm using the BSD socket method. By sniffering with Wireshark, during some traffic
sessions, the server send one packet with the RST flag on, so that the client has to forcibly
terminate the connection. To figure out it, I tried to increase the max number N of connection
requests queued into the user API "listen (sock, N)", it seems it works fine (no RST) but I don't
know if it is a rielable solution.

Thank you for your support,
Fabio