[Search for users] [Overall Top Noters] [List of all Conferences] [Download this site]

Conference lassie::ucx

Title:DEC TCP/IP Services for OpenVMS
Notice:Note 2-SSB Kits, 3-FT Kits, 4-Patch Info, 7-QAR System
Moderator:ucxaxp.ucx.lkg.dec.com::TIBBERT
Created:Thu Nov 17 1994
Last Modified:Fri Jun 06 1997
Last Successful Update:Fri Jun 06 1997
Number of topics:5568
Total number of notes:21492

5193.0. "nfs client hangs" by UTRTSC::KNOPPERS (Oswald Knoppers) Tue Feb 04 1997 09:06

Hi,

One of my customer experiences intermittend nfs client problems. He uses an
Alpha running VMS V6.1 and UCX V4.0 w/o eco's. The remote system is a sun.

Somewere using this dnfs disk the disk becomes unuseable. It is not known
what triggers this. Trying to dismount the device gives the following:

%UCX$DNFSDISMOUNT-E-DISMOUNTFAIL, error dismounting _$1$DNFS1:
-RMS-E-DNF, directory not found
-SYSTEM-F-TIMEOUT, device timeout

I have made a UDP trace and see only empty IP packets coming back from the
sun. Can anyone tell me what could be wrong?

BTW I was able to dismount the device using the command:

UCX> dismount dnfs1:/all

Thanks,

Oswald
 
-----------------------------------------------------------------------

    UCX INTERnet trace XMT packet seq # = 719 at  4-FEB-1997 14:39:14.39 

   IP Version = 4,  IHL = 5,  TOS = 00,   Total Length = 140 = ^x008C 
   IP Identifier  = ^x3A46,  Flags (0=0,DF=0,MF=0),  
         Fragment Offset = 0 = ^x0000,   Calculated Offset = 0 = ^x0000 
   IP TTL = 128 = ^x80,  Protocol = 17 = ^x11,  Header Checksum = ^x5BA6 
   IP Source Address      = 140.85.2.30 
   IP Destination Address = 140.85.51.3 

   UDP Source Port = 601,   UDP Destination Port = 32856 
   UDP Header and Datagram Length = 120 = ^x0078,   Checksum = ^x6A63 

   1E02558C   5BA61180   00003A46   8C000045    0000    E...F:.....[.U..
   0CA37817 | 6A637800   58805902 | 0333558C    0010    .U3..Y.X.xcj.x..
   01000000   A5860100   02000000   00000000    0020    ................
   124AF732   20000000   01000000   01000000    0030    ............2.J.
   FEFFFFFF   00003173   6D766C6E   06000000    0040    ....nlvms1......
   00000000   FEFFFFFF   01000000   FEFFFFFF    0050    ................
   2F74726F   7078652F   23000000   00000000    0060    .......#/export/
   636F645F   63646C6E   2F317365   72616873    0070    shares1/nldc_doc
              00747365   75716552   5F4F502F    0080    /PO_Request.    
 
 
 
 
-----------------------------------------------------------------------

    UCX INTERnet trace RCV packet seq # = 720 at  4-FEB-1997 14:39:14.39 

   IP Version = 4,  IHL = 5,  TOS = 00,   Total Length = 112 = ^x0070 
   IP Identifier  = ^x4864,  Flags (0=0,DF=0,MF=0),  
         Fragment Offset = 0 = ^x0000,   Calculated Offset = 0 = ^x0000 
   IP TTL = 255 = ^xFF,  Protocol = 1 = ^x01,  Header Checksum = ^x7909 
   IP Source Address      = 140.85.51.3 
   IP Destination Address = 140.85.2.30 

 
 
 
 
