We had similar problems with some systems behind a firewall that could not handle the backup traffic. Symantec gave us some regristry hacks that changed how Windows handles TCP timeouts. It solved our problem.
If you think it might help, let me know and I'll send the regristry hacks. ============================= Carl Stehman IT Distributed Services Team Pepco Holdings, Inc. 202-331-6619 Pager 301-765-2703 [EMAIL PROTECTED] "Cornely, David" <[EMAIL PROTECTED]> Sent by: [EMAIL PROTECTED] 05/29/2008 04:38 PM To <veritas-bu@mailman.eng.auburn.edu> cc Subject Re: [Veritas-bu] Network Connection time out (41) A while ago we saw similar issues with duplications, at least it was the same ?Connection reset by peer? error (although different error code). It was fixed by changing our TCP keepalive value on the media server. Perhaps someone changed a timeout value on the firewall. Play with this value on the media server to see if it helps. http://sunsolve.sun.com/search/document.do?assetkey=1-30-2876-1 For windows, probably a registry change. From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Jimenez, Daniel Sent: Thursday, May 29, 2008 13:01 To: veritas-bu@mailman.eng.auburn.edu Subject: [Veritas-bu] Network Connection time out (41) Hey guys I am receiving a Network Connection time out (41) on a consistent basis when I run a backup on two of our servers. The servers are behind a DMZ but I have set the BPCD connect-back to use the VNETD port and it worked for a long time but now all I receive are 41 errors. The servers do write some data but eventually error out. I am able to telnet to port 13724 on both servers so there is no blocking on the firewall for that port. Any assistance would be appreciated. CLIENT BPBKAR LOG: 12:28:31.007 PM: [648.3824] <16> dtcp_write: TCP - failure: send socket (1864) (TCP 10054: Connection reset by peer) 12:28:31.038 PM: [648.3824] <16> dtcp_write: TCP - failure: attempted to send 125 bytes 12:28:31.038 PM: [648.3824] <16> dtcp_write: TCP - failure: send socket (1864) (TCP 10054: Connection reset by peer) 12:28:31.038 PM: [648.3824] <16> dtcp_write: TCP - failure: attempted to send 171 bytes 12:28:31.569 PM: [648.3824] <16> dtcp_write: TCP - failure: send socket (1864) (TCP 10054: Connection reset by peer) 12:28:31.569 PM: [648.3824] <16> dtcp_write: TCP - failure: attempted to send 171 bytes 12:28:31.757 PM: [648.3824] <16> dtcp_read: TCP - failure: recv socket (376) (TCP 10053: Software caused connection abort) 12:28:31.804 PM: [648.3824] <2> tar_base::V_vTarMsgW: FTL - tar file write error (40) 12:28:31.804 PM: [648.3824] <16> dtcp_write: TCP - failure: send socket (1864) (TCP 10054: Connection reset by peer) 12:28:31.804 PM: [648.3824] <16> dtcp_write: TCP - failure: attempted to send 6 bytes 12:28:31.804 PM: [648.3824] <16> dtcp_write: TCP - failure: send socket (1864) (TCP 10054: Connection reset by peer) 12:28:31.804 PM: [648.3824] <16> dtcp_write: TCP - failure: attempted to send 26 bytes 12:28:31.866 PM: [648.3824] <2> tar_base::V_vTarMsgW: INF - EXIT STATUS 14: file write failed 12:28:31.866 PM: [648.3824] <16> dtcp_write: TCP - failure: send socket (1864) (TCP 10054: Connection reset by peer) 12:28:31.866 PM: [648.3824] <16> dtcp_write: TCP - failure: attempted to send 6 bytes 12:28:31.866 PM: [648.3824] <16> dtcp_write: TCP - failure: send socket (1864) (TCP 10054: Connection reset by peer) 12:28:31.866 PM: [648.3824] <16> dtcp_write: TCP - failure: attempted to send 34 bytes 12:28:31.882 PM: [648.3824] <4> tar_backup::backup_done_state: INF - Not waiting for server status 12:28:31.929 PM: [648.3824] <16> dtcp_write: TCP - failure: send socket (1864) (TCP 10054: Connection reset by peer) 12:28:31.929 PM: [648.3824] <16> dtcp_write: TCP - failure: attempted to send 6 bytes 12:28:31.929 PM: [648.3824] <16> dtcp_write: TCP - failure: send socket (1864) (TCP 10054: Connection reset by peer) 12:28:31.929 PM: [648.3824] <16> dtcp_write: TCP - failure: attempted to send 33 bytes 12:28:37.585 PM: [648.3824] <4> OVStopCmd: INF - EXIT - status = 0 12:28:39.726 PM: [648.3824] <2> ov_log::V_GlobalLog: INF - BEDS_Term() Enter InitFlags:0x1 12:28:40.351 PM: [648.3824] <16> dtcp_read: TCP - failure: recv socket (376) (TCP 10053: Software caused connection abort) 12:28:40.366 PM: [648.3824] <4> OVShutdown: INF - Finished process 12:28:40.366 PM: [648.3824] <4> WinMain: INF - Exiting C:\Program Files\VERITAS\NetBackup\bin\bpbkar32.exe 12:28:42.382 PM: [648.3824] <4> ov_log::OVClose: INF - Closing log file: C:\Program Files\VERITAS\NetBackup\logs\BPBKAR\052908.LOG Daniel Jimenez Systems Analyst II Data Protection Team _______________________________________________ Veritas-bu maillist - Veritas-bu@mailman.eng.auburn.edu http://mailman.eng.auburn.edu/mailman/listinfo/veritas-bu This Email message and any attachment may contain information that is proprietary, legally privileged, confidential and/or subject to copyright belonging to Pepco Holdings, Inc. or its affiliates ("PHI"). This Email is intended solely for the use of the person(s) to which it is addressed. If you are not an intended recipient, or the employee or agent responsible for delivery of this Email to the intended recipient(s), you are hereby notified that any dissemination, distribution or copying of this Email is strictly prohibited. If you have received this message in error, please immediately notify the sender and permanently delete this Email and any copies. PHI policies expressly prohibit employees from making defamatory or offensive statements and infringing any copyright or any other legal right by Email communication. PHI will not accept any liability in respect of such communications.
_______________________________________________ Veritas-bu maillist - Veritas-bu@mailman.eng.auburn.edu http://mailman.eng.auburn.edu/mailman/listinfo/veritas-bu