Am 05.12.19 um 13:59 schrieb Erik P. Olsen: > Yes, ports 9101-9103 are all open. > Do you have root access like with sudo? Check on director server:
Check that director is really running: pgrep -lf bacula-dir 8473 bacula-dir If running is should be opened 9101 which you can check with netstat: netstat -an |grep LISTEN|grep 910 You can try with tcpdump that a communication is try to established: sudo tcpdump -ni <eth0 etc> port 9101 There should be something like this shown if you are starting a bconsole from another machine: sudo tcpdump -ni eth0 port 9101 tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes root@backup:/media# tcpdump -ni eth0 port 9101 tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes 14:20:15.645897 IP 192.168.2.202.43984 > 192.168.2.254.9101: Flags [S], seq 157316563, win 29200, options [mss 1460,sackOK,TS val 362236160 ecr 0,nop,wscale 7], length 0 14:20:15.645931 IP 192.168.2.254.9101 > 192.168.2.202.43984: Flags [S.], seq 1935232238, ack 157316564, win 28960, options [mss 1460,sackOK,TS val 1402703476 ecr 362236160,nop,wscale 7], length 0 14:20:15.646116 IP 192.168.2.202.43984 > 192.168.2.254.9101: Flags [.], ack 1, win 229, options [nop,nop,TS val 362236160 ecr 1402703476], length 0 14:20:15.646547 IP 192.168.2.202.43984 > 192.168.2.254.9101: Flags [P.], seq 1:35, ack 1, win 229, options [nop,nop,TS val 362236160 ecr 1402703476], length 34 14:20:15.646598 IP 192.168.2.254.9101 > 192.168.2.202.43984: Flags [.], ack 35, win 227, options [nop,nop,TS val 1402703477 ecr 362236160], length 0 14:20:15.646639 IP 192.168.2.254.9101 > 192.168.2.202.43984: Flags [P.], seq 1:60, ack 35, win 227, options [nop,nop,TS val 1402703477 ecr 362236160], length 59 14:20:15.647063 IP 192.168.2.202.43984 > 192.168.2.254.9101: Flags [.], ack 60, win 229, options [nop,nop,TS val 362236160 ecr 1402703477], length 0 14:20:15.647069 IP 192.168.2.202.43984 > 192.168.2.254.9101: Flags [P.], seq 35:62, ack 60, win 229, options [nop,nop,TS val 362236160 ecr 1402703477], length 27 14:20:15.647114 IP 192.168.2.254.9101 > 192.168.2.202.43984: Flags [P.], seq 60:77, ack 62, win 227, options [nop,nop,TS val 1402703477 ecr 362236160], length 17 14:20:15.647526 IP 192.168.2.202.43984 > 192.168.2.254.9101: Flags [P.], seq 62:119, ack 77, win 229, options [nop,nop,TS val 362236160 ecr 1402703477], length 57 14:20:15.647567 IP 192.168.2.254.9101 > 192.168.2.202.43984: Flags [P.], seq 77:104, ack 119, win 227, options [nop,nop,TS val 1402703477 ecr 362236160], length 27 14:20:15.647782 IP 192.168.2.202.43984 > 192.168.2.254.9101: Flags [P.], seq 119:136, ack 104, win 229, options [nop,nop,TS val 362236160 ecr 1402703477], length 17 14:20:15.690505 IP 192.168.2.254.9101 > 192.168.2.202.43984: Flags [.], ack 136, win 227, options [nop,nop,TS val 1402703488 ecr 362236160], length 0 14:20:15.690896 IP 192.168.2.202.43984 > 192.168.2.254.9101: Flags [P.], seq 136:653, ack 104, win 229, options [nop,nop,TS val 362236171 ecr 1402703488], length 517 14:20:15.690907 IP 192.168.2.254.9101 > 192.168.2.202.43984: Flags [.], ack 653, win 235, options [nop,nop,TS val 1402703488 ecr 362236171], length 0 14:20:15.691066 IP 192.168.2.254.9101 > 192.168.2.202.43984: Flags [P.], seq 104:4200, ack 653, win 235, options [nop,nop,TS val 1402703488 ecr 362236171], length 4096 14:20:15.691947 IP 192.168.2.202.43984 > 192.168.2.254.9101: Flags [.], ack 4200, win 293, options [nop,nop,TS val 362236171 ecr 1402703488], length 0 14:20:15.691955 IP 192.168.2.254.9101 > 192.168.2.202.43984: Flags [P.], seq 4200:4606, ack 653, win 235, options [nop,nop,TS val 1402703488 ecr 362236171], length 406 14:20:15.692868 IP 192.168.2.202.43984 > 192.168.2.254.9101: Flags [P.], seq 653:660, ack 4606, win 315, options [nop,nop,TS val 362236171 ecr 1402703488], length 7 14:20:15.693863 IP 192.168.2.202.43984 > 192.168.2.254.9101: Flags [R.], seq 660, ack 4606, win 315, options [nop,nop,TS val 362236172 ecr 1402703488], length 0 The first line is the connection request from bconsole, the second line the answer from the director. Maybe you will see other communication, which is not relevant, so it should be shown exactly at time the bconsole has been executed. Cheers, _______________________________________________ Bacula-users mailing list Bacula-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/bacula-users