LinuxQuestions.org

LinuxQuestions.org (/questions/)
-   Linux - Networking (https://www.linuxquestions.org/questions/linux-networking-3/)
-   -   Network Slowdown: difficult to diagnose (https://www.linuxquestions.org/questions/linux-networking-3/network-slowdown-difficult-to-diagnose-884510/)

Sum1 06-04-2011 10:30 AM

Network Slowdown: difficult to diagnose
 
Something definitely disrupted my network over Memorial Day weekend May 28-30.
Upon arriving back to the office, I noticed that my usual tar backups and rsync
between primary server and backup server were not completed.

My devices are as follows:

1. slackware 13.0 router/firewall box
2. slackware 13.1 primary server with samba
3. gentoo backup/fail-over server (rsyncs hourly with
primary server and performs nightly backups)
4. copier/scanner that transfers scanned docs. directly to primary server.
5. 40-50 windows clients

During the past week, I've experienced the dreaded, nagging, "network slowdown" and have
not been able to discern the cause.


Here's the list of symptoms:

Copier/scanner used to complete transfer of scanned documents to
the samba server in less than a second;
now it takes a solid 10-12 seconds.

Windows clients get intermittant slowness when trying to open different directories and sub-folders
on the samba server.

When I ssh into the slackware router/firewall box from an external location over the internet,
there is no pause or delay.
When I ssh from inside the LAN to either the routerbox, primary server,
or backup server I get the same 10-12 second delay upon login -- immediate access
but upon providing my user name, there is now a 10-12 second delay
before prompted to provide user password.


The weird thing is everything works; only slower:

I've pinged every box/server/client from every other box/server/client for hours with no packet loss.
Users can access all their directories and documents on the samba server.
Accounting people are using the data sets on the samba server.
Everyone has consistent internet access.
The rsync between primary and backup server works, as well as nightly backup.

I've cycled power on the 48 port network switch, and the routerbox, primary server,
backup server, scanner, and all client boxes.

I've run hdparm on routerbox, primary server, and backup server, and they all report
normal speeds for older SATA 1 raid drives:

Timing cached reads: 1842 MB in 2.00 seconds = 920.90 MB/sec
Timing buffered disk reads: 190 MB in 3.00 seconds = 63.30 MB/sec

I've run "top" for hours on each box and the cpu loads are typically
2%-3%, with only occasional spikes up to 30% on the samba server.
There's almost no use of swap.

I'm not a tcpdump expert, but I've been logging data traffic on the
routerbox and don't see any obvious culprit like
a piece of spyware that is crushing all the available bandwidth
like a denial of service attack.

The office tends toward the permissive side regarding internet use,
so I see a decent amount of data traffic from constantly updating
browser apps. from The Weather Channel, Facebook, Marketwatch, etc.

I've also run iptraf to observe packets and bytes per interface and per LAN client and I'm not seeing any obvious abuse of bandwidth.

-----------------------------------------
What is the next course of action?
Do I need to take a class in Wireshark?
I've hit the limit of what I know to look for.

Thank you for reading such a long post; any guidance
greatly appreciated.

T3RM1NVT0R 06-04-2011 12:29 PM

@ Reply
 
Hi there,

As you said

Quote:

When I ssh into the slackware router/firewall box from an external location over the internet, there is no pause or delay.
The problem appears within the LAN, also this proves that the server is responding properly as if there was something wrong with the server then it would have take long time over the Internet as well to process the request.

You said that you have got a 48 port switch. Is every system connected to this switch? As of now the image of your network that appears in my mind is as follows:

Code:


                    -----------
                  |  Internet  |
                    -----------
                        |
                        |
          -------------------------------              --------------
        |slackware 13.0 router/firewall |------------|    switch    |
          -------------------------------            /--------------\
                                          ___________/        |      \      --------------
                                        /                    |        \-----| Copier/Scan  |
                                        /                    / \              --------------
                                      /                    /  \
                                      /                    /    \
                                    /        -------------      ---------------------------
                                    /        | Gentoo Back |    | Primary Server with Samba |
                                  /          -------------      ---------------------------
                                  /
                          ----------------
                        | Client Systems |
                          ----------------

You can run tcpdump/wireshark on the server and workstation as well and see at what time workstation sends a packet and when server sees that packet. I would suggest you to try this from 2-3 workstation and if you see the same results then it appears to be problem with the switch itself.

Also, it would be great if you can let us know how if the above diagram defines your infrastructure or is there a difference because if there are other switches involved we have to look at them as well.

Is this happening for each and every system within the LAN or with few of the systems. Did you configure VLAN on the switch, if yes how it is configured and is this happening with particular VLAN or with all of them.

Sum1 06-05-2011 12:21 AM

Quote:

Originally Posted by T3RM1NVT0R (Post 4376244)
Is every system connected to this switch? As of now the image of your network that appears in my mind is as follows:

Is this happening for each and every system within the LAN or with few of the systems. Did you configure VLAN on the switch, if yes how it is configured and is this happening with particular VLAN or with all of them.

T3RM, Thank you for your response.

1. Yes, every system is connected to the switch.
2. Yes, network image is exactly right.
3. Yes, this is happening for each and every system within the LAN.
4. VLAN is not configured on the switch, and no other switches exist on the network.

T3RM1NVT0R 06-05-2011 05:30 AM

@ Reply
 
Now I am getting a better picture. Try the following things:

1. As you said you have around 40-50 Windows client, configure a shared folder on one of the client and try to access from another Windows machine. This will show us if the problem occurs only when accessing data on servers or it irrespective of that.

2. If you have 8 port switch for testing (perform this only when you 48 port switch is not acting as DHCP) then put that switch between the servers and 2-3 clients and see if you see any difference because as of now it appears to be like a hardware issue instead of software.

3. Install wireshark on client/server and perform a simple ping request and see at what time client sends the ping request and at what time server sees it. This will tell us exact difference in time.

I hope this helps.

Sum1 06-05-2011 07:46 AM

Quote:

Originally Posted by T3RM1NVT0R (Post 4376791)
Now I am getting a better picture. Try the following things:

1. As you said you have around 40-50 Windows client, configure a shared folder on one of the client and try to access from another Windows machine. This will show us if the problem occurs only when accessing data on servers or it irrespective of that.

Definitely will try this on Monday morning; easy enough and it won't disrupt other users.

Quote:

Originally Posted by T3RM1NVT0R (Post 4376791)
2. If you have 8 port switch for testing (perform this only when you 48 port switch is not acting as DHCP) then put that switch between the servers and 2-3 clients and see if you see any difference because as of now it appears to be like a hardware issue instead of software.

Ahh, great idea....so simple but as usual it's hard to pull yourself out and see the whole picture once you've been digging around in it for a few days. I will give this a try before 8 am or after 6 pm so as not to disrupt business hours.

Quote:

Originally Posted by T3RM1NVT0R (Post 4376791)
3. Install wireshark on client/server and perform a simple ping request and see at what time client sends the ping request and at what time server sees it. This will tell us exact difference in time.

Will do -- I suppose I should try to sync time between the devices too...maybe setup ntpd on primary server for this testing.
I need to do some reading on how to use wireshark too.

T3RM1, thank you very much for the guidance.
Will report back once I complete the testing mentioned above.

T3RM1NVT0R 06-05-2011 07:49 AM

@ Reply
 
You're welcome.

You can get information about wireshark from here: http://www.wireshark.org/ , you can also download it from the same link.

Edit: Forgot to mention that for linux you can go with ethereal: http://www.ethereal.com/download.html

Sum1 06-06-2011 08:43 AM

Quote:

Originally Posted by T3RM1NVT0R (Post 4376791)
configure a shared folder on one of the client and try to access from another Windows machine. This will show us if the problem occurs only when accessing data on servers or it irrespective of that.

Completed; it works.

T3RM1NVT0R 06-06-2011 01:03 PM

@ Reply
 
Great.

Now we know that the issue is not with the client system communication among themselves. As we already know that the server response is normal when accessed externally this implies that the issue is not with server either.

To further narrow down the issue we can try following things:

1. Perform ping from server to different clients, keep a track of reply time in ms.
2. Perform a ping between clients to compare the latency.
3. If possible connect server on a different port on switch and see the difference. This will clear up the problematic port issue if any.
4. If above steps does not give us any clue then LAN trace will be only option to go deeper.

Sum1 06-06-2011 07:02 PM

T3RM1,
Thanks for hanging in with me.
I couldn't stay late tonight to try the 8-port switch experiment; some personal demands to take care of.

I did try an experiment earlier in the day today --
I ran tcpdump on routerbox LAN_nic and Primary/Samba_Server_nic while I scanned a document.
I was able to date-sync the two boxes to within a second of each other and will try to piece together the segment-to-segment response from Scanner to LAN_nic to Samba_Server_nic.

Wouldn't it figure, though; I saw a noticeable difference in the scanner notification today -- it was much shorter -- more like 3-5 secs. today as opposed to 10-12 secs. the day before. This is real "ghost in the machine" stuff.

Sum1 06-07-2011 07:10 AM

Quote:

Originally Posted by Sum1 (Post 4378282)
T3RM1,
I did try an experiment earlier in the day today --
I ran tcpdump on routerbox LAN_nic and Primary/Samba_Server_nic while I scanned a document.

Forgot to mention -- I did the tcpdump test above because I don't have xorg installed on the routerbox and servers.
Since tcpdump and TShark(commandline wireshark) both use pcap reporting; I thought I would stick with tcpdump for now.

