2008-08-21 54 views
0

我正在嘗試使用Symantec Backup Exec 11d(修訂版7170)對RedHat Enterprise Linux v4服務器執行文件系統備份。備份服務器是Windows Server 2003.Symantec Backup Exec 11d RALUS通信錯誤

我可以瀏覽目標服務器以創建選擇列表,並且當我執行測試運行時,它會成功完成。 - 發生通信故障已發生

e000fe30:

然而,當我運行一個真正的備份,作業立即在「處理」階段,出現錯誤失敗。

我試過開放端口(10000,1025-9999)等,但沒有喜悅。有任何想法嗎?

回答

1

確實聽起來像防火牆問題。嘗試停止iptables,並再次運行。此外,RALUS可以轉儲日誌文件 - 這可能會讓更多人繼續。

我自己使用較早的UNIX代理,它使用端口6101 IIRC - 但我認爲較新的客戶端使用tcp/10000進行控制,使用1024-65535進行傳輸。

最後的手段是啓動網絡嗅探器。 ;)

0

爲了澄清答案,解決方案是打開1024-65535的tcp端口。

iptables的神情很喜歡這樣的:

[[email protected] ~]# service iptables status 
Table: filter 
Chain INPUT (policy ACCEPT) 
target  prot opt source    destination 
RH-Firewall-1-INPUT all -- 0.0.0.0/0   0.0.0.0/0 

Chain FORWARD (policy ACCEPT) 
target  prot opt source    destination 
RH-Firewall-1-INPUT all -- 0.0.0.0/0   0.0.0.0/0 

Chain OUTPUT (policy ACCEPT) 
target  prot opt source    destination 

Chain RH-Firewall-1-INPUT (2 references) 
target  prot opt source    destination 
ACCEPT  all -- 0.0.0.0/0   0.0.0.0/0 
ACCEPT  icmp -- 0.0.0.0/0   0.0.0.0/0   icmp type 255 
ACCEPT  esp -- 0.0.0.0/0   0.0.0.0/0 
ACCEPT  ah -- 0.0.0.0/0   0.0.0.0/0 
ACCEPT  udp -- 0.0.0.0/0   224.0.0.251   udp dpt:5353 
ACCEPT  udp -- 0.0.0.0/0   0.0.0.0/0   udp dpt:631 
ACCEPT  all -- 0.0.0.0/0   0.0.0.0/0   state RELATED,ESTABLISHED 
ACCEPT  tcp -- 0.0.0.0/0   0.0.0.0/0   state NEW tcp dpt:80 
ACCEPT  tcp -- 0.0.0.0/0   0.0.0.0/0   state NEW tcp dpt:443 
ACCEPT  tcp -- 0.0.0.0/0   0.0.0.0/0   state NEW tcp dpt:22 
ACCEPT  tcp -- 0.0.0.0/0   0.0.0.0/0   state NEW tcp dpt:5801 
ACCEPT  tcp -- 0.0.0.0/0   0.0.0.0/0   state NEW tcp dpt:5802 
ACCEPT  tcp -- 0.0.0.0/0   0.0.0.0/0   state NEW tcp dpt:5804 
ACCEPT  tcp -- 0.0.0.0/0   0.0.0.0/0   state NEW tcp dpt:5901 
ACCEPT  tcp -- 0.0.0.0/0   0.0.0.0/0   state NEW tcp dpt:5902 
ACCEPT  tcp -- 0.0.0.0/0   0.0.0.0/0   state NEW tcp dpt:5904 
ACCEPT  tcp -- 0.0.0.0/0   0.0.0.0/0   state NEW tcp dpt:9099 
ACCEPT  tcp -- 0.0.0.0/0   0.0.0.0/0   state NEW tcp dpt:10000 
ACCEPT  tcp -- 0.0.0.0/0   0.0.0.0/0   state NEW tcp dpt:1025 
REJECT  all -- 0.0.0.0/0   0.0.0.0/0   reject-with icmp-host-prohibited 

我執行這個命令添加新的規則:

[[email protected] ~]# iptables -I RH-Firewall-1-INPUT 14 -p tcp -m tcp --dport 1024:65535 -j ACCEPT 

然後,他們是這樣的:

[[email protected] ~]# service iptables status 
Table: filter 
Chain INPUT (policy ACCEPT) 
target  prot opt source    destination 
RH-Firewall-1-INPUT all -- 0.0.0.0/0   0.0.0.0/0 

Chain FORWARD (policy ACCEPT) 
target  prot opt source    destination 
RH-Firewall-1-INPUT all -- 0.0.0.0/0   0.0.0.0/0 

Chain OUTPUT (policy ACCEPT) 
target  prot opt source    destination 

Chain RH-Firewall-1-INPUT (2 references) 
target  prot opt source    destination 
ACCEPT  all -- 0.0.0.0/0   0.0.0.0/0 
ACCEPT  icmp -- 0.0.0.0/0   0.0.0.0/0   icmp type 255 
ACCEPT  esp -- 0.0.0.0/0   0.0.0.0/0 
ACCEPT  ah -- 0.0.0.0/0   0.0.0.0/0 
ACCEPT  udp -- 0.0.0.0/0   224.0.0.251   udp dpt:5353 
ACCEPT  udp -- 0.0.0.0/0   0.0.0.0/0   udp dpt:631 
ACCEPT  all -- 0.0.0.0/0   0.0.0.0/0   state RELATED,ESTABLISHED 
ACCEPT  tcp -- 0.0.0.0/0   0.0.0.0/0   state NEW tcp dpt:80 
ACCEPT  tcp -- 0.0.0.0/0   0.0.0.0/0   state NEW tcp dpt:443 
ACCEPT  tcp -- 0.0.0.0/0   0.0.0.0/0   state NEW tcp dpt:22 
ACCEPT  tcp -- 0.0.0.0/0   0.0.0.0/0   state NEW tcp dpt:5801 
ACCEPT  tcp -- 0.0.0.0/0   0.0.0.0/0   state NEW tcp dpt:5802 
ACCEPT  tcp -- 0.0.0.0/0   0.0.0.0/0   state NEW tcp dpt:5804 
ACCEPT  tcp -- 0.0.0.0/0   0.0.0.0/0   tcp dpts:1025:65535 
ACCEPT  tcp -- 0.0.0.0/0   0.0.0.0/0   state NEW tcp dpt:5901 
ACCEPT  tcp -- 0.0.0.0/0   0.0.0.0/0   state NEW tcp dpt:5902 
ACCEPT  tcp -- 0.0.0.0/0   0.0.0.0/0   state NEW tcp dpt:5904 
ACCEPT  tcp -- 0.0.0.0/0   0.0.0.0/0   state NEW tcp dpt:9099 
ACCEPT  tcp -- 0.0.0.0/0   0.0.0.0/0   state NEW tcp dpt:10000 
ACCEPT  tcp -- 0.0.0.0/0   0.0.0.0/0   state NEW tcp dpt:1025 
REJECT  all -- 0.0.0.0/0   0.0.0.0/0   reject-with icmp-host-prohibited 

保存的iptables當你確認它能正常工作時:

[[email protected] ~]# service iptables save