rwxr-xr-x 1 nobody pi 129272 Apr 2 05:45 -hardwired-nomcast rwxr-xr-x 1 nobody pi 129547 Apr 2 05:45 undionly.kpxe rwxr-xr-x 1 nobody pi 0 Apr 3 09:10 tramp rwxr-xr-x 1 root root 0 Apr 3 09:10 test When I get it doesn't indicate that anything was actually downloaded, which could be because of the size of the $ ls -l WARNING: did not receive ack of last datagram after 10 can't figure out how to check if I'm actually downloading the tramp file, which is my real goal. Sending 1470 byte datagrams, IPG target: 11215.21 us (kalman adjust) This has got to be the key, from the Ubuntu iperf -c 192.168.1.2 -u -p 69 -Ĭlient connecting to 192.168.1.2, UDP port 69 The clients are as follow:ġ92.168.0.141 - Autodeploy trying to download tramp file - appears to time out or fail each timeġ92.168.0.136 - Ubuntu client trying to download VMs.csv - successfulġ92.168.0.85 - Windows client trying to download VMs.csv - timed on first attempt, now I'm getting connect request failed $ sudo iperf -s -u -p 69 Here's what I see happening on the rpi when the clients are attempting to connect. Here is what I'm seeing from the rpi:Īfter working once the ubuntu client (192.168.0.136) is now erroring out every time I attempt to download the file, maybe the connection hasn't been broken tftp 192.168.0.2 the autodeploy host which is attempting to boot using TFTP (download the tramp) is still failing, the windows host failed once and now I am getting a connection error. I have been testing with several clients, the Ubuntu VM appears to be working and able to download VMs.csv, although I'm not sure how to confirm it is also able to download the tramp file which is my real problem. Well it's not completely fixed, but there is absolutely some progress. In this case, try running iperf the other way around ie: -s/server side on the other computer and -c/client on the rpi. If you get "Connection refused" then you've still got a connectivity/firewall issue. You should see a datagram xfer happening between the two computers. So does this line confirm that the the device is in fact listening on that port and that it's being allowed through the $ sudo ss -tulwĬode: Select all > iperf -c -u -p 69 Netid State Recv-Q Send-Q Local Address:Port Peer Address:Port
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |