salutare,
client oracle - linux router1 - linux router2 - linux3 - ipsec -
checkpoint - server oracle

din cand in cand (nu am reusit sa determin conditia de aparitie a
situatiei) clientul primeste succesiunea de erori: ORA-03113:
end-of-file on communication channel; ORA-03114 not connected to
oracle; Oracle has terminated the session or the connection is
dropped.

am pornit un ping -t catre oracle pe masina client si am asteptat sa
apara eroarea; am atasat un tcpdump cu comentarii la momentul cu
eroarea.
10.253.7.2 este masina client; 10.70.1.10 este masina server
tcpdump-ul este rulat pe linux3
eroarea apare la toate cele 3 masini client, independent una de
cealalta (in timp ce secventa de PUSH-uri se repeta la o masina, alta
masina avea trafic ok), dupa un anumit timp de inactivitate

banuiesc vreo setare de timeout la serverul oracle (SQLNET.EXPIRE_TIME
setat in sqlnet.ora), insa inainte de a intreba partenerul vreau sa ma
asigur ca in 'ograda' mea nu sunt probleme; ce nu inteleg eu din logul
tcpdump este de ce dupa primul PUSH (P [tcp sum ok]
181163780:181163801(21)) o ia de la zero cu secventa tcp (P [tcp sum
ok] 0:21(21) ack 1)

in majoritatea cazurilor repeta secventa cu 0:21, dar am prins si un
caz cand a repetat, de exemplu, cu P[tcp sum ok] 41580:41603(23)

alte detalii... pe linux1 nu este nici un filtru, este doar
ip_forward; pe linux2 i se face nat in ambele sensuri (masina client
vine de la linux1 cu 192.168.7.2 si iese catre linux3 cu 10.253.7.2,
iar traficul care vine de la linux3 catre 10.253.7.2 iese spre linux1
cu 192.168.7.2); linux2 mai are activat ip_conntrack (are un -A
FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT)

multumesc
costin

-- Attached file included as plaintext by Ecartis --
-- File: tcpdump cu pingul pornit.txt

