This is a static archive of our old Q&A Site. Please post any new questions and answers at ask.wireshark.org.

who blocked my connection???

0

when i try to connect via VNC i see the next log, can you help me i need to find who is been blocked my connection

No. Time Source Destination Protocol Info 51 477.905684 10.206.96.8 10.206.80.103 TCP xmapi > esmmanager [SYN] Seq=0 Win=16384 Len=0 MSS=1024 WS=0 TSV=4798594 TSER=0

Frame 51: 74 bytes on wire (592 bits), 74 bytes captured (592 bits) Ethernet II, Src: 63:30:00:00:00:00 (63:30:00:00:00:00), Dst: 6f:31:65:74:68:31 (6f:31:65:74:68:31) Internet Protocol, Src: 10.206.96.8 (10.206.96.8), Dst: 10.206.80.103 (10.206.80.103) Version: 4 Header length: 20 bytes Differentiated Services Field: 0x10 (DSCP 0x04: Unknown DSCP; ECN: 0x00) Total Length: 60 Identification: 0x4abd (19133) Flags: 0x00 Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x0028 [incorrect, should be 0x69e4] Source: 10.206.96.8 (10.206.96.8) Destination: 10.206.80.103 (10.206.80.103) Transmission Control Protocol, Src Port: xmapi (1933), Dst Port: esmmanager (5600), Seq: 0, Len: 0

No. Time Source Destination Protocol Info 52 477.905983 10.206.96.8 10.206.80.103 TCP xmapi > esmmanager [SYN] Seq=0 Win=16384 Len=0 MSS=1024 WS=0 TSV=4798594 TSER=0

Frame 52: 74 bytes on wire (592 bits), 74 bytes captured (592 bits) Ethernet II, Src: 63:30:00:00:00:00 (63:30:00:00:00:00), Dst: 4f:63:65:74:68:31 (4f:63:65:74:68:31) Internet Protocol, Src: 10.206.96.8 (10.206.96.8), Dst: 10.206.80.103 (10.206.80.103) Version: 4 Header length: 20 bytes Differentiated Services Field: 0x10 (DSCP 0x04: Unknown DSCP; ECN: 0x00) Total Length: 60 Identification: 0x4abd (19133) Flags: 0x00 Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x0028 [incorrect, should be 0x69e4] Source: 10.206.96.8 (10.206.96.8) Destination: 10.206.80.103 (10.206.80.103) Transmission Control Protocol, Src Port: xmapi (1933), Dst Port: esmmanager (5600), Seq: 0, Len: 0

No. Time Source Destination Protocol Info 53 477.950840 10.206.80.103 10.206.96.8 TCP esmmanager > xmapi [RST, ACK] Seq=1 Ack=1 Win=0 Len=0

Frame 53: 54 bytes on wire (432 bits), 54 bytes captured (432 bits) Ethernet II, Src: 63:30:00:00:00:00 (63:30:00:00:00:00), Dst: 69:32:65:74:68:31 (69:32:65:74:68:31) Internet Protocol, Src: 10.206.80.103 (10.206.80.103), Dst: 10.206.96.8 (10.206.96.8) Version: 4 Header length: 20 bytes Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00) Total Length: 40 Identification: 0x8e1a (36378) Flags: 0x00 Fragment offset: 0 Time to live: 125 Protocol: TCP (6) Header checksum: 0xe9aa [correct] Source: 10.206.80.103 (10.206.80.103) Destination: 10.206.96.8 (10.206.96.8) Transmission Control Protocol, Src Port: esmmanager (5600), Dst Port: xmapi (1933), Seq: 1, Ack: 1, Len: 0

No. Time Source Destination Protocol Info 54 477.950885 10.206.80.103 10.206.96.8 TCP esmmanager > xmapi [RST, ACK] Seq=1 Ack=1 Win=0 Len=0

Frame 54: 54 bytes on wire (432 bits), 54 bytes captured (432 bits) Ethernet II, Src: 63:30:00:00:00:00 (63:30:00:00:00:00), Dst: 49:63:65:74:68:31 (49:63:65:74:68:31) Internet Protocol, Src: 10.206.80.103 (10.206.80.103), Dst: 10.206.96.8 (10.206.96.8) Version: 4 Header length: 20 bytes Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00) Total Length: 40 Identification: 0x8e1a (36378) Flags: 0x00 Fragment offset: 0 Time to live: 125 Protocol: TCP (6) Header checksum: 0xe9aa [correct] Source: 10.206.80.103 (10.206.80.103) Destination: 10.206.96.8 (10.206.96.8) Transmission Control Protocol, Src Port: esmmanager (5600), Dst Port: xmapi (1933), Seq: 1, Ack: 1, Len: 0

asked 24 Aug '11, 07:45

ds_ds's gravatar image

ds_ds
1111
accept rate: 0%


One Answer:

0

Looks like the system you want to VNC to does not have the VNC port open or maybe it has some host based firewall rules that are blocking your connection.

answered 24 Aug '11, 08:02

SYN-bit's gravatar image

SYN-bit ♦♦
17.1k957245
accept rate: 20%

hi Synbit

the server have a vnc open if i make a test from net lan the connection is OK, i have the problem when my connection go across the firewell.

i review the firewall rules and i dont see a problem, i i make a tcpdump in firewall i see all connection accept.

do you have any idea??

(30 Aug '11, 08:24) ds_ds

Did you also check the host based firewall rules on the server (iptables or similar)?

(30 Aug '11, 08:45) SYN-bit ♦♦