Here's the first timestamp of the document scanner hitting the routerbox LAN_nic:
Code:

2011-06-06 09:34:32.934962 IP (tos 0x0, ttl 64, id 15075, offset 0, flags [none], proto UDP (17), le
ngth 78)
    10.10.10.120.65387 > 10.10.10.255.netbios-ns: [udp sum ok]
>>> NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
TrnID=0x356C
OpCode=0
NmFlags=0x11
Rcode=0
QueryCount=1
AnswerCount=0
AuthorityCount=0
AddressRecCount=0
QuestionRecords:
Name=A1              NameType=0x20 (Server)
QuestionType=0x20
QuestionClass=0x1


The first timestamp and beginning transaction on the SERVER_nic:
Code:

2011-06-06 09:34:34.284477 IP (tos 0x0, ttl 64, id 15075, offset 0, flags [none], proto UDP (17), l$
    10.10.10.120.65387 > 10.10.10.255.netbios-ns: [udp sum ok]
>>> NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
TrnID=0x356C
OpCode=0
NmFlags=0x11
Rcode=0
QueryCount=1
AnswerCount=0
AuthorityCount=0
AddressRecCount=0
QuestionRecords:
Name=A1              NameType=0x20 (Server)
QuestionType=0x20
QuestionClass=0x1


2011-06-06 09:34:34.284578 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length $
    a1.server.com.netbios-ns > 10.10.10.120.65387: [bad udp cksum 2b14!]
>>> NBT UDP PACKET(137): QUERY; POSITIVE; RESPONSE; UNICAST
TrnID=0x356C
OpCode=0
NmFlags=0x58
Rcode=0
QueryCount=0
AnswerCount=1
AuthorityCount=0
AddressRecCount=0
ResourceRecords:
Name=A1              NameType=0x20 (Server)
ResType=0x20
ResClass=0x1
TTL=259200 (0x3f480)
ResourceLength=6
ResourceData=
AddrType=0x6000
Address=10.10.10.199

2011-06-06 09:34:34.552531 IP (tos 0x0, ttl 64, id 15076, offset 0, flags [none], proto TCP (6), le$
    10.10.10.120.65476 > a1.server.com.netbios-ssn: Flags [S], cksum 0x534b (correct), seq 307548068$
2011-06-06 09:34:34.552552 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 6$
    a1.server.com.netbios-ssn > 10.10.10.120.65476: Flags [S.], cksum 0x0ef6 (incorrect -> 0xc286), $
2011-06-06 09:34:34.552724 IP (tos 0x0, ttl 64, id 15077, offset 0, flags [none], proto TCP (6), le$
    10.10.10.120.65476 > a1.server.com.netbios-ssn: Flags [.], cksum 0xc081 (correct), seq 1, ack 1,$
2011-06-06 09:34:34.552922 IP (tos 0x0, ttl 64, id 15078, offset 0, flags [none], proto TCP (6), le$
    10.10.10.120.65476 > a1.server.com.netbios-ssn: Flags [P.], cksum 0xb377 (correct), seq 1:73, ac$
>>> NBT Session Packet
NBT Session Request
Flags=0x0
Length=68 (0x44)
Destination=A1              NameType=0x20 (Server)
Source=DOCUMENT_SCANNER    NameType=0x00 (Workstation)
2011-06-06 09:34:34.552931 IP (tos 0x0, ttl 64, id 11735, offset 0, flags [DF], proto TCP (6), leng$
    a1.server.com.netbios-ssn > 10.10.10.120.65476: Flags [.], cksum 0x0eee (incorrect -> 0x047c), s

As stated in previous post, I sync'd the router and primary server to within a second of each other.
From this output, it appears at most a 2 second delay between them.
Of course, this is frustrating because it seems to undermine what I am seeing with my own eyes and what other users on the network are reporting to me.

I'll try to perform the "switch test" after 6 pm today.

linuxguy7820 06-07-2011 09:36 AM

I've experienced general network slowdowns in the past, one time it turned out that one of the DNS servers (primary) wasn't running properly so it was taking several seconds to failover to the secondary, once the issue was corrected bam all network services started to work again.

Sum1 06-07-2011 11:30 AM

Quote:

Originally Posted by linuxguy7820 (Post 4378832)
turned out that one of the DNS servers (primary) wasn't running properly

Linuxguy,
Thanks for your response.
I'm doing some research to find out about using tcpdump to discover dns problems.

T3RM1NVT0R 06-07-2011 02:04 PM

@ Reply
 
For checking dns server problem you can also use nslookup and see from which server you get authoritative answer, if there is something wrong with primary dns server then you will get authoritative answer from secondary dns. You can use the following command:

nslookup - to get into nslookup
set debug - this will show you the query you are performing and the response you are getting, will also display how much time it took to resolve the query.

You can use "server xxx.xxx.xxx.xxx" or "server dns_name" without quotes in nslookup prompt to change the dns server using which you want to perform dns query.

Sum1 06-07-2011 03:43 PM

Quote:

Originally Posted by T3RM1NVT0R (Post 4379053)
nslookup - to get into nslookup
set debug - this will show you the query you are performing and the response you are getting, will also display how much time it took to resolve the query.

It appears there's no problem with dns on my network.
Testing from several different clients obtains the same answer (the ISP's primary dns) with no delay.

sidenote: still cannot complete the substitute router test due to some co-workers staying late to finish a project.

Sum1 06-08-2011 12:16 PM

Quote:

Originally Posted by T3RM1NVT0R (Post 4376791)
3. Install wireshark on client/server and perform a simple ping request and see at what time client sends the ping request and at what time server sees it. This will tell us exact difference in time.

T3RM1,

Wireshark on client and tcpdump on server.
Shown below is the last request/reply in a 500 count series.
No packet loss.

Clock Sync Issue: unable to sync clocks between client/server; at any given time there was observable difference of 1-3 seconds.

Client Ping to Server:

Logged on Client nic:

10:34:33.291392 IP 10.10.10.185 > 10.10.10.199: ICMP echo request, id 512, seq 34818, length 40
10:34:33.291398 IP 10.10.10.199 > 10.10.10.185: ICMP echo reply, id 512, seq 34818, length 40

Logged on Server nic:

10.10.10.185(Client) 10.10.10.199(Server) ICMP 74 Echo (ping) request id=0x0200, seq=34818/648, ttl=128
Arrival Time: Jun 8, 2011 10:34:30.823649000 Eastern Daylight Time
10.10.10.199(Server) 10.10.10.185(Client) ICMP 74 Echo (ping) reply id=0x0200, seq=34818/648, ttl=64
Arrival Time: Jun 8, 2011 10:34:30.823797000 Eastern Daylight Time

T3RM1NVT0R 06-08-2011 01:21 PM

@ Reply
 
Hi Sum1,

As you said that there is a time difference of 1-3 seconds between the server and the client may I know how the server is taking time? Is server taking time from NTP source or local?

Also how clients are configured to receive time from the server? Are they configured to use Slackware server as their NTP source?

The packet capture you pasted is limited and I will not be able to analyze/suggest much on that. Also I can see that you took a packet capture of ping request which may come normal because what we are trying to figure out here is when client request for data, is packet reaches late or server takes time to respond as it has to recursively search the requested data in the directory structure.

Did you perform the switch test? Also if you can paste the full output of packet capture (Not just ICMP, data request from client to server) that will be more useful for diagnosis.

Sum1 06-09-2011 07:13 AM

Hi T3RM1,

I had a feeling this output would not be helpful.
I will set up an ntp server on the router/firewall box since it is the dhcp server for the LAN and provides dns to clients.

Have not completed the 8-port switch test yet.
I apologize for this dragging on so long -- it's a long story but I wear many hats at my job. :-)

I'll complete the ntp-sync'ed data collection and switch test.

T3RM1NVT0R 06-09-2011 01:34 PM

@ Reply
 
Hi Sum1,

I can understand, I am in the same boat as you are :-)

Sum1 06-17-2011 05:41 PM

Quote:

Originally Posted by T3RM1NVT0R (Post 4380167)
Did you perform the switch test?

Hi T3RM1,
I hope you're still out there. :-)
I finally got a chance to kick out all the users and pull some wires last night.
I put the scanner/copier, 1 windows client, Server 1, Back-up Server, and Routerbox, on the 8-port switch.

I was surprised to find that the slow performance was exactly the same; so, this rules out a faulty 48-port switch.
However, the bad news is that I'm still hunting the problem.

- - - - - - -

I did some tcpdump logging after configuring the routerbox to act as an ntp server.
I had a client box, server 1, back-up server, and routerbox all looking synced to within a blink of an eye.
In the following logs the tcpdump snaplen was set to either 3000 or 5000 bytes; I can't remember which --- I hope this provides the right amount of logged data.

Clientbox pinging Routerbox LAN nic:
Code:

2011-06-10 12:03:41.375677 IP 10.10.10.193 > 10.10.10.1: ICMP echo request, id 23559, seq 1, length 64
2011-06-10 12:03:41.375867 IP 10.10.10.1 > 10.10.10.193: ICMP echo reply, id 23559, seq 1, length 64
2011-06-10 12:03:42.375515 IP 10.10.10.193 > 10.10.10.1: ICMP echo request, id 23559, seq 2, length 64
2011-06-10 12:03:42.375803 IP 10.10.10.1 > 10.10.10.193: ICMP echo reply, id 23559, seq 2, length 64
2011-06-10 12:03:43.375537 IP 10.10.10.193 > 10.10.10.1: ICMP echo request, id 23559, seq 3, length 64
2011-06-10 12:03:43.375720 IP 10.10.10.1 > 10.10.10.193: ICMP echo reply, id 23559, seq 3, length 64
2011-06-10 12:03:45.757674 IP 10.10.10.110.1024 > 239.255.255.250.1900: UDP, length 295
2011-06-10 12:03:47.756828 IP 10.10.10.110.1024 > 239.255.255.250.1900: UDP, length 303

Routerbox (and extra LAN chatter) responding to Clientbox:

Code:

2011-06-10 12:03:41.481708 IP 10.10.10.193 > 10.10.10.1: ICMP echo request, id 23559, seq 1, length 64
2011-06-10 12:03:41.481733 IP 10.10.10.1 > 10.10.10.193: ICMP echo reply, id 23559, seq 1, length 64
2011-06-10 12:03:41.548324 IP 10.10.10.113.36385 > 77.238.177.9.25: Flags [S], seq 956903848, win 65535, options [mss 1460,nop,nop,sackOK], length 0
2011-06-10 12:03:41.563910 IP 10.10.10.113.36386 > 77.238.177.9.25: Flags [S], seq 3741810448, win 65535, options [mss 1460,nop,nop,sackOK], length 0
2011-06-10 12:03:41.610536 IP 74.125.226.152.443 > 10.10.10.30.3320: Flags [P.], ack 1987, win 8904, length 53
2011-06-10 12:03:41.676788 IP 77.238.177.9.25 > 10.10.10.113.36385: Flags [S.], seq 2171224162, ack 956903849, win 65535, options [mss 1460,sackOK,eol], leng$
2011-06-10 12:03:41.676901 IP 10.10.10.113.36385 > 77.238.177.9.25: Flags [.], ack 1, win 65535, length 0
2011-06-10 12:03:41.689247 IP 77.238.177.9.25 > 10.10.10.113.36386: Flags [S.], seq 2005274848, ack 3741810449, win 65535, options [mss 1460,sackOK,eol], len$
2011-06-10 12:03:41.689358 IP 10.10.10.113.36386 > 77.238.177.9.25: Flags [.], ack 1, win 65535, length 0
2011-06-10 12:03:41.697542 IP 10.10.10.137.1848 > 208.72.56.31.80: Flags [F.], seq 2252, ack 488, win 65048, length 0
2011-06-10 12:03:41.697583 IP 10.10.10.137.1843 > 208.72.56.31.80: Flags [F.], seq 3630, ack 5715, win 64884, length 0
2011-06-10 12:03:41.697622 IP 10.10.10.137.1844 > 208.72.56.31.80: Flags [F.], seq 2942, ack 34728, win 65046, length 0
2011-06-10 12:03:41.697658 IP 10.10.10.137.1845 > 208.72.56.31.80: Flags [F.], seq 2963, ack 5543, win 65047, length 0
2011-06-10 12:03:41.697694 IP 10.10.10.137.1846 > 208.72.56.31.80: Flags [F.], seq 2932, ack 651, win 64885, length 0
2011-06-10 12:03:41.697729 IP 10.10.10.137.1847 > 208.72.56.31.80: Flags [F.], seq 2942, ack 653, win 64883, length 0
2011-06-10 12:03:41.698848 IP 208.72.56.31.80 > 10.10.10.137.1847: Flags [F.], seq 653, ack 2942, win 65535, length 0
2011-06-10 12:03:41.698923 IP 208.72.56.31.80 > 10.10.10.137.1846: Flags [F.], seq 651, ack 2932, win 65535, length 0
2011-06-10 12:03:41.698971 IP 10.10.10.137.1847 > 208.72.56.31.80: Flags [.], ack 654, win 64883, length 0
2011-06-10 12:03:41.699031 IP 10.10.10.137.1846 > 208.72.56.31.80: Flags [.], ack 652, win 64885, length 0
2011-06-10 12:03:41.703410 IP 208.72.56.31.80 > 10.10.10.137.1845: Flags [F.], seq 5543, ack 2963, win 65535, length 0
2011-06-10 12:03:41.703480 IP 208.72.56.31.80 > 10.10.10.137.1844: Flags [F.], seq 34728, ack 2942, win 65535, length 0
2011-06-10 12:03:41.703514 IP 10.10.10.137.1845 > 208.72.56.31.80: Flags [.], ack 5544, win 65047, length 0
2011-06-10 12:03:41.703588 IP 10.10.10.137.1844 > 208.72.56.31.80: Flags [.], ack 34729, win 65046, length 0
2011-06-10 12:03:41.717049 IP 208.72.56.31.80 > 10.10.10.137.1843: Flags [.], ack 3631, win 65535, length 0
2011-06-10 12:03:41.717120 IP 208.72.56.31.80 > 10.10.10.137.1848: Flags [.], ack 2253, win 65535, length 0
2011-06-10 12:03:41.717143 IP 208.72.56.31.80 > 10.10.10.137.1843: Flags [F.], seq 5715, ack 3631, win 65535, length 0
2011-06-10 12:03:41.717162 IP 208.72.56.31.80 > 10.10.10.137.1848: Flags [F.], seq 488, ack 2253, win 65535, length 0
2011-06-10 12:03:41.717249 IP 10.10.10.137.1843 > 208.72.56.31.80: Flags [.], ack 5716, win 64884, length 0
2011-06-10 12:03:41.717259 IP 10.10.10.137.1848 > 208.72.56.31.80: Flags [.], ack 489, win 65048, length 0
2011-06-10 12:03:41.724885 IP 10.10.10.30.3320 > 74.125.226.152.443: Flags [.], ack 961, win 64575, length 0
2011-06-10 12:03:41.805646 IP 77.238.177.9.25 > 10.10.10.113.36385: Flags [P.], ack 1, win 65535, length 153
2011-06-10 12:03:41.805703 IP 77.238.177.9.25 > 10.10.10.113.36385: Flags [F.], seq 154, ack 1, win 65535, length 0
2011-06-10 12:03:41.805811 IP 10.10.10.113.36385 > 77.238.177.9.25: Flags [.], ack 155, win 65382, length 0
2011-06-10 12:03:41.806334 IP 10.10.10.113.36385 > 77.238.177.9.25: Flags [F.], seq 1, ack 155, win 65382, length 0
2011-06-10 12:03:41.817851 IP 77.238.177.9.25 > 10.10.10.113.36386: Flags [P.], ack 1, win 65535, length 153
2011-06-10 12:03:41.817908 IP 77.238.177.9.25 > 10.10.10.113.36386: Flags [F.], seq 154, ack 1, win 65535, length 0
2011-06-10 12:03:41.817996 IP 10.10.10.113.36386 > 77.238.177.9.25: Flags [.], ack 155, win 65382, length 0
2011-06-10 12:03:41.818497 IP 10.10.10.113.36386 > 77.238.177.9.25: Flags [F.], seq 1, ack 155, win 65382, length 0
2011-06-10 12:03:41.938103 IP 77.238.177.9.25 > 10.10.10.113.36385: Flags [.], ack 2, win 65534, length 0
2011-06-10 12:03:41.950632 IP 77.238.177.9.25 > 10.10.10.113.36386: Flags [.], ack 2, win 65534, length 0
2011-06-10 12:03:42.267068 IP 10.10.10.113.36387 > 65.54.188.94.25: Flags [S], seq 758728933, win 65535, options [mss 1460,nop,nop,sackOK], length 0
2011-06-10 12:03:42.282683 IP 10.10.10.113.36388 > 65.54.188.94.25: Flags [S], seq 2863678147, win 65535, options [mss 1460,nop,nop,sackOK], length 0
2011-06-10 12:03:42.360869 IP 10.10.10.113.36389 > 216.33.127.20.25: Flags [S], seq 1645466447, win 65535, options [mss 1460,nop,nop,sackOK], length 0
2011-06-10 12:03:42.364424 ARP, Request who-has 10.10.10.53 tell 10.10.10.1, length 28
2011-06-10 12:03:42.364565 ARP, Reply 10.10.10.53 is-at 00:e0:4c:d5:ef:06, length 46
2011-06-10 12:03:42.371727 IP 65.54.188.94.25 > 10.10.10.113.36387: Flags [S.], seq 3996107923, ack 758728934, win 16384, options [mss 1460,nop,nop,sackOK], $
2011-06-10 12:03:42.371842 IP 10.10.10.113.36387 > 65.54.188.94.25: Flags [.], ack 1, win 65535, length 0
2011-06-10 12:03:42.387345 IP 65.54.188.94.25 > 10.10.10.113.36388: Flags [S.], seq 900653763, ack 2863678148, win 16384, options [mss 1460,nop,nop,sackOK], $
2011-06-10 12:03:42.387454 IP 10.10.10.113.36388 > 65.54.188.94.25: Flags [.], ack 1, win 65535, length 0
2011-06-10 12:03:42.387550 IP 216.33.127.20.25 > 10.10.10.113.36389: Flags [S.], seq 264164834, ack 1645466448, win 5840, options [mss 1460,nop,nop,sackOK], $
2011-06-10 12:03:42.387638 IP 10.10.10.113.36389 > 216.33.127.20.25: Flags [.], ack 1, win 65535, length 0
2011-06-10 12:03:42.392028 IP 10.10.10.113.36390 > 216.33.127.20.25: Flags [S], seq 1541068567, win 65535, options [mss 1460,nop,nop,sackOK], length 0
2011-06-10 12:03:42.414135 IP 216.33.127.20.25 > 10.10.10.113.36389: Flags [P.], ack 1, win 5840, length 167
2011-06-10 12:03:42.414519 IP 10.10.10.113.36389 > 216.33.127.20.25: Flags [F.], seq 1, ack 168, win 65368, length 0
2011-06-10 12:03:42.417380 IP 216.33.127.20.25 > 10.10.10.113.36390: Flags [S.], seq 3697367421, ack 1541068568, win 5840, options [mss 1460,nop,nop,sackOK],$
2011-06-10 12:03:42.417467 IP 10.10.10.113.36390 > 216.33.127.20.25: Flags [.], ack 1, win 65535, length 0