# ping -t in cmd pe masina cu clientul oracle
09:19:50.104640 IP (tos 0x0, ttl 126, id 17072, offset 0, flags [none], length: 
60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 29441
09:19:50.172618 IP (tos 0x0, ttl 254, id 65159, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 29441
09:19:50.172737 IP (tos 0x0, ttl 253, id 65159, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 29441
# icmp reply-urile apar de doua ori pentru ca tcpdump ruleaza pe masina cu 
tunelul ipsec, o data cand vine reply-ul (ttl 254) si a doua oara cand iese 
(ttl 253), masina avand o singura interfata de retea
09:19:51.106438 IP (tos 0x0, ttl 126, id 17085, offset 0, flags [none], length: 
60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 29697
09:19:51.187743 IP (tos 0x0, ttl 254, id 65160, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 29697
09:19:51.187861 IP (tos 0x0, ttl 253, id 65160, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 29697
09:19:52.109341 IP (tos 0x0, ttl 126, id 17096, offset 0, flags [none], length: 
60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 29953
09:19:52.183778 IP (tos 0x0, ttl 254, id 65161, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 29953
09:19:52.183880 IP (tos 0x0, ttl 253, id 65161, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 29953
09:19:53.110242 IP (tos 0x0, ttl 126, id 17107, offset 0, flags [none], length: 
60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 30209
09:19:53.185074 IP (tos 0x0, ttl 254, id 65162, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 30209
09:19:53.185173 IP (tos 0x0, ttl 253, id 65162, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 30209
09:19:54.111152 IP (tos 0x0, ttl 126, id 17120, offset 0, flags [none], length: 
60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 30465
09:19:54.188212 IP (tos 0x0, ttl 254, id 65163, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 30465
09:19:54.188314 IP (tos 0x0, ttl 253, id 65163, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 30465
# aici da click pe execute query (la netstat -na pe masina windows conexiunea 
apare ESTABLISHED)
09:19:54.385475 IP (tos 0x0, ttl 126, id 17124, offset 0, flags [DF], length: 
61) 10.253.7.2.3632 > 10.70.1.10.1521: P [tcp sum ok] 181163780:181163801(21) 
ack 1225528577 win 64220
09:19:54.986965 IP (tos 0x0, ttl 126, id 17131, offset 0, flags [DF], length: 
61) 10.253.7.2.3632 > 10.70.1.10.1521: P [tcp sum ok] 0:21(21) ack 1 win 64220
09:19:55.113066 IP (tos 0x0, ttl 126, id 17133, offset 0, flags [none], length: 
60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 30721
09:19:55.177414 IP (tos 0x0, ttl 254, id 65164, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 30721
09:19:55.177516 IP (tos 0x0, ttl 253, id 65164, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 30721
09:19:56.115455 IP (tos 0x0, ttl 126, id 17145, offset 0, flags [none], length: 
60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 30977
09:19:56.181948 IP (tos 0x0, ttl 254, id 65165, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 30977
09:19:56.182069 IP (tos 0x0, ttl 253, id 65165, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 30977
09:19:56.190447 IP (tos 0x0, ttl 126, id 17147, offset 0, flags [DF], length: 
61) 10.253.7.2.3632 > 10.70.1.10.1521: P [tcp sum ok] 0:21(21) ack 1 win 64220
09:19:57.116900 IP (tos 0x0, ttl 126, id 17157, offset 0, flags [none], length: 
60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 31233
09:19:57.180655 IP (tos 0x0, ttl 254, id 65166, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 31233
09:19:57.180756 IP (tos 0x0, ttl 253, id 65166, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 31233
09:19:58.118804 IP (tos 0x0, ttl 126, id 17169, offset 0, flags [none], length: 
60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 31489
09:19:58.194209 IP (tos 0x0, ttl 254, id 65167, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 31489
09:19:58.194309 IP (tos 0x0, ttl 253, id 65167, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 31489
09:19:58.597457 IP (tos 0x0, ttl 126, id 17175, offset 0, flags [DF], length: 
61) 10.253.7.2.3632 > 10.70.1.10.1521: P [tcp sum ok] 0:21(21) ack 1 win 64220
09:19:59.120028 IP (tos 0x0, ttl 126, id 17181, offset 0, flags [none], length: 
60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 31745
09:19:59.188867 IP (tos 0x0, ttl 254, id 65168, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 31745
09:19:59.188977 IP (tos 0x0, ttl 253, id 65168, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 31745
09:20:00.121593 IP (tos 0x0, ttl 126, id 17193, offset 0, flags [none], length: 
60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 32001
09:20:00.194147 IP (tos 0x0, ttl 254, id 65169, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 32001
09:20:00.194253 IP (tos 0x0, ttl 253, id 65169, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 32001
09:20:01.122514 IP (tos 0x0, ttl 126, id 17318, offset 0, flags [none], length: 
60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 32257
09:20:01.192905 IP (tos 0x0, ttl 254, id 65170, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 32257
09:20:01.193009 IP (tos 0x0, ttl 253, id 65170, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 32257
09:20:01.416873 IP (tos 0x0, ttl 254, id 65171, offset 0, flags [none], length: 
