Thanks Pierre, I'll definitely check your suggestions tomorrow.
-- Erik P. Olsen - Copenhagen, Denmark Fedora 30/64 bit Linux xfce Claws-Mail POP3 Gramps 5.1.1 Bacula 9.4.4 On 2019-12-05 at 14:25:23 Pierre Bernhardt wrote: > Am 05.12.19 um 13:59 schrieb Erik P. Olsen: > > Yes, ports 9101-9103 are all open. > > Do you have root access like with sudo? > Check on director server: > > Check that director is really running: > > pgrep -lf bacula-dir > 8473 bacula-dir > > If running is should be opened 9101 > which you can check with netstat: > > netstat -an |grep LISTEN|grep 910 > > You can try with tcpdump that a communication > is try to established: > > sudo tcpdump -ni <eth0 etc> port 9101 > > There should be something like this shown if you are starting a bconsole > from another machine: > > sudo tcpdump -ni eth0 port 9101 > tcpdump: verbose output suppressed, use -v or -vv for full protocol decode > listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes > root@backup:/media# tcpdump -ni eth0 port 9101 > tcpdump: verbose output suppressed, use -v or -vv for full protocol decode > listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes > 14:20:15.645897 IP 192.168.2.202.43984 > 192.168.2.254.9101: Flags [S], seq > 157316563, > win 29200, options [mss 1460,sackOK,TS val 362236160 ecr 0,nop,wscale 7], > length 0 > 14:20:15.645931 IP 192.168.2.254.9101 > 192.168.2.202.43984: Flags [S.], seq > 1935232238, ack 157316564, win 28960, options [mss 1460,sackOK,TS val > 1402703476 ecr > 362236160,nop,wscale 7], length 0 14:20:15.646116 IP 192.168.2.202.43984 > > 192.168.2.254.9101: Flags [.], ack 1, win 229, options [nop,nop,TS val > 362236160 ecr > 1402703476], length 0 14:20:15.646547 IP 192.168.2.202.43984 > > 192.168.2.254.9101: > Flags [P.], seq 1:35, ack 1, win 229, options [nop,nop,TS val 362236160 ecr > 1402703476], length 34 14:20:15.646598 IP 192.168.2.254.9101 > > 192.168.2.202.43984: > Flags [.], ack 35, win 227, options [nop,nop,TS val 1402703477 ecr > 362236160], length 0 > 14:20:15.646639 IP 192.168.2.254.9101 > 192.168.2.202.43984: Flags [P.], seq > 1:60, ack > 35, win 227, options [nop,nop,TS val 1402703477 ecr 362236160], length 59 > 14:20:15.647063 IP 192.168.2.202.43984 > 192.168.2.254.9101: Flags [.], ack > 60, win > 229, options [nop,nop,TS val 362236160 ecr 1402703477], length 0 > 14:20:15.647069 IP > 192.168.2.202.43984 > 192.168.2.254.9101: Flags [P.], seq 35:62, ack 60, win > 229, > options [nop,nop,TS val 362236160 ecr 1402703477], length 27 14:20:15.647114 > IP > 192.168.2.254.9101 > 192.168.2.202.43984: Flags [P.], seq 60:77, ack 62, win > 227, > options [nop,nop,TS val 1402703477 ecr 362236160], length 17 14:20:15.647526 > IP > 192.168.2.202.43984 > 192.168.2.254.9101: Flags [P.], seq 62:119, ack 77, win > 229, > options [nop,nop,TS val 362236160 ecr 1402703477], length 57 14:20:15.647567 > IP > 192.168.2.254.9101 > 192.168.2.202.43984: Flags [P.], seq 77:104, ack 119, > win 227, > options [nop,nop,TS val 1402703477 ecr 362236160], length 27 14:20:15.647782 > IP > 192.168.2.202.43984 > 192.168.2.254.9101: Flags [P.], seq 119:136, ack 104, > win 229, > options [nop,nop,TS val 362236160 ecr 1402703477], length 17 14:20:15.690505 > IP > 192.168.2.254.9101 > 192.168.2.202.43984: Flags [.], ack 136, win 227, options > [nop,nop,TS val 1402703488 ecr 362236160], length 0 14:20:15.690896 IP > 192.168.2.202.43984 > 192.168.2.254.9101: Flags [P.], seq 136:653, ack 104, > win 229, > options [nop,nop,TS val 362236171 ecr 1402703488], length 517 14:20:15.690907 > IP > 192.168.2.254.9101 > 192.168.2.202.43984: Flags [.], ack 653, win 235, options > [nop,nop,TS val 1402703488 ecr 362236171], length 0 14:20:15.691066 IP > 192.168.2.254.9101 > 192.168.2.202.43984: Flags [P.], seq 104:4200, ack 653, > win 235, > options [nop,nop,TS val 1402703488 ecr 362236171], length 4096 > 14:20:15.691947 IP > 192.168.2.202.43984 > 192.168.2.254.9101: Flags [.], ack 4200, win 293, > options > [nop,nop,TS val 362236171 ecr 1402703488], length 0 14:20:15.691955 IP > 192.168.2.254.9101 > 192.168.2.202.43984: Flags [P.], seq 4200:4606, ack 653, > win 235, > options [nop,nop,TS val 1402703488 ecr 362236171], length 406 14:20:15.692868 > IP > 192.168.2.202.43984 > 192.168.2.254.9101: Flags [P.], seq 653:660, ack 4606, > win 315, > options [nop,nop,TS val 362236171 ecr 1402703488], length 7 14:20:15.693863 IP > 192.168.2.202.43984 > 192.168.2.254.9101: Flags [R.], seq 660, ack 4606, win > 315, > options [nop,nop,TS val 362236172 ecr 1402703488], length 0 > > The first line is the connection request from bconsole, the second line the > answer from the director. > Maybe you will see other communication, which is not relevant, so it should > be shown exactly at time the bconsole has been executed. > > Cheers, > > > > > _______________________________________________ > Bacula-users mailing list > Bacula-users@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/bacula-users _______________________________________________ Bacula-users mailing list Bacula-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/bacula-users