2011-06-10 12:03:42.441412 IP 216.33.127.20.25 > 10.10.10.113.36389: Flags [F.], seq 168, ack 2, win 5840, length 0
2011-06-10 12:03:42.441521 IP 10.10.10.113.36389 > 216.33.127.20.25: Flags [.], ack 169, win 65368, length 0
2011-06-10 12:03:42.445631 IP 216.33.127.20.25 > 10.10.10.113.36390: Flags [P.], ack 1, win 5840, length 167
2011-06-10 12:03:42.454750 IP 10.10.10.113.36390 > 216.33.127.20.25: Flags [F.], seq 1, ack 168, win 65368, length 0
2011-06-10 12:03:42.475045 IP 65.54.188.94.25 > 10.10.10.113.36387: Flags [P.], ack 1, win 65535, length 311
2011-06-10 12:03:42.475306 IP 10.10.10.113.36387 > 65.54.188.94.25: Flags [P.], ack 312, win 65224, length 15
2011-06-10 12:03:42.481538 IP 10.10.10.193 > 10.10.10.1: ICMP echo request, id 23559, seq 2, length 64
2011-06-10 12:03:42.481554 IP 10.10.10.1 > 10.10.10.193: ICMP echo reply, id 23559, seq 2, length 64
2011-06-10 12:03:42.487097 IP 216.33.127.20.25 > 10.10.10.113.36390: Flags [F.], seq 168, ack 2, win 5840, length 0
2011-06-10 12:03:42.487206 IP 10.10.10.113.36390 > 216.33.127.20.25: Flags [.], ack 169, win 65368, length 0
2011-06-10 12:03:42.490972 IP 65.54.188.94.25 > 10.10.10.113.36388: Flags [P.], ack 1, win 65535, length 311
2011-06-10 12:03:42.491221 IP 10.10.10.113.36388 > 65.54.188.94.25: Flags [P.], ack 312, win 65224, length 16
2011-06-10 12:03:42.587164 IP 65.54.188.94.25 > 10.10.10.113.36387: Flags [P.], ack 16, win 65520, length 188
2011-06-10 12:03:42.595084 IP 65.54.188.94.25 > 10.10.10.113.36388: Flags [P.], ack 17, win 65519, length 188
2011-06-10 12:03:42.595276 IP 10.10.10.113.36387 > 65.54.188.94.25: Flags [P.], ack 500, win 65036, length 77
2011-06-10 12:03:42.602366 ARP, Request who-has 10.10.10.185 tell 10.10.10.1, length 28
2011-06-10 12:03:42.602523 ARP, Reply 10.10.10.185 is-at 48:5b:39:aa:08:58, length 46
2011-06-10 12:03:42.610853 IP 10.10.10.113.36388 > 65.54.188.94.25: Flags [P.], ack 500, win 65036, length 74
2011-06-10 12:03:42.659938 IP 207.223.0.140.80 > 10.10.10.113.36384: Flags [.], ack 303, win 6432, length 1460
2011-06-10 12:03:42.660242 IP 207.223.0.140.80 > 10.10.10.113.36384: Flags [.], ack 303, win 6432, length 1460
2011-06-10 12:03:42.660639 IP 10.10.10.113.36384 > 207.223.0.140.80: Flags [.], ack 2921, win 65535, length 0
2011-06-10 12:03:42.667669 IP 207.223.0.140.80 > 10.10.10.113.36384: Flags [.], ack 303, win 6432, length 1460
2011-06-10 12:03:42.668023 IP 207.223.0.140.80 > 10.10.10.113.36384: Flags [.], ack 303, win 6432, length 1460
2011-06-10 12:03:42.668344 IP 207.223.0.140.80 > 10.10.10.113.36384: Flags [.], ack 303, win 6432, length 1460
2011-06-10 12:03:42.668405 IP 10.10.10.113.36384 > 207.223.0.140.80: Flags [.], ack 5841, win 65535, length 0
2011-06-10 12:03:42.668675 IP 207.223.0.140.80 > 10.10.10.113.36384: Flags [.], ack 303, win 6432, length 1460
2011-06-10 12:03:42.668731 IP 10.10.10.113.36384 > 207.223.0.140.80: Flags [.], ack 7301, win 65535, length 0
2011-06-10 12:03:42.669240 IP 207.223.0.140.80 > 10.10.10.113.36384: Flags [.], ack 303, win 6432, length 1460
2011-06-10 12:03:42.669364 IP 207.223.0.140.80 > 10.10.10.113.36384: Flags [.], ack 303, win 6432, length 1460
2011-06-10 12:03:42.669618 IP 10.10.10.113.36384 > 207.223.0.140.80: Flags [.], ack 10221, win 65535, length 0
2011-06-10 12:03:42.669746 IP 10.10.10.113.36384 > 207.223.0.140.80: Flags [.], ack 11681, win 65535, length 0
2011-06-10 12:03:42.670504 IP 207.223.0.140.80 > 10.10.10.113.36384: Flags [.], ack 303, win 6432, length 1460
2011-06-10 12:03:42.670626 IP 207.223.0.140.80 > 10.10.10.113.36384: Flags [.], ack 303, win 6432, length 1460
2011-06-10 12:03:42.670728 IP 207.223.0.140.80 > 10.10.10.113.36384: Flags [FP.], seq 14601:15816, ack 303, win 6432, length 1215
2011-06-10 12:03:42.671005 IP 10.10.10.113.36384 > 207.223.0.140.80: Flags [.], ack 14601, win 65535, length 0
2011-06-10 12:03:42.671116 IP 10.10.10.113.36384 > 207.223.0.140.80: Flags [.], ack 15817, win 64320, length 0
2011-06-10 12:03:42.671312 IP 10.10.10.113.36384 > 207.223.0.140.80: Flags [F.], seq 303, ack 15817, win 64320, length 0
2011-06-10 12:03:42.699183 IP 207.223.0.140.80 > 10.10.10.113.36384: Flags [.], ack 304, win 6432, length 0
2011-06-10 12:03:42.699378 IP 65.54.188.94.25 > 10.10.10.113.36387: Flags [P.], ack 93, win 65443, length 300
2011-06-10 12:03:42.699432 IP 65.54.188.94.25 > 10.10.10.113.36387: Flags [F.], seq 800, ack 93, win 65443, length 0
2011-06-10 12:03:42.699550 IP 10.10.10.113.36387 > 65.54.188.94.25: Flags [.], ack 801, win 64736, length 0
2011-06-10 12:03:42.706083 IP 10.10.10.113.36387 > 65.54.188.94.25: Flags [F.], seq 93, ack 801, win 64736, length 0
2011-06-10 12:03:42.715389 IP 65.54.188.94.25 > 10.10.10.113.36388: Flags [P.], ack 91, win 65445, length 300
2011-06-10 12:03:42.715432 IP 65.54.188.94.25 > 10.10.10.113.36388: Flags [F.], seq 800, ack 91, win 65445, length 0
2011-06-10 12:03:42.715556 IP 10.10.10.113.36388 > 65.54.188.94.25: Flags [.], ack 801, win 64736, length 0
2011-06-10 12:03:42.737279 IP 10.10.10.113.36388 > 65.54.188.94.25: Flags [F.], seq 91, ack 801, win 64736, length 0
2011-06-10 12:03:42.812727 IP 65.54.188.94.25 > 10.10.10.113.36387: Flags [.], ack 94, win 65443, length 0
2011-06-10 12:03:42.841332 IP 65.54.188.94.25 > 10.10.10.113.36388: Flags [.], ack 92, win 65445, length 0
2011-06-10 12:03:42.998190 IP 10.10.10.137.1844 > 208.72.56.31.80: Flags [F.], seq 2942, ack 34729, win 65046, length 0
2011-06-10 12:03:42.998200 IP 10.10.10.137.1845 > 208.72.56.31.80: Flags [F.], seq 2963, ack 5544, win 65047, length 0
2011-06-10 12:03:42.998208 IP 10.10.10.137.1846 > 208.72.56.31.80: Flags [F.], seq 2932, ack 652, win 64885, length 0
2011-06-10 12:03:42.998217 IP 10.10.10.137.1847 > 208.72.56.31.80: Flags [F.], seq 2942, ack 654, win 64883, length 0
2011-06-10 12:03:43.019012 IP 208.72.56.31.80 > 10.10.10.137.1847: Flags [.], ack 2943, win 65534, length 0
2011-06-10 12:03:43.019083 IP 208.72.56.31.80 > 10.10.10.137.1844: Flags [.], ack 2943, win 65534, length 0
2011-06-10 12:03:43.019104 IP 208.72.56.31.80 > 10.10.10.137.1846: Flags [.], ack 2933, win 65534, length 0
2011-06-10 12:03:43.019125 IP 208.72.56.31.80 > 10.10.10.137.1845: Flags [.], ack 2964, win 65534, length 0
2011-06-10 12:03:43.088459 IP 74.217.240.80.80 > 10.10.10.49.1458: Flags [R.], seq 27155, ack 52814, win 57193, length 0
2011-06-10 12:03:43.481560 IP 10.10.10.193 > 10.10.10.1: ICMP echo request, id 23559, seq 3, length 64
2011-06-10 12:03:43.481576 IP 10.10.10.1 > 10.10.10.193: ICMP echo reply, id 23559, seq 3, length 64
2011-06-10 12:03:43.821861 IP 80.12.242.148.25 > 10.10.10.113.36381: Flags [P.], ack 1, win 4140, length 186
2011-06-10 12:03:43.822116 IP 80.12.242.148.25 > 10.10.10.113.36381: Flags [F.], seq 187, ack 1, win 4140, length 0