84) 10.70.1.10 > 10.253.7.1: icmp 64: echo reply seq 1
09:20:02.124749 IP (tos 0x0, ttl 126, id 17329, offset 0, flags [none], length: 
60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 32513
09:20:02.191396 IP (tos 0x0, ttl 254, id 65172, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 32513
09:20:02.191517 IP (tos 0x0, ttl 253, id 65172, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 32513
09:20:03.126346 IP (tos 0x0, ttl 126, id 17340, offset 0, flags [none], length: 
60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 32769
09:20:03.204510 IP (tos 0x0, ttl 254, id 65173, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 32769
09:20:03.204616 IP (tos 0x0, ttl 253, id 65173, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 32769
09:20:03.411417 IP (tos 0x0, ttl 126, id 17343, offset 0, flags [DF], length: 
61) 10.253.7.2.3632 > 10.70.1.10.1521: P [tcp sum ok] 0:21(21) ack 1 win 64220
09:20:04.128281 IP (tos 0x0, ttl 126, id 17352, offset 0, flags [none], length: 
60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 33025
09:20:04.193424 IP (tos 0x0, ttl 254, id 65174, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 33025
09:20:04.193528 IP (tos 0x0, ttl 253, id 65174, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 33025
09:20:05.134170 IP (tos 0x0, ttl 126, id 17363, offset 0, flags [none], length: 
60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 33281
09:20:05.246722 IP (tos 0x0, ttl 254, id 65175, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 33281
09:20:05.246822 IP (tos 0x0, ttl 253, id 65175, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 33281
09:20:06.135086 IP (tos 0x0, ttl 126, id 17376, offset 0, flags [none], length: 
60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 33537
09:20:06.200681 IP (tos 0x0, ttl 254, id 65176, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 33537
09:20:06.200786 IP (tos 0x0, ttl 253, id 65176, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 33537
09:20:07.136988 IP (tos 0x0, ttl 126, id 17387, offset 0, flags [none], length: 
60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 33793
09:20:07.487776 IP (tos 0x0, ttl 254, id 65177, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 33793
09:20:07.487877 IP (tos 0x0, ttl 253, id 65177, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 33793
09:20:08.137893 IP (tos 0x0, ttl 126, id 17398, offset 0, flags [none], length: 
60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 34049
09:20:08.203007 IP (tos 0x0, ttl 254, id 65178, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 34049
09:20:08.203116 IP (tos 0x0, ttl 253, id 65178, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 34049
09:20:09.141167 IP (tos 0x0, ttl 126, id 17411, offset 0, flags [none], length: 
60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 34305
09:20:09.206861 IP (tos 0x0, ttl 254, id 65179, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 34305
09:20:09.206968 IP (tos 0x0, ttl 253, id 65179, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 34305
09:20:10.143076 IP (tos 0x0, ttl 126, id 17423, offset 0, flags [none], length: 
60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 34561
09:20:10.219406 IP (tos 0x0, ttl 254, id 65180, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 34561
09:20:10.219507 IP (tos 0x0, ttl 253, id 65180, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 34561
09:20:11.147640 IP (tos 0x0, ttl 126, id 17435, offset 0, flags [none], length: 
60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 34817
09:20:11.218862 IP (tos 0x0, ttl 254, id 65181, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 34817
09:20:11.218963 IP (tos 0x0, ttl 253, id 65181, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 34817
09:20:12.150558 IP (tos 0x0, ttl 126, id 17446, offset 0, flags [none], length: 
60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 35073
09:20:12.214123 IP (tos 0x0, ttl 254, id 65182, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 35073
09:20:12.214224 IP (tos 0x0, ttl 253, id 65182, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 35073
09:20:13.039394 IP (tos 0x0, ttl 126, id 17456, offset 0, flags [DF], length: 
61) 10.253.7.2.3632 > 10.70.1.10.1521: P [tcp sum ok] 0:21(21) ack 1 win 64220
# dupa inca 21 de secunde, la 40 de secunde de la click pe execute query, 
aplicatia client raporteaza eroarea ORA-03113 end-of-file on communication 
channel
09:20:13.151466 IP (tos 0x0, ttl 126, id 17458, offset 0, flags [none], length: 
60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 35329
09:20:13.216215 IP (tos 0x0, ttl 254, id 65183, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 35329
09:20:13.216314 IP (tos 0x0, ttl 253, id 65183, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 35329
09:20:14.153378 IP (tos 0x0, ttl 126, id 17469, offset 0, flags [none], length: 
60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 35585
09:20:14.219746 IP (tos 0x0, ttl 254, id 65184, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 35585
09:20:14.219847 IP (tos 0x0, ttl 253, id 65184, offset 0, flags [none], length: 
60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 35585



--- 
Detalii despre listele noastre de mail: http://www.lug.ro/


Raspunde prin e-mail lui