Thanks Pierre,

I'll definitely check your suggestions tomorrow.

-- 
Erik P. Olsen - Copenhagen, Denmark
Fedora 30/64 bit Linux xfce Claws-Mail POP3 Gramps 5.1.1 Bacula 9.4.4

On 2019-12-05 at 14:25:23 Pierre Bernhardt wrote:

> Am 05.12.19 um 13:59 schrieb Erik P. Olsen:
> > Yes, ports 9101-9103 are all open.
> > Do you have root access like with sudo?  
> Check on director server:
> 
> Check that director is really running:
> 
> pgrep -lf bacula-dir
> 8473 bacula-dir
> 
> If running is should be opened 9101
> which you can check with netstat:
> 
> netstat -an |grep LISTEN|grep 910
> 
> You can try with tcpdump that a communication
> is try to established:
> 
> sudo tcpdump -ni <eth0 etc> port 9101
> 
> There should be something like this shown if you are starting a bconsole
> from another machine:
> 
> sudo tcpdump -ni eth0 port 9101
> tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
> listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
> root@backup:/media# tcpdump -ni eth0 port 9101
> tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
> listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
> 14:20:15.645897 IP 192.168.2.202.43984 > 192.168.2.254.9101: Flags [S], seq 
> 157316563,
> win 29200, options [mss 1460,sackOK,TS val 362236160 ecr 0,nop,wscale 7], 
> length 0
> 14:20:15.645931 IP 192.168.2.254.9101 > 192.168.2.202.43984: Flags [S.], seq
> 1935232238, ack 157316564, win 28960, options [mss 1460,sackOK,TS val 
> 1402703476 ecr
> 362236160,nop,wscale 7], length 0 14:20:15.646116 IP 192.168.2.202.43984 >
> 192.168.2.254.9101: Flags [.], ack 1, win 229, options [nop,nop,TS val 
> 362236160 ecr
> 1402703476], length 0 14:20:15.646547 IP 192.168.2.202.43984 > 
> 192.168.2.254.9101:
> Flags [P.], seq 1:35, ack 1, win 229, options [nop,nop,TS val 362236160 ecr
> 1402703476], length 34 14:20:15.646598 IP 192.168.2.254.9101 > 
> 192.168.2.202.43984:
> Flags [.], ack 35, win 227, options [nop,nop,TS val 1402703477 ecr 
> 362236160], length 0
> 14:20:15.646639 IP 192.168.2.254.9101 > 192.168.2.202.43984: Flags [P.], seq 
> 1:60, ack
> 35, win 227, options [nop,nop,TS val 1402703477 ecr 362236160], length 59
> 14:20:15.647063 IP 192.168.2.202.43984 > 192.168.2.254.9101: Flags [.], ack 
> 60, win
> 229, options [nop,nop,TS val 362236160 ecr 1402703477], length 0 
> 14:20:15.647069 IP
> 192.168.2.202.43984 > 192.168.2.254.9101: Flags [P.], seq 35:62, ack 60, win 
> 229,
> options [nop,nop,TS val 362236160 ecr 1402703477], length 27 14:20:15.647114 
> IP
> 192.168.2.254.9101 > 192.168.2.202.43984: Flags [P.], seq 60:77, ack 62, win 
> 227,
> options [nop,nop,TS val 1402703477 ecr 362236160], length 17 14:20:15.647526 
> IP
> 192.168.2.202.43984 > 192.168.2.254.9101: Flags [P.], seq 62:119, ack 77, win 
> 229,
> options [nop,nop,TS val 362236160 ecr 1402703477], length 57 14:20:15.647567 
> IP
> 192.168.2.254.9101 > 192.168.2.202.43984: Flags [P.], seq 77:104, ack 119, 
> win 227,
> options [nop,nop,TS val 1402703477 ecr 362236160], length 27 14:20:15.647782 
> IP
> 192.168.2.202.43984 > 192.168.2.254.9101: Flags [P.], seq 119:136, ack 104, 
> win 229,
> options [nop,nop,TS val 362236160 ecr 1402703477], length 17 14:20:15.690505 
> IP
> 192.168.2.254.9101 > 192.168.2.202.43984: Flags [.], ack 136, win 227, options
> [nop,nop,TS val 1402703488 ecr 362236160], length 0 14:20:15.690896 IP
> 192.168.2.202.43984 > 192.168.2.254.9101: Flags [P.], seq 136:653, ack 104, 
> win 229,
> options [nop,nop,TS val 362236171 ecr 1402703488], length 517 14:20:15.690907 
> IP
> 192.168.2.254.9101 > 192.168.2.202.43984: Flags [.], ack 653, win 235, options
> [nop,nop,TS val 1402703488 ecr 362236171], length 0 14:20:15.691066 IP
> 192.168.2.254.9101 > 192.168.2.202.43984: Flags [P.], seq 104:4200, ack 653, 
> win 235,
> options [nop,nop,TS val 1402703488 ecr 362236171], length 4096 
> 14:20:15.691947 IP
> 192.168.2.202.43984 > 192.168.2.254.9101: Flags [.], ack 4200, win 293, 
> options
> [nop,nop,TS val 362236171 ecr 1402703488], length 0 14:20:15.691955 IP
> 192.168.2.254.9101 > 192.168.2.202.43984: Flags [P.], seq 4200:4606, ack 653, 
> win 235,
> options [nop,nop,TS val 1402703488 ecr 362236171], length 406 14:20:15.692868 
> IP
> 192.168.2.202.43984 > 192.168.2.254.9101: Flags [P.], seq 653:660, ack 4606, 
> win 315,
> options [nop,nop,TS val 362236171 ecr 1402703488], length 7 14:20:15.693863 IP
> 192.168.2.202.43984 > 192.168.2.254.9101: Flags [R.], seq 660, ack 4606, win 
> 315,
> options [nop,nop,TS val 362236172 ecr 1402703488], length 0
> 
> The first line is the connection request from bconsole, the second line the
> answer from the director.
> Maybe you will see other communication, which is not relevant, so it should
> be shown exactly at time the bconsole has been executed.
> 
> Cheers,
> 
> 
> 
> 
> _______________________________________________
> Bacula-users mailing list
> Bacula-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/bacula-users

 



_______________________________________________
Bacula-users mailing list
Bacula-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/bacula-users

Reply via email to