-----------------------------------------------------------------------

    UCX INTERnet trace XMT packet seq # = 1070 at  4-FEB-1997 14:39:15.39 

   IP Version = 4,  IHL = 5,  TOS = 00,   Total Length = 140 = ^x008C 
   IP Identifier  = ^xE346,  Flags (0=0,DF=0,MF=0),  
         Fragment Offset = 0 = ^x0000,   Calculated Offset = 0 = ^x0000 
   IP TTL = 128 = ^x80,  Protocol = 17 = ^x11,  Header Checksum = ^xB2A5 
   IP Source Address      = 140.85.2.30 
   IP Destination Address = 140.85.51.3 

   UDP Source Port = 601,   UDP Destination Port = 32856 
   UDP Header and Datagram Length = 120 = ^x0078,   Checksum = ^x6A63 

   1E02558C   B2A51180   0000E346   8C000045    0000    E...F........U..
   0CA37817 | 6A637800   58805902 | 0333558C    0010    .U3..Y.X.xcj.x..
   01000000   A5860100   02000000   00000000    0020    ................
   124AF732   20000000   01000000   01000000    0030    ............2.J.
   FEFFFFFF   00003173   6D766C6E   06000000    0040    ....nlvms1......
   00000000   FEFFFFFF   01000000   FEFFFFFF    0050    ................
   2F74726F   7078652F   23000000   00000000    0060    .......#/export/
   636F645F   63646C6E   2F317365   72616873    0070    shares1/nldc_doc
              00747365   75716552   5F4F502F    0080    /PO_Request.    
 
 
 
 
-----------------------------------------------------------------------

    UCX INTERnet trace RCV packet seq # = 1071 at  4-FEB-1997 14:39:15.39 

   IP Version = 4,  IHL = 5,  TOS = 00,   Total Length = 112 = ^x0070 
   IP Identifier  = ^xE964,  Flags (0=0,DF=0,MF=0),  
         Fragment Offset = 0 = ^x0000,   Calculated Offset = 0 = ^x0000 
   IP TTL = 255 = ^xFF,  Protocol = 1 = ^x01,  Header Checksum = ^xD808 
   IP Source Address      = 140.85.51.3 
   IP Destination Address = 140.85.2.30 

 
 
 
 
-----------------------------------------------------------------------

    UCX INTERnet trace XMT packet seq # = 1565 at  4-FEB-1997 14:39:16.39 

   IP Version = 4,  IHL = 5,  TOS = 00,   Total Length = 140 = ^x008C 
   IP Identifier  = ^xA647,  Flags (0=0,DF=0,MF=0),  
         Fragment Offset = 0 = ^x0000,   Calculated Offset = 0 = ^x0000 
   IP TTL = 128 = ^x80,  Protocol = 17 = ^x11,  Header Checksum = ^xEFA4 
   IP Source Address      = 140.85.2.30 
   IP Destination Address = 140.85.51.3 

   UDP Source Port = 601,   UDP Destination Port = 32856 
   UDP Header and Datagram Length = 120 = ^x0078,   Checksum = ^x6A63 

   1E02558C   EFA41180   0000A647   8C000045    0000    E...G........U..
   0CA37817 | 6A637800   58805902 | 0333558C    0010    .U3..Y.X.xcj.x..
   01000000   A5860100   02000000   00000000    0020    ................
   124AF732   20000000   01000000   01000000    0030    ............2.J.
   FEFFFFFF   00003173   6D766C6E   06000000    0040    ....nlvms1......
   00000000   FEFFFFFF   01000000   FEFFFFFF    0050    ................
   2F74726F   7078652F   23000000   00000000    0060    .......#/export/
   636F645F   63646C6E   2F317365   72616873    0070    shares1/nldc_doc
              00747365   75716552   5F4F502F    0080    /PO_Request.    
 
