Home > Storage > Data Storage Essentials > Storage Resource Manager (SRM) > Dell SRM Data Forwarder > Validate communication from collectors to pbe/fe servers
From command line interface of the REMOTE-COLLECTOR server, run the following tests as root user, using the netcat command, towards target servers FRONTEND-IP and PBE-IP. On the target server, use the tcpdump command as root user to confirm reception of the packets.
If the netcat and tcpdump commands are not available on the SRM servers, install them as root user, using the following utility:
srm-server#/opt/emc/vmutils/bin/vmutils-manager.sh
Replace FRONTEND-IP, PBE-IP, GATE-IP, and REMOTE-COLLECTOR-IP with the actual IP addresses of the SRM servers.
PropertyAccessor: REMOTE-COLLECTOR to communicate with FRONTEND-IP:58443 via GATE-IP:58443
REMOTE-COLLECTOR:~ # netcat -zvn GATE-IP 58443
Connection to GATE-IP 58443 port [tcp/*] succeeded!
FRONTEND:~ # tcpdump -i any '(dst FRONTEND-IP && dst port 58443) or (src FRONTEND-IP && src port 58443)' -n
23:46:49.822012 IP GATE-IP.36958 > FRONTEND-IP.58443: Flags [S], seq 3751257320, win 29200, options [mss 1460,sackOK,TS val 1685627322 ecr 0,nop,wscale 7], length 0
23:46:49.822110 IP FRONTEND-IP.58443 > GATE-IP.36958: Flags [S.], seq 3810488336, ack 3751257321, win 28960, options [mss 1460,sackOK,TS val 1508520352 ecr 1685627322,nop,wscale 7], length 0
SparqlAccessor, TMS update to TS: REMOTE-COLLECTOR to communicate with PBE-IP:48443 via GATE-IP:48443
REMOTE-COLLECTOR:~ # netcat -zvn GATE-IP 48443
Connection to GATE-IP 48443 port [tcp/*] succeeded!
PBE:~ # tcpdump -i any '(dst PBE-IP && dst port 48443) or (src PBE-IP && src port 48443)' -n
23:47:07.931030 IP GATE-IP.36992 > PBE-IP.48443: Flags [S], seq 3921572837, win 29200, options [mss 1460,sackOK,TS val 1685501329 ecr 0,nop,wscale 7], length 0
23:47:07.931127 IP PBE-IP.48443 > GATE-IP.36992: Flags [S.], seq 119706513, ack 3921572838, win 28960, options [mss 1460,sackOK,TS val 3466950085 ecr 1685501329,nop,wscale 7], length 0
Events (ports: 2041 udp, 2010, 2040, 52001, 52007, 22020): REMOTE-COLLECTOR to communicate with PBE-IP:port via GATE-IP:port
REMOTE-COLLECTOR:~ # netcat -zvun GATE-IP 2041
Connection to GATE-IP 2041 port [udp/*] succeeded!
PBE:~ # tcpdump -i any dst port 2041 -n
23:52:43.993286 IP GATE-IP.39099 > PBE-IP.2041: UDP, length 1
REMOTE-COLLECTOR:~ # netcat -zvn GATE-IP 2010
Connection to GATE-IP 2010 port [tcp/*] succeeded!
PBE:~ # tcpdump -i any '(dst PBE-IP && dst port 2010) or (src PBE-IP && src port 2010)' -n
23:57:37.325016 IP GATE-IP.34380 > PBE-IP.2010: Flags [S], seq 2968565486, win 29200, options [mss 1460,sackOK,TS val 1686130711 ecr 0,nop,wscale 7], length 0
23:57:37.325123 IP PBE-IP.2010 > GATE-IP.34380: Flags [S.], seq 2262706861, ack 2968565487, win 28960, options [mss 1460,sackOK,TS val 3467579478 ecr 1686130711,nop,wscale 7], length 0
REMOTE-COLLECTOR:~ # netcat -zvn GATE-IP 2040
Connection to GATE-IP 2040 port [tcp/*] succeeded!
PBE:~ # tcpdump -i any '(dst PBE-IP && dst port 2040) or (src PBE-IP && src port 2040)' -n
23:58:20.126114 IP GATE-IP.36142 > PBE-IP.2040: Flags [S], seq 3596835423, win 29200, options [mss 1460,sackOK,TS val 1686173511 ecr 0,nop,wscale 7], length 0
23:58:20.126211 IP PBE-IP.2040 > GATE-IP.36142: Flags [S.], seq 1159402138, ack 3596835424, win 28960, options [mss 1460,sackOK,TS val 3467622279 ecr 1686173511,nop,wscale 7], length 0
Target udp port 162 is redirected to udp port 2041 on PBE server:
REMOTE-COLLECTOR:~ # netcat -zvu GATE-IP 162
Connection to GATE-IP 162 port [udp/snmptrap] succeeded!
PBE:~ # tcpdump -i any dst port 2041 -n
00:00:08.432324 IP GATE-IP.59155 > PBE-IP.2041: UDP, length 1
REMOTE-COLLECTOR:~ # netcat -zvn GATE-IP 52001
Connection to GATE-IP 52001 port [tcp/*] succeeded!
PBE:~ # tcpdump -i any '(dst PBE-IP && dst port 52001) or (src PBE-IP && src port 52001)' -n
00:14:38.815614 IP GATE-IP.50986 > PBE-IP.52001: Flags [S], seq 466442469, win 29200, options [mss 1460,sackOK,TS val 1687152181 ecr 0,nop,wscale 7], length 0
00:14:38.815711 IP PBE-IP.52001 > GATE-IP.50986: Flags [R.], seq 0, ack 466442470, win 0, length 0
REMOTE-COLLECTOR:~ # netcat -zvn GATE-IP 52007
Connection to GATE-IP 52007 port [tcp/*] succeeded!
PBE:~ # tcpdump -i any '(dst PBE-IP && dst port 52007) or (src PBE-IP && src port 52007)' -n
00:16:00.786449 IP GATE-IP.47834 > PBE-IP.52007: Flags [S], seq 321760637, win 29200, options [mss 1460,sackOK,TS val 1687234151 ecr 0,nop,wscale 7], length 0
00:16:00.786532 IP PBE-IP.52007 > GATE-IP.47834: Flags [R.], seq 0, ack 321760638, win 0, length 0
REMOTE-COLLECTOR:~ # netcat -zvn GATE-IP 22020
Connection to GATE-IP 22020 port [tcp/*] succeeded!
PBE:~ # tcpdump -i any '(dst PBE-IP && dst port 22020) or (src PBE-IP && src port 22020)' -n
00:17:13.005035 IP GATE-IP.58080 > PBE-IP.22020: Flags [S], seq 1197119609, win 29200, options [mss 1460,sackOK,TS val 1687306368 ecr 0,nop,wscale 7], length 0
00:17:13.005112 IP PBE-IP.22020 > GATE-IP.58080: Flags [R.], seq 0, ack 1197119610, win 0, length 0
If all validation tests are successful, proceed with the collector servers’ configuration in the frontend admin UI.
If tests are not successful, check the iptables rules and whether they are in the order as specified in previous chapter.