VM (debian) can't access host share (Music)

NinthWave

Contributor
Joined
Jan 9, 2021
Messages
129
To packet traces with tcpdump on all interfaces of your pfSense that might be involved here and watch what happens ...
I realised that on TN, in interfaces, I gave the BRIDGE10 IF an IP of 10.0.10.2. This host did not show in pfSense DHCP Leases. So I gave it a static lease in pfSense.

1643485754123.png


Now, I can ping 10.0.10.6 VM from the host at 10.0.0.6
I can ping the host from the VM at 10.0.10.6

The mount is successful as from the VM, I can accesss the directory and see the files.

But when I do a packet capture on the VM, I still have no replies from the host.
Code:
14:45:48.165738 IP 10.0.10.6.986 > 10.0.0.6.2049: tcp 132
14:45:48.997324 IP 10.0.10.6.986 > 10.0.0.6.2049: tcp 132
14:45:50.662171 IP 10.0.10.6.986 > 10.0.0.6.2049: tcp 132
14:45:53.960170 IP 10.0.10.6.986 > 10.0.0.6.2049: tcp 132
14:45:56.667563 IP 10.0.0.100.51273 > 10.0.10.6.45537: tcp 1
14:45:56.669516 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 0
14:45:56.716468 IP 10.0.0.100.51273 > 10.0.10.6.45537: tcp 394
14:45:56.718467 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 0
14:45:56.719058 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 109
14:45:56.719167 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:45:56.719253 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 371
14:45:56.720202 IP 10.0.0.100.51273 > 10.0.10.6.45537: tcp 0
14:45:56.747300 IP 10.0.0.100.51273 > 10.0.10.6.45537: tcp 340
14:45:56.749358 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 0
14:45:56.749463 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 108
14:45:56.749528 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1146
14:45:56.753446 IP 10.0.0.100.51273 > 10.0.10.6.45537: tcp 0
14:45:56.813060 IP 10.0.0.100.51273 > 10.0.10.6.45537: tcp 347
14:45:56.815022 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 0
14:45:56.815149 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 110
14:45:56.815216 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:45:56.815302 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:45:56.815400 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:45:56.815465 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:45:56.815529 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:45:56.815619 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:45:56.815704 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:45:56.815772 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:45:56.815844 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:45:56.817111 IP 10.0.0.100.51273 > 10.0.10.6.45537: tcp 0
14:45:56.817193 IP 10.0.0.100.51273 > 10.0.10.6.45537: tcp 0
14:45:56.819084 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:45:56.819260 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:45:56.819325 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:45:56.819389 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:45:56.819460 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:45:56.819590 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:45:56.819664 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:45:56.819745 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:45:56.819824 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:45:56.819898 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:45:56.819963 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:45:56.820035 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:45:56.820111 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1175
14:45:56.820207 IP 10.0.0.100.51273 > 10.0.10.6.45537: tcp 0
14:45:56.820978 IP 10.0.0.100.51273 > 10.0.10.6.45537: tcp 0
14:45:56.821058 IP 10.0.0.100.51273 > 10.0.10.6.45537: tcp 0
14:45:56.821120 IP 10.0.0.100.51273 > 10.0.10.6.45537: tcp 0
14:45:56.867688 IP 10.0.0.100.51273 > 10.0.10.6.45537: tcp 0
14:46:00.609819 IP 10.0.10.6.986 > 10.0.0.6.2049: tcp 132
14:46:06.832840 IP 10.0.0.100.51273 > 10.0.10.6.45537: tcp 1
14:46:06.834188 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 0
14:46:06.864641 IP 10.0.0.100.51273 > 10.0.10.6.45537: tcp 394
14:46:06.865858 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 0
14:46:06.867513 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 109
14:46:06.867617 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:46:06.867712 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 371
14:46:06.868195 IP 10.0.0.100.51273 > 10.0.10.6.45537: tcp 0
14:46:06.900955 IP 10.0.0.100.51273 > 10.0.10.6.45537: tcp 340
14:46:06.902161 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 0
14:46:06.902247 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 108
14:46:06.902327 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1146
14:46:06.903193 IP 10.0.0.100.51273 > 10.0.10.6.45537: tcp 0
14:46:07.199287 IP 10.0.0.100.51273 > 10.0.10.6.45537: tcp 347
14:46:07.200799 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 0
14:46:07.200922 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 110
14:46:07.200994 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:46:07.201072 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:46:07.201135 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:46:07.201198 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:46:07.201262 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:46:07.201464 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:46:07.201685 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:46:07.201772 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:46:07.201847 IP 10.0.0.100.51273 > 10.0.10.6.45537: tcp 0
14:46:07.201936 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:46:07.203407 IP 10.0.0.100.51273 > 10.0.10.6.45537: tcp 0
14:46:07.203488 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:46:07.203607 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:46:07.203673 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:46:07.203737 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:46:07.203800 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:46:07.203876 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:46:07.203973 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:46:07.204038 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:46:07.204125 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:46:07.204203 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:46:07.204275 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:46:07.204353 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:46:07.204417 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1175
14:46:07.208011 IP 10.0.0.100.51273 > 10.0.10.6.45537: tcp 0
14:46:07.208100 IP 10.0.0.100.51273 > 10.0.10.6.45537: tcp 0
14:46:13.918557 IP 10.0.10.6.986 > 10.0.0.6.2049: tcp 132
14:46:17.212185 IP 10.0.0.100.51273 > 10.0.10.6.45537: tcp 1
14:46:17.213522 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 0
14:46:17.294323 IP 10.0.0.100.51273 > 10.0.10.6.45537: tcp 394
14:46:17.296088 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 0
14:46:17.297841 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 109
14:46:17.297945 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 1460
14:46:17.298010 IP 10.0.10.6.45537 > 10.0.0.100.51273: tcp 371
 