Clientbox pinging Back-up server:
Code:

2011-06-10 12:03:48.719680 IP 10.10.10.193 > 10.10.10.186: ICMP echo request, id 23815, seq 1, length 64
2011-06-10 12:03:48.719851 IP 10.10.10.186 > 10.10.10.193: ICMP echo reply, id 23815, seq 1, length 64
2011-06-10 12:03:49.719524 IP 10.10.10.193 > 10.10.10.186: ICMP echo request, id 23815, seq 2, length 64
2011-06-10 12:03:49.719673 IP 10.10.10.186 > 10.10.10.193: ICMP echo reply, id 23815, seq 2, length 64
2011-06-10 12:03:50.719521 IP 10.10.10.193 > 10.10.10.186: ICMP echo request, id 23815, seq 3, length 64
2011-06-10 12:03:50.719656 IP 10.10.10.186 > 10.10.10.193: ICMP echo reply, id 23815, seq 3, length 64

Back-up server responding to Clientbox:
Code:

2011-06-10 12:03:48.826310 IP 10.10.10.193 > 10.10.10.186: ICMP echo request, id 23815, seq 1, length 64
2011-06-10 12:03:48.826339 IP 10.10.10.186 > 10.10.10.193: ICMP echo reply, id 23815, seq 1, length 64
2011-06-10 12:03:49.826152 IP 10.10.10.193 > 10.10.10.186: ICMP echo request, id 23815, seq 2, length 64
2011-06-10 12:03:49.826164 IP 10.10.10.186 > 10.10.10.193: ICMP echo reply, id 23815, seq 2, length 64
2011-06-10 12:03:50.826145 IP 10.10.10.193 > 10.10.10.186: ICMP echo request, id 23815, seq 3, length 64
2011-06-10 12:03:50.826155 IP 10.10.10.186 > 10.10.10.193: ICMP echo reply, id 23815, seq 3, length 64
2011-06-10 12:04:06.033598 IP 10.10.10.137.137 > 10.10.10.255.137: UDP, length 50
2011-06-10 12:04:06.783101 IP 10.10.10.137.137 > 10.10.10.255.137: UDP, length 50
2011-06-10 12:04:06.819245 ARP, Request who-has 10.10.10.199 tell 10.10.10.185, length 46
2011-06-10 12:04:07.533104 IP 10.10.10.137.137 > 10.10.10.255.137: UDP, length 50
2011-06-10 12:04:16.269163 ARP, Request who-has 10.10.10.110 tell 10.10.10.29, length 46
2011-06-10 12:04:19.478766 ARP, Request who-has 10.10.10.1 tell 10.10.10.34, length 46
2011-06-10 12:04:22.117015 ARP, Request who-has 10.10.10.1 tell 10.10.10.101, length 46
2011-06-10 12:04:23.867483 ARP, Request who-has 10.10.10.1 tell 10.10.10.29, length 46
2011-06-10 12:04:30.777645 ARP, Request who-has 10.10.10.1 tell 10.10.10.18, length 46
2011-06-10 12:04:31.120201 IP 10.10.10.186.68 > 10.10.10.1.67: BOOTP/DHCP, Request from 00:03:25:44:a0:82, length 326
2011-06-10 12:04:31.152063 IP 10.10.10.1.67 > 10.10.10.186.68: BOOTP/DHCP, Reply, length 300
2011-06-10 12:04:31.201186 ARP, Request who-has 10.10.10.186 tell 10.10.10.186, length 28
2011-06-10 12:04:31.707735 IPX 00000000.00:00:74:f3:55:c7.4100 > 00000000.ff:ff:ff:ff:ff:ff.0452: ipx-sap-nearest-req 0004
2011-06-10 12:04:32.257278 (NOV-ETHII) IPX 00000000.00:00:74:f3:55:c7.4100 > 00000000.ff:ff:ff:ff:ff:ff.0452: ipx-sap-nearest-req 0004
2011-06-10 12:04:32.433344 ARP, Request who-has 10.10.10.199 tell 10.10.10.124, length 46
2011-06-10 12:04:32.535000 ARP, Request who-has 10.10.10.180 tell 10.10.10.137, length 46
2011-06-10 12:04:33.202757 ARP, Request who-has 10.10.10.186 tell 10.10.10.186, length 28
2011-06-10 12:04:33.249979 (NOV-ETHII) IPX 00000000.00:00:74:f3:55:c7.4100 > 00000000.ff:ff:ff:ff:ff:ff.0452: ipx-sap-nearest-req 0004
2011-06-10 12:04:34.182084 ARP, Request who-has 10.10.10.1 tell 10.10.10.54, length 46
2011-06-10 12:04:34.242879 IPX 00000000.00:00:74:f3:55:c7.4100 > 00000000.ff:ff:ff:ff:ff:ff.0452: ipx-sap-nearest-req 0004
2011-06-10 12:04:35.235908 IPX 00000000.00:00:74:f3:55:c7.4100 > 00000000.ff:ff:ff:ff:ff:ff.0452: ipx-sap-nearest-req 0004
2011-06-10 12:04:36.123170 ARP, Request who-has 10.10.10.1 tell 10.10.10.186, length 28
2011-06-10 12:04:36.123279 ARP, Reply 10.10.10.1 is-at 00:17:08:92:16:18, length 46
2011-06-10 12:04:36.229166 (NOV-ETHII) IPX 00000000.00:00:74:f3:55:c7.4100 > 00000000.ff:ff:ff:ff:ff:ff.0452: ipx-sap-nearest-req 0004
2011-06-10 12:04:37.222147 (NOV-ETHII) IPX 00000000.00:00:74:f3:55:c7.4100 > 00000000.ff:ff:ff:ff:ff:ff.0452: ipx-sap-nearest-req 0004
2011-06-10 12:04:37.564723 IP 10.10.10.199.138 > 10.10.10.255.138: UDP, length 210
2011-06-10 12:04:37.564763 IP 10.10.10.199.138 > 10.10.10.255.138: UDP, length 203
2011-06-10 12:04:38.215473 IPX 00000000.00:00:74:f3:55:c7.4100 > 00000000.ff:ff:ff:ff:ff:ff.0452: ipx-sap-nearest-req 0004

Clientbox pinging Server 1:
Code:

2011-06-10 12:03:57.455216 IP 10.10.10.193 > 10.10.10.199: ICMP echo request, id 24071, seq 1, length 64
2011-06-10 12:03:57.455412 IP 10.10.10.199 > 10.10.10.193: ICMP echo reply, id 24071, seq 1, length 64
2011-06-10 12:03:58.455523 IP 10.10.10.193 > 10.10.10.199: ICMP echo request, id 24071, seq 2, length 64
2011-06-10 12:03:58.455817 IP 10.10.10.199 > 10.10.10.193: ICMP echo reply, id 24071, seq 2, length 64
2011-06-10 12:03:59.455458 IP 10.10.10.193 > 10.10.10.199: ICMP echo request, id 24071, seq 3, length 64
2011-06-10 12:03:59.455639 IP 10.10.10.199 > 10.10.10.193: ICMP echo reply, id 24071, seq 3, length 64
2011-06-10 12:04:05.927198 IP 10.10.10.137.137 > 10.10.10.255.137: UDP, length 50
2011-06-10 12:04:06.676694 IP 10.10.10.137.137 > 10.10.10.255.137: UDP, length 50
2011-06-10 12:04:06.712842 ARP, Request who-has 10.10.10.199 tell 10.10.10.185, length 46
2011-06-10 12:04:07.426708 IP 10.10.10.137.137 > 10.10.10.255.137: UDP, length 50

Server 1 responding to Clientbox:
Code:

2011-06-10 12:03:57.563778 IP 10.10.10.193 > 10.10.10.199: ICMP echo request, id 24071, seq 1, length 64
2011-06-10 12:03:57.563798 IP 10.10.10.199 > 10.10.10.193: ICMP echo reply, id 24071, seq 1, length 64
2011-06-10 12:03:58.257231 IP 10.10.10.101.2237 > 10.10.10.199.445: Flags [P.], seq 1854:1907, ack 1673, win 64344, length 53SMB PACKET: SMBecho (REQUEST)

2011-06-10 12:03:58.257265 IP 10.10.10.199.445 > 10.10.10.101.2237: Flags [P.], seq 1673:1726, ack 1907, win 65535, length 53SMB PACKET: SMBecho (REPLY)

2011-06-10 12:03:58.382150 IP 10.10.10.101.2237 > 10.10.10.199.445: Flags [.], ack 1726, win 64291, length 0
2011-06-10 12:03:58.564069 IP 10.10.10.193 > 10.10.10.199: ICMP echo request, id 24071, seq 2, length 64
2011-06-10 12:03:58.564075 IP 10.10.10.199 > 10.10.10.193: ICMP echo reply, id 24071, seq 2, length 64
2011-06-10 12:03:59.235650 IP 10.10.10.24.1037 > 10.10.10.199.139: Flags [P.], seq 4392:4502, ack 2197, win 65453, length 110 NBT Session Packet: Session Mes$
2011-06-10 12:03:59.235750 IP 10.10.10.199.139 > 10.10.10.24.1037: Flags [P.], seq 2197:2301, ack 4502, win 65535, length 104 NBT Session Packet: Session Mes$
2011-06-10 12:03:59.236033 IP 10.10.10.24.1037 > 10.10.10.199.139: Flags [P.], seq 4502:4630, ack 2301, win 65349, length 128 NBT Session Packet: Session Mes$
2011-06-10 12:03:59.236284 IP 10.10.10.199.139 > 10.10.10.24.1037: Flags [P.], seq 2301:2340, ack 4630, win 65535, length 39 NBT Session Packet: Session Mess$
2011-06-10 12:03:59.236584 IP 10.10.10.24.1037 > 10.10.10.199.139: Flags [P.], seq 4630:4758, ack 2340, win 65310, length 128 NBT Session Packet: Session Mes$
2011-06-10 12:03:59.236812 IP 10.10.10.199.139 > 10.10.10.24.1037: Flags [P.], seq 2340:2379, ack 4758, win 65535, length 39 NBT Session Packet: Session Mess$
2011-06-10 12:03:59.372126 IP 10.10.10.24.1037 > 10.10.10.199.139: Flags [.], ack 2379, win 65271, length 0
2011-06-10 12:03:59.564019 IP 10.10.10.193 > 10.10.10.199: ICMP echo request, id 24071, seq 3, length 64
2011-06-10 12:03:59.564026 IP 10.10.10.199 > 10.10.10.193: ICMP echo reply, id 24071, seq 3, length 64
2011-06-10 12:03:59.763734 IP 10.10.10.30.2251 > 10.10.10.199.445: Flags [P.], seq 35554:35617, ack 45199, win 64904, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-10 12:03:59.763786 IP 10.10.10.199.445 > 10.10.10.30.2251: Flags [P.], seq 45199:45274, ack 35617, win 62780, length 75SMB PACKET: SMBreadX (REPLY)

2011-06-10 12:03:59.764250 IP 10.10.10.30.2251 > 10.10.10.199.445: Flags [P.], seq 35617:35680, ack 45274, win 64829, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-10 12:03:59.764291 IP 10.10.10.199.445 > 10.10.10.30.2251: Flags [P.], seq 45274:45665, ack 35680, win 62780, length 391SMB PACKET: SMBreadX (REPLY)

2011-06-10 12:03:59.764692 IP 10.10.10.30.2251 > 10.10.10.199.445: Flags [P.], seq 35680:35755, ack 45665, win 64438, length 75SMB PACKET: SMBlockingX (REQUE$

2011-06-10 12:03:59.764740 IP 10.10.10.199.445 > 10.10.10.30.2251: Flags [P.], seq 45665:45708, ack 35755, win 62780, length 43SMB PACKET: SMBlockingX (REPLY)

2011-06-10 12:03:59.765090 IP 10.10.10.30.2251 > 10.10.10.199.445: Flags [P.], seq 35755:35831, ack 45708, win 64395, length 76SMB PACKET: SMBtrans2 (REQUEST)

2011-06-10 12:03:59.765138 IP 10.10.10.199.445 > 10.10.10.30.2251: Flags [P.], seq 45708:45796, ack 35831, win 62780, length 88SMB PACKET: SMBtrans2 (REPLY)

2011-06-10 12:03:59.765520 IP 10.10.10.30.2251 > 10.10.10.199.445: Flags [P.], seq 35831:35906, ack 45796, win 64307, length 75SMB PACKET: SMBlockingX (REQUE$

