Am 05.12.19 um 13:59 schrieb Erik P. Olsen:
> Yes, ports 9101-9103 are all open.
> Do you have root access like with sudo?
Check on director server:

Check that director is really running:

pgrep -lf bacula-dir
8473 bacula-dir

If running is should be opened 9101
which you can check with netstat:

netstat -an |grep LISTEN|grep 910

You can try with tcpdump that a communication
is try to established:

sudo tcpdump -ni <eth0 etc> port 9101

There should be something like this shown if you are starting a bconsole
from another machine:

sudo tcpdump -ni eth0 port 9101
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
root@backup:/media# tcpdump -ni eth0 port 9101
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
14:20:15.645897 IP 192.168.2.202.43984 > 192.168.2.254.9101: Flags [S], seq 
157316563, win 29200, options [mss 1460,sackOK,TS val 362236160 ecr 
0,nop,wscale 7], length 0
14:20:15.645931 IP 192.168.2.254.9101 > 192.168.2.202.43984: Flags [S.], seq 
1935232238, ack 157316564, win 28960, options [mss 1460,sackOK,TS val 
1402703476 ecr 362236160,nop,wscale 7], length 0
14:20:15.646116 IP 192.168.2.202.43984 > 192.168.2.254.9101: Flags [.], ack 1, 
win 229, options [nop,nop,TS val 362236160 ecr 1402703476], length 0
14:20:15.646547 IP 192.168.2.202.43984 > 192.168.2.254.9101: Flags [P.], seq 
1:35, ack 1, win 229, options [nop,nop,TS val 362236160 ecr 1402703476], length 
34
14:20:15.646598 IP 192.168.2.254.9101 > 192.168.2.202.43984: Flags [.], ack 35, 
win 227, options [nop,nop,TS val 1402703477 ecr 362236160], length 0
14:20:15.646639 IP 192.168.2.254.9101 > 192.168.2.202.43984: Flags [P.], seq 
1:60, ack 35, win 227, options [nop,nop,TS val 1402703477 ecr 362236160], 
length 59
14:20:15.647063 IP 192.168.2.202.43984 > 192.168.2.254.9101: Flags [.], ack 60, 
win 229, options [nop,nop,TS val 362236160 ecr 1402703477], length 0
14:20:15.647069 IP 192.168.2.202.43984 > 192.168.2.254.9101: Flags [P.], seq 
35:62, ack 60, win 229, options [nop,nop,TS val 362236160 ecr 1402703477], 
length 27
14:20:15.647114 IP 192.168.2.254.9101 > 192.168.2.202.43984: Flags [P.], seq 
60:77, ack 62, win 227, options [nop,nop,TS val 1402703477 ecr 362236160], 
length 17
14:20:15.647526 IP 192.168.2.202.43984 > 192.168.2.254.9101: Flags [P.], seq 
62:119, ack 77, win 229, options [nop,nop,TS val 362236160 ecr 1402703477], 
length 57
14:20:15.647567 IP 192.168.2.254.9101 > 192.168.2.202.43984: Flags [P.], seq 
77:104, ack 119, win 227, options [nop,nop,TS val 1402703477 ecr 362236160], 
length 27
14:20:15.647782 IP 192.168.2.202.43984 > 192.168.2.254.9101: Flags [P.], seq 
119:136, ack 104, win 229, options [nop,nop,TS val 362236160 ecr 1402703477], 
length 17
14:20:15.690505 IP 192.168.2.254.9101 > 192.168.2.202.43984: Flags [.], ack 
136, win 227, options [nop,nop,TS val 1402703488 ecr 362236160], length 0
14:20:15.690896 IP 192.168.2.202.43984 > 192.168.2.254.9101: Flags [P.], seq 
136:653, ack 104, win 229, options [nop,nop,TS val 362236171 ecr 1402703488], 
length 517
14:20:15.690907 IP 192.168.2.254.9101 > 192.168.2.202.43984: Flags [.], ack 
653, win 235, options [nop,nop,TS val 1402703488 ecr 362236171], length 0
14:20:15.691066 IP 192.168.2.254.9101 > 192.168.2.202.43984: Flags [P.], seq 
104:4200, ack 653, win 235, options [nop,nop,TS val 1402703488 ecr 362236171], 
length 4096
14:20:15.691947 IP 192.168.2.202.43984 > 192.168.2.254.9101: Flags [.], ack 
4200, win 293, options [nop,nop,TS val 362236171 ecr 1402703488], length 0
14:20:15.691955 IP 192.168.2.254.9101 > 192.168.2.202.43984: Flags [P.], seq 
4200:4606, ack 653, win 235, options [nop,nop,TS val 1402703488 ecr 362236171], 
length 406
14:20:15.692868 IP 192.168.2.202.43984 > 192.168.2.254.9101: Flags [P.], seq 
653:660, ack 4606, win 315, options [nop,nop,TS val 362236171 ecr 1402703488], 
length 7
14:20:15.693863 IP 192.168.2.202.43984 > 192.168.2.254.9101: Flags [R.], seq 
660, ack 4606, win 315, options [nop,nop,TS val 362236172 ecr 1402703488], 
length 0

The first line is the connection request from bconsole, the second line the
answer from the director.
Maybe you will see other communication, which is not relevant, so it should
be shown exactly at time the bconsole has been executed.

Cheers,




_______________________________________________
Bacula-users mailing list
Bacula-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/bacula-users

Reply via email to