NinthWave

Contributor
Joined
Jan 9, 2021
Messages
129
The library now seems to be updating at a really slow rate. Here is a tcpdump of 100 entries

Again, there does not seem to be any reply frome the host at 10.0.0.6. I am limited by the 300000 characters.

Code:
Shell Output - tcpdump -ni vtnet1 -c 100

tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on vtnet1, link-type EN10MB (Ethernet), capture size 262144 bytes
17:15:30.479044 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 714840378:714840510, ack 170368836, win 4129, options [nop,nop,TS val 3010188392 ecr 2068321034], length 132: NFS request xid 2391642897 128 getattr fh Unknown/4EF60AA1DE665B020A002A3100000000F01300000000000000000000
17:15:30.479137 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 0:132, ack 1, win 4129, options [nop,nop,TS val 3010188392 ecr 2068321034], length 132: NFS request xid 2391642897 128 getattr fh Unknown/4EF60AA1DE665B020A002A3100000000F01300000000000000000000
17:15:30.482224 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 132:268, ack 117, win 4129, options [nop,nop,TS val 3010188395 ecr 2068321105], length 136: NFS request xid 2408420113 132 access fh Unknown/4EF60AA1DE665B020A002A3100000000F01300000000000000000000 NFS_ACCESS_READ|NFS_ACCESS_MODIFY|NFS_ACCESS_EXTEND|NFS_ACCESS_EXECUTE
17:15:30.482318 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 132:268, ack 117, win 4129, options [nop,nop,TS val 3010188395 ecr 2068321105], length 136: NFS request xid 2408420113 132 access fh Unknown/4EF60AA1DE665B020A002A3100000000F01300000000000000000000 NFS_ACCESS_READ|NFS_ACCESS_MODIFY|NFS_ACCESS_EXTEND|NFS_ACCESS_EXECUTE
17:15:30.483482 IP 10.0.40.11.554 > 10.0.0.100.64139: Flags [P.], seq 1299115368:1299116780, ack 1761602776, win 2227, length 1412: RTSP
17:15:30.483575 IP 10.0.40.11.554 > 10.0.0.100.64139: Flags [P.], seq 0:1412, ack 1, win 2227, length 1412: RTSP
17:15:30.483614 IP 10.0.40.11.554 > 10.0.0.100.64139: Flags [P.], seq 1412:1527, ack 1, win 2227, length 115: RTSP
17:15:30.483676 IP 10.0.40.11.554 > 10.0.0.100.64139: Flags [P.], seq 1412:1527, ack 1, win 2227, length 115: RTSP
17:15:30.484655 IP 10.0.10.6.684 > 10.0.0.6.811: Flags [P.], seq 1305543910:1305544114, ack 462941018, win 502, options [nop,nop,TS val 3010188398 ecr 355536143], length 204
17:15:30.484749 IP 10.0.10.6.684 > 10.0.0.6.811: Flags [P.], seq 0:204, ack 1, win 502, options [nop,nop,TS val 3010188398 ecr 355536143], length 204
17:15:30.485966 IP 10.0.0.100.64139 > 10.0.40.11.554: Flags [.], ack 1527, win 1026, length 0
17:15:30.486057 IP 10.0.0.100.64139 > 10.0.40.11.554: Flags [.], ack 1527, win 1026, length 0
17:15:30.486097 IP 10.0.40.10.554 > 10.0.0.100.50977: Flags [.], seq 1751519755:1751521215, ack 395482541, win 7836, length 1460: RTSP
17:15:30.486163 IP 10.0.40.10.554 > 10.0.0.100.50977: Flags [.], seq 0:1460, ack 1, win 7836, length 1460: RTSP
17:15:30.486189 IP 10.0.40.10.554 > 10.0.0.100.50977: Flags [P.], seq 1460:1880, ack 1, win 7836, length 420: RTSP
17:15:30.486250 IP 10.0.40.10.554 > 10.0.0.100.50977: Flags [P.], seq 1460:1880, ack 1, win 7836, length 420: RTSP
17:15:30.486911 IP 10.0.10.6.684 > 10.0.0.6.811: Flags [.], ack 41, win 502, options [nop,nop,TS val 3010188400 ecr 355536280], length 0
17:15:30.487008 IP 10.0.10.6.684 > 10.0.0.6.811: Flags [.], ack 41, win 502, options [nop,nop,TS val 3010188400 ecr 355536280], length 0