2011-06-10 12:03:59.765564 IP 10.10.10.199.445 > 10.10.10.30.2251: Flags [P.], seq 45796:45839, ack 35906, win 62780, length 43SMB PACKET: SMBlockingX (REPLY)

2011-06-10 12:03:59.930121 IP 10.10.10.57.4551 > 10.10.10.199.139: Flags [P.], seq 17295:17358, ack 33094, win 64303, length 63 NBT Session Packet: Session M$
2011-06-10 12:03:59.930180 IP 10.10.10.199.139 > 10.10.10.57.4551: Flags [P.], seq 33094:33169, ack 17358, win 65535, length 75 NBT Session Packet: Session M$
2011-06-10 12:03:59.930642 IP 10.10.10.57.4551 > 10.10.10.199.139: Flags [P.], seq 17358:17421, ack 33169, win 64228, length 63 NBT Session Packet: Session M$
2011-06-10 12:03:59.930676 IP 10.10.10.199.139 > 10.10.10.57.4551: Flags [P.], seq 33169:33244, ack 17421, win 65535, length 75 NBT Session Packet: Session M$
2011-06-10 12:03:59.933539 IP 10.10.10.30.2251 > 10.10.10.199.445: Flags [.], ack 45839, win 64264, length 0
2011-06-10 12:04:00.070639 IP 10.10.10.57.4551 > 10.10.10.199.139: Flags [.], ack 33244, win 64153, length 0
2011-06-10 12:04:00.125095 IP 10.10.10.51.1879 > 10.10.10.199.445: Flags [P.], seq 34742:34874, ack 44522, win 65361, length 132SMB PACKET: SMBntcreateX (REQ$

2011-06-10 12:04:00.125275 IP 10.10.10.199.445 > 10.10.10.30.2251: Flags [P.], seq 45839:45894, ack 35906, win 62780, length 55SMB PACKET: SMBlockingX (REQUE$

2011-06-10 12:04:00.125445 IP 10.10.10.30.2251 > 10.10.10.199.445: Flags [P.], seq 35906:35951, ack 45894, win 64209, length 45SMB PACKET: SMBclose (REQUEST)

2011-06-10 12:04:00.125558 IP 10.10.10.199.445 > 10.10.10.30.2251: Flags [P.], seq 45894:45933, ack 35951, win 62780, length 39SMB PACKET: SMBclose (REPLY)
2011-06-10 12:04:00.125680 IP 10.10.10.199.445 > 10.10.10.51.1879: Flags [P.], seq 44522:44661, ack 34874, win 65535, length 139SMB PACKET: SMBntcreateX (REP$

2011-06-10 12:04:00.125959 IP 10.10.10.51.1879 > 10.10.10.199.445: Flags [P.], seq 34874:34950, ack 44661, win 65222, length 76SMB PACKET: SMBtrans2 (REQUEST)

2011-06-10 12:04:00.126012 IP 10.10.10.199.445 > 10.10.10.51.1879: Flags [P.], seq 44661:44733, ack 34950, win 65535, length 72SMB PACKET: SMBtrans2 (REPLY)

2011-06-10 12:04:00.126290 IP 10.10.10.51.1879 > 10.10.10.199.445: Flags [P.], seq 34950:35050, ack 44733, win 65150, length 100SMB PACKET: SMBtrans2 (REQUES$

2011-06-10 12:04:00.126342 IP 10.10.10.199.445 > 10.10.10.51.1879: Flags [P.], seq 44733:44837, ack 35050, win 65535, length 104SMB PACKET: SMBtrans2 (REPLY)

2011-06-10 12:04:00.126551 IP 10.10.10.51.1879 > 10.10.10.199.445: Flags [P.], seq 35050:35150, ack 44837, win 65046, length 100SMB PACKET: SMBtrans2 (REQUES$

2011-06-10 12:04:00.126596 IP 10.10.10.199.445 > 10.10.10.51.1879: Flags [P.], seq 44837:44941, ack 35150, win 65535, length 104SMB PACKET: SMBtrans2 (REPLY)

2011-06-10 12:04:00.127005 IP 10.10.10.51.1879 > 10.10.10.199.445: Flags [P.], seq 35150:35250, ack 44941, win 64942, length 100SMB PACKET: SMBtrans2 (REQUES$

2011-06-10 12:04:00.127050 IP 10.10.10.199.445 > 10.10.10.51.1879: Flags [P.], seq 44941:45045, ack 35250, win 65535, length 104SMB PACKET: SMBtrans2 (REPLY)

2011-06-10 12:04:00.127253 IP 10.10.10.51.1879 > 10.10.10.199.445: Flags [P.], seq 35250:35350, ack 45045, win 64838, length 100SMB PACKET: SMBtrans2 (REQUES$

2011-06-10 12:04:00.127297 IP 10.10.10.199.445 > 10.10.10.51.1879: Flags [P.], seq 45045:45149, ack 35350, win 65535, length 104SMB PACKET: SMBtrans2 (REPLY)

2011-06-10 12:04:00.127568 IP 10.10.10.51.1879 > 10.10.10.199.445: Flags [P.], seq 35350:35466, ack 45149, win 64734, length 116SMB PACKET: SMBtrans2 (REQUES$

2011-06-10 12:04:00.127618 IP 10.10.10.199.445 > 10.10.10.51.1879: Flags [P.], seq 45149:45253, ack 35466, win 65535, length 104SMB PACKET: SMBtrans2 (REPLY)

2011-06-10 12:04:00.127868 IP 10.10.10.51.1879 > 10.10.10.199.445: Flags [P.], seq 35466:35600, ack 45253, win 64630, length 134SMB PACKET: SMBtrans2 (REQUES$

2011-06-10 12:04:00.127991 IP 10.10.10.199.445 > 10.10.10.51.1879: Flags [P.], seq 45253:45292, ack 35600, win 65535, length 39SMB PACKET: SMBtrans2 (REPLY)

2011-06-10 12:04:00.235298 IP 10.10.10.30.2251 > 10.10.10.199.445: Flags [.], ack 45933, win 64170, length 0
2011-06-10 12:04:00.257619 IP 10.10.10.51.1879 > 10.10.10.199.445: Flags [.], ack 45292, win 64591, length 0
2011-06-10 12:04:01.032270 IP 10.10.10.29.3024 > 10.10.10.199.139: Flags [P.], seq 35599:35662, ack 45289, win 65402, length 63 NBT Session Packet: Session M$
2011-06-10 12:04:01.032332 IP 10.10.10.199.139 > 10.10.10.29.3024: Flags [P.], seq 45289:45364, ack 35662, win 65535, length 75 NBT Session Packet: Session M$


T3RM1NVT0R 06-17-2011 06:07 PM

@ Reply
 
Hi Sum1,

Yes, I am still here :-)

Can you please let me know the IPs of the following:

1. Backup server
2. Client machine (from where you have performed the test)
3. Server1
4. Router box

From the trace it appears that server1 is responding properly. One thing that I have observed is that there are ARP request which are taking longer time. Do you have DHCP lease set to low say 1 day or 2 days. Also what are the following IPs:

2011-06-10 12:04:05.927198 IP 10.10.10.137.137 > 10.10.10.255.137: UDP, length 50
2011-06-10 12:04:06.676694 IP 10.10.10.137.137 > 10.10.10.255.137: UDP, length 50

Please let me know the IPs of the above mentioned boxes so it will be easier to identify the response time.

Sum1 06-17-2011 08:13 PM

- - - - - - - - - - - -

Backup server: .186
Clientbox: .193
Server 1: .199
Routerbox: .1 (LAN nic eth1)

- - - - - - - - - - - - -

DHCP lease settings from /etc/dhcpd.conf:

default-lease-time 720;
max-lease-time 86400;

- - - - - - - - - - - - -

10.10.10.137 has got to be one of the windows client machines on the LAN; since all the network printers and scanners have static ip's ending in even numbers with a zero, such as: .120 or .150

And I believe the 10.10.10.255 is the broadcast address that all devices default to during outbound tcp/ip requests as defined by the dhcp server.

From /etc/dhcpd.conf:

option subnet-mask 255.255.255.0;
option broadcast-address 10.10.10.255;
option routers 10.10.10.1;

- - - - - - - - - - - - -

T3RM1NVT0R 06-19-2011 02:13 PM

@ Reply
 
Hi Sum1,

I hope you are having a nice weekend.

From the trace I do not see any packet drop or delay. I am assuming that the trace has been taken with 8 port switch. Also during the trace I think you have used static IPs which will roll out the issue with DHCP.

The only thing that I can think of after this trace is NIC card setting i.e. automatic or full duplex. Sometimes network work slow if you are using a swith or a router that works on full duplex and NIC card of the server working on half duplex or auto negotiation mode. The result of either of those will result in half duplex speed.

Also if you get a chance I would suggest you to take a packet trace in live environment which will show us some data exchange between client and server not only ICMP requests.

Sum1 06-20-2011 05:54 AM

Quote:

Originally Posted by T3RM1NVT0R (Post 4390105)
From the trace I do not see any packet drop or delay. I am assuming that the trace has been taken with 8 port switch. Also during the trace I think you have used static IPs which will roll out the issue with DHCP.

Also if you get a chance I would suggest you to take a packet trace in live environment which will show us some data exchange between client and server not only ICMP requests.

Hi T3RM1,
All is well except for this little mystery. <grin>
I hope you had good weather and a bit of rest and relaxation this weekend.

The scan was taken using the 48-port switch, so it's good news that I don't need to buy another one.
The Routerbox, Server 1, and Backup Server, are set with static ip addresses.

I'll check into the nic modes on the R-box, Serv1, and Bserv.
And I'll post up some typical traffic on R-box LAN nic and Serv1 nic.

Thanks again for giving your patience and guidance; it's very helpful.
Be well.

Sum1 06-20-2011 01:20 PM

Here's a clip of traffic on the Server 1 nic; it's difficult to post a wider timeframe due to the 30,000 character forum limit:
Code:

2011-06-20 14:08:12.762113 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 979411:979774, ack 165907, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:12.762324 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 165907:165970, ack 979774, win 65535, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:12.762385 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 979774:980137, ack 165970, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:12.762593 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 165970:166033, ack 980137, win 65172, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:12.762646 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 980137:980500, ack 166033, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:12.762853 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 166033:166096, ack 980500, win 64809, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:12.762907 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 980500:981587, ack 166096, win 65535, length 1087SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:12.763423 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 166096:166159, ack 981587, win 65535, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:12.763484 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 981587:981950, ack 166159, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:12.763695 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 166159:166222, ack 981950, win 65172, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:12.763748 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 981950:982313, ack 166222, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:12.763979 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 166222:166285, ack 982313, win 64809, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:12.764034 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 982313:982676, ack 166285, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:12.764253 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 166285:166348, ack 982676, win 64446, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:12.764306 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 982676:983039, ack 166348, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:12.764524 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 166348:166411, ack 983039, win 64083, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:12.764577 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 983039:983402, ack 166411, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:12.764773 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 166411:166474, ack 983402, win 65535, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:12.764827 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 983402:984489, ack 166474, win 65535, length 1087SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:12.766540 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 166474:166537, ack 984489, win 64448, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:12.766604 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 984489:984564, ack 166537, win 65535, length 75SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:12.766777 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 166537:166600, ack 984564, win 64373, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:12.766829 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 984564:984927, ack 166600, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:12.767044 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 166600:166663, ack 984927, win 65535, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:12.767097 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 984927:985290, ack 166663, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:12.767310 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 166663:166726, ack 985290, win 65172, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:12.767371 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 985290:985653, ack 166726, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:12.767586 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 166726:166789, ack 985653, win 64809, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:12.767638 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 985653:986016, ack 166789, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:12.767847 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 166789:166852, ack 986016, win 64446, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:12.767900 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 986016:986379, ack 166852, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:12.768114 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 166852:166915, ack 986379, win 64083, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:12.768168 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 986379:987466, ack 166915, win 65535, length 1087SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:12.924343 IPX 00000000.00:00:74:f3:55:c7.4100 > 00000000.ff:ff:ff:ff:ff:ff.0452: ipx-sap-nearest-req 0004
2011-06-20 14:08:12.924644 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [.], ack 987466, win 65535, length 0
2011-06-20 14:08:13.546607 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 166915:166978, ack 987466, win 65535, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.546653 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 987466:987829, ack 166978, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.546893 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 166978:167041, ack 987829, win 65172, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.546930 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 987829:988192, ack 167041, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.547143 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 167041:167104, ack 988192, win 64809, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.547179 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 988192:988555, ack 167104, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.547392 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 167104:167167, ack 988555, win 64446, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.547426 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 988555:988918, ack 167167, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.547633 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 167167:167230, ack 988918, win 64083, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.547680 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 988918:989281, ack 167230, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.547894 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 167230:167293, ack 989281, win 65535, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.547948 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 989281:989644, ack 167293, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.548158 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 167293:167356, ack 989644, win 65172, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.548211 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 989644:990007, ack 167356, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.548423 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 167356:167419, ack 990007, win 64809, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.548477 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 990007:990370, ack 167419, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.548693 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 167419:167482, ack 990370, win 64446, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.548747 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 990370:990733, ack 167482, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.548954 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 167482:167545, ack 990733, win 64083, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.549007 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 990733:991096, ack 167545, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.549214 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 167545:167608, ack 991096, win 65535, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.549267 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 991096:991459, ack 167608, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.549476 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 167608:167671, ack 991459, win 65172, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.549529 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 991459:991822, ack 167671, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.549740 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 167671:167734, ack 991822, win 64809, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.549793 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 991822:992909, ack 167734, win 65535, length 1087SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.550141 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 167734:167797, ack 992909, win 65535, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.550195 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 992909:992984, ack 167797, win 65535, length 75SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.550356 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 167797:167860, ack 992984, win 65460, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.550409 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 992984:993347, ack 167860, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.550621 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 167860:167923, ack 993347, win 65097, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.550675 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 993347:993710, ack 167923, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.550885 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 167923:167986, ack 993710, win 64734, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.550938 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 993710:994073, ack 167986, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.551167 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 167986:168049, ack 994073, win 64371, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.551221 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 994073:994436, ack 168049, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.551431 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 168049:168112, ack 994436, win 65535, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.551487 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 994436:994799, ack 168112, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.551776 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 168112:168175, ack 994799, win 65172, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.551830 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 994799:995162, ack 168175, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.552045 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 168175:168238, ack 995162, win 64809, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.552098 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 995162:995525, ack 168238, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.552307 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 168238:168301, ack 995525, win 64446, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.552370 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 995525:995888, ack 168301, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.552582 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 168301:168364, ack 995888, win 64083, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.552636 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 995888:996251, ack 168364, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.552847 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 168364:168427, ack 996251, win 65535, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.552901 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 996251:996614, ack 168427, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.553111 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 168427:168490, ack 996614, win 65172, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.553165 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 996614:996977, ack 168490, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.553376 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 168490:168553, ack 996977, win 64809, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.553430 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 996977:998064, ack 168553, win 65535, length 1087SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.553998 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 168553:168616, ack 998064, win 65535, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.554051 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 998064:998427, ack 168616, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.554263 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 168616:168679, ack 998427, win 65172, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.554316 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 998427:998790, ack 168679, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.554529 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 168679:168742, ack 998790, win 64809, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.554582 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 998790:999153, ack 168742, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.554794 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 168742:168805, ack 999153, win 64446, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.554847 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 999153:999516, ack 168805, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.555059 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 168805:168868, ack 999516, win 64083, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.555112 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 999516:999879, ack 168868, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.555323 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 168868:168931, ack 999879, win 65535, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.555385 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 999879:1000242, ack 168931, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.555599 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 168931:168994, ack 1000242, win 65172, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.555652 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 1000242:1000605, ack 168994, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.555872 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 168994:169057, ack 1000605, win 64809, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.555925 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 1000605:1000968, ack 169057, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.556134 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 169057:169120, ack 1000968, win 64446, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.556187 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 1000968:1001331, ack 169120, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.556399 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 169120:169183, ack 1001331, win 64083, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.556452 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 1001331:1001694, ack 169183, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.556666 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 169183:169246, ack 1001694, win 65535, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.556719 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 1001694:1002057, ack 169246, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.556929 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 169246:169309, ack 1002057, win 65172, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.556982 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 1002057:1002420, ack 169309, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.557195 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 169309:169372, ack 1002420, win 64809, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.557249 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 1002420:1003507, ack 169372, win 65535, length 1087SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.559167 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 169372:169435, ack 1003507, win 65535, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.559221 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 1003507:1003582, ack 169435, win 65535, length 75SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.559400 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 169435:169498, ack 1003582, win 65460, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.559453 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 1003582:1003945, ack 169498, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.559664 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 169498:169561, ack 1003945, win 65097, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.559717 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 1003945:1004308, ack 169561, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.559928 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 169561:169624, ack 1004308, win 64734, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.559981 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 1004308:1004671, ack 169624, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.560193 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 169624:169687, ack 1004671, win 64371, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.560246 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 1004671:1005034, ack 169687, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.560457 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 169687:169750, ack 1005034, win 65535, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.560509 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 1005034:1005397, ack 169750, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.560722 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 169750:169813, ack 1005397, win 65172, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.560775 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 1005397:1005760, ack 169813, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.560988 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 169813:169876, ack 1005760, win 64809, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.561042 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 1005760:1006123, ack 169876, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.561256 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 169876:169939, ack 1006123, win 64446, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.561310 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 1006123:1006486, ack 169939, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.561521 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 169939:170002, ack 1006486, win 64083, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.561574 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 1006486:1006849, ack 170002, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.561782 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 170002:170065, ack 1006849, win 65535, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.561835 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 1006849:1007212, ack 170065, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.562059 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 170065:170128, ack 1007212, win 65172, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.562113 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 1007212:1007575, ack 170128, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.562330 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 170128:170191, ack 1007575, win 64809, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.562392 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 1007575:1008662, ack 170191, win 65535, length 1087SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.562924 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 170191:170254, ack 1008662, win 65535, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.562978 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 1008662:1009025, ack 170254, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.563190 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 170254:170317, ack 1009025, win 65172, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.563244 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 1009025:1009388, ack 170317, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.563455 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 170317:170380, ack 1009388, win 64809, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.563508 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 1009388:1009751, ack 170380, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.563719 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 170380:170443, ack 1009751, win 64446, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.563772 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 1009751:1010114, ack 170443, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.563981 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 170443:170506, ack 1010114, win 64083, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.564083 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 1010114:1010477, ack 170506, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.564308 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 170506:170569, ack 1010477, win 65535, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.564381 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 1010477:1011564, ack 170569, win 65535, length 1087SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.566125 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 170569:170632, ack 1011564, win 64448, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.566178 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 1011564:1011639, ack 170632, win 65535, length 75SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.566350 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 170632:170695, ack 1011639, win 64373, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.566403 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 1011639:1012002, ack 170695, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.566616 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 170695:170758, ack 1012002, win 65535, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.566670 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 1012002:1012365, ack 170758, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.566884 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 170758:170821, ack 1012365, win 65172, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.566937 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 1012365:1012728, ack 170821, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.567153 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 170821:170884, ack 1012728, win 64809, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.567205 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 1012728:1013091, ack 170884, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.567441 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 170884:170947, ack 1013091, win 64446, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.567494 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 1013091:1013454, ack 170947, win 65535, length 363SMB PACKET: SMBreadX (REPLY)

2011-06-20 14:08:13.567710 IP 10.10.10.109.4678 > 10.10.10.199.445: Flags [P.], seq 170947:171010, ack 1013454, win 64083, length 63SMB PACKET: SMBreadX (REQUEST)

2011-06-20 14:08:13.567762 IP 10.10.10.199.445 > 10.10.10.109.4678: Flags [P.], seq 1013454:1014541, ack 171010, win 65535, length 1087SMB PACKET: SMBreadX (REPLY)


T3RM1NVT0R 06-20-2011 04:56 PM

@ Reply
 
Hi Sum1,

Indeed it is a mystery.

I do not see any delay in the trace. Not sure from where the delay is coming from. This is interesting and at the same time head scratching. Have a look at the NIC settings (I don't think so that will be the case otherwise it should reflect in the trace) but still we can have a look.

So far we have ruled out the following possibilities:

1. Hardware issue.
2. Problem with primary DNS.
3. Problem with switch port.
4. Problem with the server1 as it works fine when you request for ssh over WAN.

Current situation:

1. LAN still slow, problem with backups.

I hope I am summarizing it correctly :-) just doing so that we can just look at this post and can take it forward from here. Give a try to the following steps:

1. Try to ssh to server1 using IP address instead of hostname (Just to be sure that there is nothing wrong with DNS)
2. I have feeling that workstation's requests are getting processed normally and the issue is only between server1 and backup server and with the printers.
3. Are you using cups for printing? If yes then try to print to the printer by installing printer as a local printer on a workstation. So that we can be sure that it is not a cups issue.
4. Also for the backup server are we have trouble with daily, weekly or montly backups so that we can investigate accordingly.

Sum1 09-21-2011 01:33 PM

Quote:

Originally Posted by T3RM1NVT0R (Post 4391149)

So far we have ruled out the following possibilities:

2. Problem with primary DNS.

Hi T3rm,

Long time, no see.
I hope all is well on your side.

Well, I may have a dns problem afterall.
I finally got back around to taking a look at the problem and found that when I put the configuration parameter "useDNS = no" into my sshd_config file on the routerbox, primary serv, and backup serv; suddenly, all authentication slowdown has disappeared. Ssh works perfectly now.

That said, users on the network still report intermittent pauses, slowdowns, and "Not Responding" messages when traversing directories and shares on the samba server (primary server). Going back in memory to the start of the problem, I recall upgrading the primary server from Slackware 13.1 to 13.37 as soon as it was released. This was a full month before the network problems were reported or discovered.

I'm wondering if there is some dns issue with samba version 3.5.6, the current version in Slack 13.37.
I've asked about this on the samba support list and I'm hoping to obtain some guidance on this point.
Even though samba is acting as standalone server (a workgroup server) and not a true primary domain server, I'm wondering if bind is necessary, or some other configuration unique to 3.5.6.

Please let me know what you think if you see this.

Be well and best regards.

Sum1 09-22-2011 09:45 AM

Follow-up:

/var/log/samba/nmbd.log --

[2011/09/19 13:13:07.959554, 0] nmbd/nmbd_browsesync.c:350(find_domain_master_name_query_fail)
find_domain_master_name_query_fail:
Unable to find the Domain Master Browser name MW<1b> for the workgroup MW.
Unable to sync browse lists in this workgroup.
[2011/09/19 13:28:07.204633, 0] nmbd/nmbd_browsesync.c:350(find_domain_master_name_query_fail)
root@a1:/var/log/samba#


smbclient -N -L a1 --

Anonymous login successful
Domain=[MW] OS=[Unix] Server=[Samba 3.5.6]
Sharename Type Comment
--------- ---- -------
Ac Disk
Ma Disk
Ca Disk
Ne Disk
Ol Disk
Ka Disk
Mz Disk
Fa Disk
Sc Disk
IPC$ IPC IPC Service (A1 Server)
Anonymous login successful
Domain=[MW] OS=[Unix] Server=[Samba 3.5.6]

Server Comment
--------- -------
A1 A1 Server

Workgroup Master
--------- -------
MW A1


/etc/samba/smb.conf --

#======================= Global Settings =====================================
[global]

netbios name = a1
workgroup = mw
server string = A1 Server
security = user
hosts allow = 192.168.1. 127.0.0.
hosts deny = 0.0.0.0/0
log file = /var/log/samba.%m
max log size = 500
passdb backend = tdbsam
encrypt passwords = Yes
local master = yes
os level = 99
time server = yes
preferred master = yes
wins support = yes
wide links = no
#============================ Share Definitions ==============================

[Ac]
writable = yes
read only = no
guest ok = yes
public = yes
oplocks = true
level2 oplocks = true
path = /abc/def
create mask = 0777
directory mask = 0777
security mask = 0777
directory security mask = 0777


[Ma]
writable = yes
read only = no
guest ok = yes
public = yes
oplocks = true
level2 oplocks = true
path = /abc/ghi
create mask = 0777
directory mask = 0777
security mask = 0777
directory security mask = 0777

the settings on all other shares are precisely the same.

Sum1 09-23-2011 11:55 AM

I am now using log level 3 in samba and the nmbd process shows the following just about every 15 minutes:

Code:

[2011/09/23 11:39:19.617707,  0] nmbd/nmbd_browsesync.c:350(find_domain_master_name_query_fail)
  find_domain_master_name_query_fail:
  Unable to find the Domain Master Browser name MW<1b> for the workgroup MW.
  Unable to sync browse lists in this workgroup.
[2011/09/23 11:54:24.368344,  0] nmbd/nmbd_browsesync.c:350(find_domain_master_name_query_fail)
  find_domain_master_name_query_fail:
  Unable to find the Domain Master Browser name MW<1b> for the workgroup MW.
  Unable to sync browse lists in this workgroup.
[2011/09/23 12:09:35.535017,  0] nmbd/nmbd_browsesync.c:350(find_domain_master_name_query_fail)
  find_domain_master_name_query_fail:
  Unable to find the Domain Master Browser name MW<1b> for the workgroup MW.
  Unable to sync browse lists in this workgroup.
[2011/09/23 12:24:42.934861,  0] nmbd/nmbd_browsesync.c:350(find_domain_master_name_query_fail)
  find_domain_master_name_query_fail:
  Unable to find the Domain Master Browser name MW<1b> for the workgroup MW.
  Unable to sync browse lists in this workgroup.
[2011/09/23 12:39:50.847643,  0] nmbd/nmbd_browsesync.c:350(find_domain_master_name_query_fail)
  find_domain_master_name_query_fail:
  Unable to find the Domain Master Browser name MW<1b> for the workgroup MW.
  Unable to sync browse lists in this workgroup.

smbd process shows the following:

Code:

[2011/09/23 12:35:40.645624,  0] lib/util_sock.c:1432(get_peer_addr_internal)
  getpeername failed. Error was Transport endpoint is not connected
[2011/09/23 12:42:15.882985,  0] lib/util_sock.c:1432(get_peer_addr_internal)
  getpeername failed. Error was Transport endpoint is not connected


Sum1 09-27-2011 02:50 PM

Solved.
Not a hardware (nic or switch) issue.
Not a dns issue.
Not an ntp issue.
Not a firewall/router tcp/ip or iptables issue.

I needed to declare a samba domain master, add a few parameters, and drop some others.

/etc/samba/smb.conf:
#======================= Global Settings =====================================
[global]

netbios name = a1
workgroup = mw
server string = A1 Server
security = user
hosts allow = 10.10.10. 127.
hosts deny = 0.0.0.0/0
log file = /var/log/samba.%m
max log size = 500
passdb backend = tdbsam
encrypt passwords = Yes
domain master = yes (added)
local master = yes
## os level = 99 (commented out)
smb ports = 139 (added)
## time server = yes (commented out)
preferred master = yes
wins support = yes
name resolve order = wins host bcast lmhosts (added)
wide links = no
log level = 3
- - - - - - - - - - - - - - - -

Success:

killall nmbd
killall smbd
then started samba -
/etc/rc.d/rc.samba

- - - - - -
/var/log/samba.nmbd read:

[2011/09/27 14:13:37.248333, 3] nmbd/nmbd_sendannounce.c:207(send_host_announcement)
send_host_announcement: type 819a03 for host A1 on subnet xxx.xxx.xxx.xxx for workgroup MW
[2011/09/27 14:13:37.248435, 0] nmbd/nmbd_become_dmb.c:337(become_domain_master_browser_wins)
become_domain_master_browser_wins:
Attempting to become domain master browser on workgroup MW, subnet UNICAST_SUBNET.
[2011/09/27 14:13:37.248523, 0] nmbd/nmbd_become_dmb.c:351(become_domain_master_browser_wins)
become_domain_master_browser_wins: querying WINS server from IP xxx.xxx.xxx.xxx for domain master browser name MW<1b> on workgroup MW

and then a flood of incoming client requests to process multihomed winserver name query
and then
add_name_to_subnet: Added netbios name A1 to subnet
and then
check_for_master_browser_fail: Forcing election on workgroup MW
and then
check_elections: >>> Starting election for workgroup MW on subnet
and then
Samba server A1 is now a domain master browser for workgroup MW on subnet
and then
Samba name server A1 is now a local master browser for workgroup MW on subnet
and finally
We are both a domain and a local master browser for workgroup MW. Do not announce to ourselves.
- - - - - - - - - - - - -

No more domain master query failures.
No more slowness and "not responding" delays when traversing folders and directories on the network.
I received some very kind help on the samba user mailing list, and am very grateful for it.
So glad this issue is resolved.

Sum1 10-30-2011 03:14 PM

Quote:

Originally Posted by Sum1 (Post 4483745)
Solved.
- - - - - - - - - - - - -

No more domain master query failures.
No more slowness and "not responding" delays when traversing folders and directories on the network.
I received some very kind help on the samba user mailing list, and am very grateful for it.
So glad this issue is resolved.

I spoke too soon about the issue being completely resolved.
After a few days, the same network slowdown came back.
User authentication to the samba server was functioning fine, but opening shares and sub-directories was often slow and/or completely unresponsive for up to 1 minute.

I changed the "smb ports =" parameter to 139 and 445.
I reconfirmed access delays from client boxes to server using tcpdump.
I now believe the problem has been solved based on user reports.
What worked was making changes to my routerbox dhcp server and hosts file on the samba server.
Since my samba server is not a true domain server, I am not running a bind/named/dns server on my LAN, only a dhcp server.
I added "host" entries in the routerbox dhcpd.conf so that every client machine is assigned a static ip address based on its NIC MAC address.
Example:
host kevin_box {
hardware ethernet 00:0B:A5:1F:B3:88;
fixed-address 10.10.10.60;
}

I then added the following entry in the samba server's /etc/hosts file:

10.10.10.60 kevin_box

I added these entries for every network client box and document scanner.

The document scanners complete file transfers almost instantly and I have observed the users moving quickly and smoothly across share sub-directories.


All times are GMT -5. The time now is 04:01 PM.