17:15:30.487047 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 268:412, ack 241, win 4129, options [nop,nop,TS val 3010188400 ecr 2068321108], length 144: NFS request xid 2425197329 140 read fh Unknown/4EF60AA1DE665B020A002A3100000000F01300000000000000000000 16384 bytes @ 0
17:15:30.487111 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 268:412, ack 241, win 4129, options [nop,nop,TS val 3010188400 ecr 2068321108], length 144: NFS request xid 2425197329 140 read fh Unknown/4EF60AA1DE665B020A002A3100000000F01300000000000000000000 16384 bytes @ 0
17:15:30.487138 IP 10.0.0.100.50977 > 10.0.40.10.554: Flags [.], ack 1880, win 4106, length 0
17:15:30.487204 IP 10.0.0.100.50977 > 10.0.40.10.554: Flags [.], ack 1880, win 4106, length 0
17:15:30.496100 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 16757, win 4061, options [nop,nop,TS val 3010188409 ecr 2068321119], length 0
17:15:30.496196 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 16757, win 4061, options [nop,nop,TS val 3010188409 ecr 2068321119], length 0
17:15:30.498837 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 412:556, ack 16757, win 4129, options [nop,nop,TS val 3010188411 ecr 2068321119], length 144: NFS request xid 2441974545 140 read fh Unknown/4EF60AA1DE665B020A002A3100000000F01300000000000000000000 32768 bytes @ 16384
17:15:30.498930 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 412:556, ack 16757, win 4129, options [nop,nop,TS val 3010188411 ecr 2068321119], length 144: NFS request xid 2441974545 140 read fh Unknown/4EF60AA1DE665B020A002A3100000000F01300000000000000000000 32768 bytes @ 16384
17:15:30.498970 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 556:700, ack 16757, win 4129, options [nop,nop,TS val 3010188412 ecr 2068321119], length 144: NFS request xid 2458751761 140 read fh Unknown/4EF60AA1DE665B020A002A3100000000F01300000000000000000000 65536 bytes @ 49152
17:15:30.499031 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 556:700, ack 16757, win 4129, options [nop,nop,TS val 3010188412 ecr 2068321119], length 144: NFS request xid 2458751761 140 read fh Unknown/4EF60AA1DE665B020A002A3100000000F01300000000000000000000 65536 bytes @ 49152
17:15:30.500895 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 23997, win 4073, options [nop,nop,TS val 3010188414 ecr 2068321125], length 0
17:15:30.500990 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 23997, win 4073, options [nop,nop,TS val 3010188414 ecr 2068321125], length 0
17:15:30.501025 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 56897, win 3956, options [nop,nop,TS val 3010188414 ecr 2068321125], length 0
17:15:30.501087 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 56897, win 3956, options [nop,nop,TS val 3010188414 ecr 2068321125], length 0
17:15:30.502156 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 700:844, ack 56897, win 4129, options [nop,nop,TS val 3010188415 ecr 2068321125], length 144: NFS request xid 2475528977 140 read fh Unknown/4EF60AA1DE665B020A002A3100000000F01300000000000000000000 131072 bytes @ 114688
17:15:30.502277 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 700:844, ack 56897, win 4129, options [nop,nop,TS val 3010188415 ecr 2068321125], length 144: NFS request xid 2475528977 140 read fh Unknown/4EF60AA1DE665B020A002A3100000000F01300000000000000000000 131072 bytes @ 114688
17:15:30.502414 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 98889, win 4129, options [nop,nop,TS val 3010188416 ecr 2068321126], length 0
17:15:30.502480 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 98889, win 4129, options [nop,nop,TS val 3010188416 ecr 2068321126], length 0
17:15:30.504268 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 115325, win 4129, options [nop,nop,TS val 3010188417 ecr 2068321127], length 0
17:15:30.504363 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 115325, win 4129, options [nop,nop,TS val 3010188417 ecr 2068321127], length 0
17:15:30.504506 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 844:988, ack 115325, win 4129, options [nop,nop,TS val 3010188418 ecr 2068321127], length 144: NFS request xid 2492306193 140 read fh Unknown/4EF60AA1DE665B020A002A3100000000F01300000000000000000000 131072 bytes @ 245760
17:15:30.504573 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 844:988, ack 115325, win 4129, options [nop,nop,TS val 3010188418 ecr 2068321127], length 144: NFS request xid 2492306193 140 read fh Unknown/4EF60AA1DE665B020A002A3100000000F01300000000000000000000 131072 bytes @ 245760
17:15:30.520145 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 157317, win 3954, options [nop,nop,TS val 3010188433 ecr 2068321143], length 0
17:15:30.520237 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 157317, win 3954, options [nop,nop,TS val 3010188433 ecr 2068321143], length 0
17:15:30.522027 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 199309, win 3956, options [nop,nop,TS val 3010188435 ecr 2068321146], length 0
17:15:30.522122 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 199309, win 3956, options [nop,nop,TS val 3010188435 ecr 2068321146], length 0
17:15:30.523873 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 241301, win 4129, options [nop,nop,TS val 3010188437 ecr 2068321147], length 0
17:15:30.523966 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 241301, win 4129, options [nop,nop,TS val 3010188437 ecr 2068321147], length 0
17:15:30.526111 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 283293, win 3956, options [nop,nop,TS val 3010188439 ecr 2068321149], length 0
17:15:30.526205 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 283293, win 3956, options [nop,nop,TS val 3010188439 ecr 2068321149], length 0
17:15:30.527983 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 325285, win 3956, options [nop,nop,TS val 3010188441 ecr 2068321152], length 0
17:15:30.528076 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 325285, win 3956, options [nop,nop,TS val 3010188441 ecr 2068321152], length 0
17:15:30.530597 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 367277, win 4129, options [nop,nop,TS val 3010188443 ecr 2068321154], length 0
17:15:30.530689 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 367277, win 4129, options [nop,nop,TS val 3010188443 ecr 2068321154], length 0
17:15:30.532550 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 377733, win 4129, options [nop,nop,TS val 3010188446 ecr 2068321156], length 0
17:15:30.532645 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 377733, win 4129, options [nop,nop,TS val 3010188446 ecr 2068321156], length 0
17:15:30.545816 IP 10.0.40.10.554 > 10.0.0.100.50977: Flags [.], seq 1880:3340, ack 1, win 7836, length 1460: RTSP
17:15:30.545910 IP 10.0.40.10.554 > 10.0.0.100.50977: Flags [.], seq 1880:3340, ack 1, win 7836, length 1460: RTSP
17:15:30.545950 IP 10.0.40.10.554 > 10.0.0.100.50977: Flags [P.], seq 3340:3436, ack 1, win 7836, length 96: RTSP
17:15:30.546011 IP 10.0.40.10.554 > 10.0.0.100.50977: Flags [P.], seq 3340:3436, ack 1, win 7836, length 96: RTSP
17:15:30.546992 IP 10.0.0.100.50977 > 10.0.40.10.554: Flags [.], ack 3436, win 4106, length 0
17:15:30.547084 IP 10.0.0.100.50977 > 10.0.40.10.554: Flags [.], ack 3436, win 4106, length 0
17:15:30.563372 IP 10.0.40.11.554 > 10.0.0.100.64139: Flags [P.], seq 1527:2939, ack 1, win 2227, length 1412: RTSP
17:15:30.563463 IP 10.0.40.11.554 > 10.0.0.100.64139: Flags [P.], seq 1527:2939, ack 1, win 2227, length 1412: RTSP
17:15:30.563501 IP 10.0.40.11.554 > 10.0.0.100.64139: Flags [P.], seq 2939:3106, ack 1, win 2227, length 167: RTSP
17:15:30.563584 IP 10.0.40.11.554 > 10.0.0.100.64139: Flags [P.], seq 2939:3106, ack 1, win 2227, length 167: RTSP
17:15:30.565152 IP 10.0.0.100.64139 > 10.0.40.11.554: Flags [.], ack 3106, win 1026, length 0
17:15:30.565265 IP 10.0.0.100.64139 > 10.0.40.11.554: Flags [.], ack 3106, win 1026, length 0
17:15:30.592271 IP 10.0.0.100.53803 > 170.114.15.43.443: Flags [P.], seq 1102121075:1102121292, ack 1200479586, win 1025, length 217
17:15:30.596468 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 988:1120, ack 377733, win 4129, options [nop,nop,TS val 3010188509 ecr 2068321156], length 132: NFS request xid 2509083409 128 getattr fh Unknown/4EF60AA1DE665B020A00682E00000000F01300000000000000000000
17:15:30.596561 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 988:1120, ack 377733, win 4129, options [nop,nop,TS val 3010188509 ecr 2068321156], length 132: NFS request xid 2509083409 128 getattr fh Unknown/4EF60AA1DE665B020A00682E00000000F01300000000000000000000
17:15:30.597854 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 1120:1256, ack 377849, win 4129, options [nop,nop,TS val 3010188511 ecr 2068321222], length 136: NFS request xid 2525860625 132 access fh Unknown/4EF60AA1DE665B020A00682E00000000F01300000000000000000000 NFS_ACCESS_READ|NFS_ACCESS_MODIFY|NFS_ACCESS_EXTEND|NFS_ACCESS_EXECUTE
17:15:30.597949 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 1120:1256, ack 377849, win 4129, options [nop,nop,TS val 3010188511 ecr 2068321222], length 136: NFS request xid 2525860625 132 access fh Unknown/4EF60AA1DE665B020A00682E00000000F01300000000000000000000 NFS_ACCESS_READ|NFS_ACCESS_MODIFY|NFS_ACCESS_EXTEND|NFS_ACCESS_EXECUTE
17:15:30.599850 IP 10.0.10.6.684 > 10.0.0.6.811: Flags [P.], seq 204:408, ack 41, win 502, options [nop,nop,TS val 3010188513 ecr 355536280], length 204
17:15:30.599960 IP 10.0.10.6.684 > 10.0.0.6.811: Flags [P.], seq 204:408, ack 41, win 502, options [nop,nop,TS val 3010188513 ecr 355536280], length 204
17:15:30.600961 IP 10.0.10.6.684 > 10.0.0.6.811: Flags [.], ack 81, win 502, options [nop,nop,TS val 3010188515 ecr 355536395], length 0
17:15:30.601063 IP 10.0.10.6.684 > 10.0.0.6.811: Flags [.], ack 81, win 502, options [nop,nop,TS val 3010188515 ecr 355536395], length 0
17:15:30.601915 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 1256:1400, ack 377973, win 4129, options [nop,nop,TS val 3010188515 ecr 2068321223], length 144: NFS request xid 2542637841 140 read fh Unknown/4EF60AA1DE665B020A00682E00000000F01300000000000000000000 16384 bytes @ 0
17:15:30.601984 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 1256:1400, ack 377973, win 4129, options [nop,nop,TS val 3010188515 ecr 2068321223], length 144: NFS request xid 2542637841 140 read fh Unknown/4EF60AA1DE665B020A00682E00000000F01300000000000000000000 16384 bytes @ 0
17:15:30.606594 IP 10.0.40.10.554 > 10.0.0.100.50977: Flags [P.], seq 3436:4756, ack 1, win 7836, length 1320: RTSP
17:15:30.606687 IP 10.0.40.10.554 > 10.0.0.100.50977: Flags [P.], seq 3436:4756, ack 1, win 7836, length 1320: RTSP
17:15:30.623893 IP 10.0.40.11.554 > 10.0.0.100.64139: Flags [P.], seq 3106:4518, ack 1, win 2227, length 1412: RTSP
17:15:30.623987 IP 10.0.40.11.554 > 10.0.0.100.64139: Flags [P.], seq 3106:4518, ack 1, win 2227, length 1412: RTSP
17:15:30.624027 IP 10.0.40.11.554 > 10.0.0.100.64139: Flags [P.], seq 4518:4611, ack 1, win 2227, length 93: RTSP
17:15:30.624088 IP 10.0.40.11.554 > 10.0.0.100.64139: Flags [P.], seq 4518:4611, ack 1, win 2227, length 93: RTSP
17:15:30.625802 IP 10.0.0.100.64139 > 10.0.40.11.554: Flags [.], ack 4611, win 1026, length 0
17:15:30.625894 IP 10.0.0.100.64139 > 10.0.40.11.554: Flags [.], ack 4611, win 1026, length 0
17:15:30.629748 IP 170.114.15.43.443 > 10.0.0.100.53803: Flags [.], ack 217, win 49, length 0
17:15:30.630755 IP 170.114.15.43.443 > 10.0.0.100.53803: Flags [P.], seq 1:196, ack 217, win 49, length 195
17:15:30.653230 IP 10.0.0.100.50977 > 10.0.40.10.554: Flags [.], ack 4756, win 4101, length 0
17:15:30.653318 IP 10.0.0.100.50977 > 10.0.40.10.554: Flags [.], ack 4756, win 4101, length 0
17:15:30.653356 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 394489, win 4061, options [nop,nop,TS val 3010188566 ecr 2068321276], length 0
17:15:30.653423 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 394489, win 4061, options [nop,nop,TS val 3010188566 ecr 2068321276], length 0
17:15:30.655871 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 1400:1544, ack 394489, win 4129, options [nop,nop,TS val 3010188568 ecr 2068321276], length 144: NFS request xid 2559415057 140 read fh Unknown/4EF60AA1DE665B020A00682E00000000F01300000000000000000000 32768 bytes @ 16384
17:15:30.655967 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 1400:1544, ack 394489, win 4129, options [nop,nop,TS val 3010188568 ecr 2068321276], length 144: NFS request xid 2559415057 140 read fh Unknown/4EF60AA1DE665B020A00682E00000000F01300000000000000000000 32768 bytes @ 16384
17:15:30.656007 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 1544:1688, ack 394489, win 4129, options [nop,nop,TS val 3010188569 ecr 2068321276], length 144: NFS request xid 2576192273 140 read fh Unknown/4EF60AA1DE665B020A00682E00000000F01300000000000000000000 65536 bytes @ 49152
17:15:30.656071 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 1544:1688, ack 394489, win 4129, options [nop,nop,TS val 3010188569 ecr 2068321276], length 144: NFS request xid 2576192273 140 read fh Unknown/4EF60AA1DE665B020A00682E00000000F01300000000000000000000 65536 bytes @ 49152
17:15:30.656763 IP 10.0.100.101.5353 > 224.0.0.251.5353: 0 A (QM)? BrotherA82CE850.local. (39)
17:15:30.658297 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 436077, win 3953, options [nop,nop,TS val 3010188571 ecr 2068321281], length 0
17:15:30.658393 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 436077, win 3953, options [nop,nop,TS val 3010188571 ecr 2068321281], length 0
17:15:30.658698 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 1688:1832, ack 436077, win 4129, options [nop,nop,TS val 3010188572 ecr 2068321281], length 144: NFS request xid 2592969489 140 read fh Unknown/4EF60AA1DE665B020A00682E00000000F01300000000000000000000 131072 bytes @ 114688
17:15:30.658765 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 1688:1832, ack 436077, win 4129, options [nop,nop,TS val 3010188572 ecr 2068321281], length 144: NFS request xid 2592969489 140 read fh Unknown/4EF60AA1DE665B020A00682E00000000F01300000000000000000000 131072 bytes @ 114688
100 packets captured
441 packets received by filter
0 packets dropped by kernel
 

Patrick M. Hausen

Hall of Famer
Joined
Nov 25, 2013
Messages
7,776
IMHO the host should have an interface and and IP address in the same VLAN as the VM and you should use that for your NFS mount. Othe than that get a network engineer on site to help you - this is way too complex for a remote diagnose and definitely not a fundamental TrueNAS problem. If TrueNAS has got an IP address in VLAN 10, it will answer via that interface. That's probably why you don't see the packets in your firewall. Use that IP address for the mount as I already wrote.

And don't use DHCP for your TrueNAS. You cannot have more than one interface with DHCP and the general recommendation is to configure everything statically for seerver systems.
 

NinthWave

Contributor
Joined
Jan 9, 2021
Messages
129
Thank you for the time you took in to this, @Patrick M. Hausen.

I know there is a limit to what can be achieved remotely, especially when the guy at the other end has limited knowledge in all the related subjects: linux, BSD, networking. I will try to have someone proficient come here when possible.

IMHO the host should have an interface and and IP address in the same VLAN as the VM and you should use that for your NFS mount
That's the actual setup but I am trying to harden my network security. Since I was viewing TrueNAS as a file server and that music and movies are played through DLNA controller hosted on IOT devices, I was hoping to put all related media servers on the IOT vlan. For emby that takes care of the movies, it was easy since it works in a jail. My problem is that the music server, Asset, only works in linux, hence the VM.

definitely not a fundamental TrueNAS problem
Beeing a noob that tries to avoid ransomware on my TrueNAS that not only holds media files but financial and personal data as well, that was to me :wink:. I have a friend that works in an insurance company that have everyting in the same subnet while I know an IT teacher (unfortunately, not available to help me right now) that is a complete security freak. Hard to find a median position for me.

And don't use DHCP for your TrueNAS. You cannot have more than one interface with DHCP and the general recommendation is to configure everything statically for seerver systems.
Absolutely right, done! That was sleeping under the carpet since I installed my TN last year.

Thanks again for your numerous inputs. I'll leave it at that until my friend comes back from Europe.
 
Top