 
 
 
-----------------------------------------------------------------------

    UCX INTERnet trace RCV packet seq # = 1566 at  4-FEB-1997 14:39:16.39 

   IP Version = 4,  IHL = 5,  TOS = 00,   Total Length = 112 = ^x0070 
   IP Identifier  = ^xA265,  Flags (0=0,DF=0,MF=0),  
         Fragment Offset = 0 = ^x0000,   Calculated Offset = 0 = ^x0000 
   IP TTL = 255 = ^xFF,  Protocol = 1 = ^x01,  Header Checksum = ^x1F08 
   IP Source Address      = 140.85.51.3 
   IP Destination Address = 140.85.2.30 

 
 
 
 
-----------------------------------------------------------------------

    UCX INTERnet trace XMT packet seq # = 1962 at  4-FEB-1997 14:39:18.39 

   IP Version = 4,  IHL = 5,  TOS = 00,   Total Length = 140 = ^x008C 
   IP Identifier  = ^x6448,  Flags (0=0,DF=0,MF=0),  
         Fragment Offset = 0 = ^x0000,   Calculated Offset = 0 = ^x0000 
   IP TTL = 128 = ^x80,  Protocol = 17 = ^x11,  Header Checksum = ^x31A4 
   IP Source Address      = 140.85.2.30 
   IP Destination Address = 140.85.51.3 

   UDP Source Port = 601,   UDP Destination Port = 32856 
   UDP Header and Datagram Length = 120 = ^x0078,   Checksum = ^x6A63 

   1E02558C   31A41180   00006448   8C000045    0000    E...Hd.....1.U..
   0CA37817 | 6A637800   58805902 | 0333558C    0010    .U3..Y.X.xcj.x..
   01000000   A5860100   02000000   00000000    0020    ................
   124AF732   20000000   01000000   01000000    0030    ............2.J.
   FEFFFFFF   00003173   6D766C6E   06000000    0040    ....nlvms1......
   00000000   FEFFFFFF   01000000   FEFFFFFF    0050    ................
   2F74726F   7078652F   23000000   00000000    0060    .......#/export/
   636F645F   63646C6E   2F317365   72616873    0070    shares1/nldc_doc
              00747365   75716552   5F4F502F    0080    /PO_Request.    
 
 
 
 
-----------------------------------------------------------------------

    UCX INTERnet trace RCV packet seq # = 1963 at  4-FEB-1997 14:39:18.39 

   IP Version = 4,  IHL = 5,  TOS = 00,   Total Length = 112 = ^x0070 
   IP Identifier  = ^x4466,  Flags (0=0,DF=0,MF=0),  
         Fragment Offset = 0 = ^x0000,   Calculated Offset = 0 = ^x0000 
   IP TTL = 255 = ^xFF,  Protocol = 1 = ^x01,  Header Checksum = ^x7D07 
   IP Source Address      = 140.85.51.3 
   IP Destination Address = 140.85.2.30 

 
 
 
 
-----------------------------------------------------------------------

    UCX INTERnet trace XMT packet seq # = 2824 at  4-FEB-1997 14:39:22.39 

   IP Version = 4,  IHL = 5,  TOS = 00,   Total Length = 140 = ^x008C 
   IP Identifier  = ^x0A4A,  Flags (0=0,DF=0,MF=0),  
         Fragment Offset = 0 = ^x0000,   Calculated Offset = 0 = ^x0000 
   IP TTL = 128 = ^x80,  Protocol = 17 = ^x11,  Header Checksum = ^x8BA2 
   IP Source Address      = 140.85.2.30 
   IP Destination Address = 140.85.51.3 

   UDP Source Port = 601,   UDP Destination Port = 32856 
   UDP Header and Datagram Length = 120 = ^x0078,   Checksum = ^x6A63 

   1E02558C   8BA21180   00000A4A   8C000045    0000    E...J........U..
   0CA37817 | 6A637800   58805902 | 0333558C    0010    .U3..Y.X.xcj.x..
   01000000   A5860100   02000000   00000000    0020    ................
   124AF732   20000000   01000000   01000000    0030    ............2.J.
   FEFFFFFF   00003173   6D766C6E   06000000    0040    ....nlvms1......
   00000000   FEFFFFFF   01000000   FEFFFFFF    0050    ................
   2F74726F   7078652F   23000000   00000000    0060    .......#/export/
   636F645F   63646C6E   2F317365   72616873    0070    shares1/nldc_doc
              00747365   75716552   5F4F502F    0080    /PO_Request.    
 
 
 
 
-----------------------------------------------------------------------

    UCX INTERnet trace RCV packet seq # = 2825 at  4-FEB-1997 14:39:22.39 

   IP Version = 4,  IHL = 5,  TOS = 00,   Total Length = 112 = ^x0070 
   IP Identifier  = ^x9367,  Flags (0=0,DF=0,MF=0),  
         Fragment Offset = 0 = ^x0000,   Calculated Offset = 0 = ^x0000 
   IP TTL = 255 = ^xFF,  Protocol = 1 = ^x01,  Header Checksum = ^x2E06 
   IP Source Address      = 140.85.51.3 
   IP Destination Address = 140.85.2.30 

 
 
 
 
-----------------------------------------------------------------------

    UCX INTERnet trace XMT packet seq # = 5173 at  4-FEB-1997 14:39:30.39 

   IP Version = 4,  IHL = 5,  TOS = 00,   Total Length = 140 = ^x008C 
   IP Identifier  = ^x9A4E,  Flags (0=0,DF=0,MF=0),  
         Fragment Offset = 0 = ^x0000,   Calculated Offset = 0 = ^x0000 
   IP TTL = 128 = ^x80,  Protocol = 17 = ^x11,  Header Checksum = ^xFB9D 
   IP Source Address      = 140.85.2.30 
   IP Destination Address = 140.85.51.3 

   UDP Source Port = 601,   UDP Destination Port = 32856 
   UDP Header and Datagram Length = 120 = ^x0078,   Checksum = ^x6A63 

   1E02558C   FB9D1180   00009A4E   8C000045    0000    E...N........U..
   0CA37817 | 6A637800   58805902 | 0333558C    0010    .U3..Y.X.xcj.x..
   01000000   A5860100   02000000   00000000    0020    ................
   124AF732   20000000   01000000   01000000    0030    ............2.J.
   FEFFFFFF   00003173   6D766C6E   06000000    0040    ....nlvms1......
   00000000   FEFFFFFF   01000000   FEFFFFFF    0050    ................
   2F74726F   7078652F   23000000   00000000    0060    .......#/export/
   636F645F   63646C6E   2F317365   72616873    0070    shares1/nldc_doc
              00747365   75716552   5F4F502F    0080    /PO_Request.    
 
 
 
 
-----------------------------------------------------------------------

    UCX INTERnet trace RCV packet seq # = 5174 at  4-FEB-1997 14:39:30.39 

   IP Version = 4,  IHL = 5,  TOS = 00,   Total Length = 112 = ^x0070 
   IP Identifier  = ^x016A,  Flags (0=0,DF=0,MF=0),  
         Fragment Offset = 0 = ^x0000,   Calculated Offset = 0 = ^x0000 
   IP TTL = 255 = ^xFF,  Protocol = 1 = ^x01,  Header Checksum = ^xC003 
   IP Source Address      = 140.85.51.3 
   IP Destination Address = 140.85.2.30 

 
 
 
 
-----------------------------------------------------------------------

    UCX INTERnet trace XMT packet seq # = 6348 at  4-FEB-1997 14:39:38.39 

   IP Version = 4,  IHL = 5,  TOS = 00,   Total Length = 140 = ^x008C 
   IP Identifier  = ^xC550,  Flags (0=0,DF=0,MF=0),  
         Fragment Offset = 0 = ^x0000,   Calculated Offset = 0 = ^x0000 
   IP TTL = 128 = ^x80,  Protocol = 17 = ^x11,  Header Checksum = ^xD09B 
   IP Source Address      = 140.85.2.30 
   IP Destination Address = 140.85.51.3 

   UDP Source Port = 601,   UDP Destination Port = 32856 
   UDP Header and Datagram Length = 120 = ^x0078,   Checksum = ^x6A63 

   1E02558C   D09B1180   0000C550   8C000045    0000    E...P........U..
   0CA37817 | 6A637800   58805902 | 0333558C    0010    .U3..Y.X.xcj.x..
   01000000   A5860100   02000000   00000000    0020    ................
   124AF732   20000000   01000000   01000000    0030    ............2.J.
   FEFFFFFF   00003173   6D766C6E   06000000    0040    ....nlvms1......
   00000000   FEFFFFFF   01000000   FEFFFFFF    0050    ................
   2F74726F   7078652F   23000000   00000000    0060    .......#/export/
   636F645F   63646C6E   2F317365   72616873    0070    shares1/nldc_doc
              00747365   75716552   5F4F502F    0080    /PO_Request.    
 
 
 
 
-----------------------------------------------------------------------

    UCX INTERnet trace RCV packet seq # = 6349 at  4-FEB-1997 14:39:38.39 

   IP Version = 4,  IHL = 5,  TOS = 00,   Total Length = 112 = ^x0070 
   IP Identifier  = ^x976B,  Flags (0=0,DF=0,MF=0),  
         Fragment Offset = 0 = ^x0000,   Calculated Offset = 0 = ^x0000 
   IP TTL = 255 = ^xFF,  Protocol = 1 = ^x01,  Header Checksum = ^x2A02 
   IP Source Address      = 140.85.51.3 
   IP Destination Address = 140.85.2.30 

 *** UCX Internet could not save 1 packets *** 
 
 
 
 
-----------------------------------------------------------------------

    UCX INTERnet trace XMT packet seq # = 9307 at  4-FEB-1997 14:39:54.39 

   IP Version = 4,  IHL = 5,  TOS = 00,   Total Length = 140 = ^x008C 
   IP Identifier  = ^x3756,  Flags (0=0,DF=0,MF=0),  
         Fragment Offset = 0 = ^x0000,   Calculated Offset = 0 = ^x0000 
   IP TTL = 128 = ^x80,  Protocol = 17 = ^x11,  Header Checksum = ^x5E96 
   IP Source Address      = 140.85.2.30 
   IP Destination Address = 140.85.51.3 

   UDP Source Port = 601,   UDP Destination Port = 32856 
   UDP Header and Datagram Length = 120 = ^x0078,   Checksum = ^x6A63 

   1E02558C   5E961180   00003756   8C000045    0000    E...V7.....^.U..
   0CA37817 | 6A637800   58805902 | 0333558C    0010    .U3..Y.X.xcj.x..
   01000000   A5860100   02000000   00000000    0020    ................
   124AF732   20000000   01000000   01000000    0030    ............2.J.
   FEFFFFFF   00003173   6D766C6E   06000000    0040    ....nlvms1......
   00000000   FEFFFFFF   01000000   FEFFFFFF    0050    ................
   2F74726F   7078652F   23000000   00000000    0060    .......#/export/
   636F645F   63646C6E   2F317365   72616873    0070    shares1/nldc_doc
              00747365   75716552   5F4F502F    0080    /PO_Request.    
 
 
 
 
-----------------------------------------------------------------------

    UCX INTERnet trace RCV packet seq # = 9308 at  4-FEB-1997 14:39:54.39 

   IP Version = 4,  IHL = 5,  TOS = 00,   Total Length = 112 = ^x0070 
   IP Identifier  = ^x756E,  Flags (0=0,DF=0,MF=0),  
         Fragment Offset = 0 = ^x0000,   Calculated Offset = 0 = ^x0000 
   IP TTL = 255 = ^xFF,  Protocol = 1 = ^x01,  Header Checksum = ^x4BFF 
   IP Source Address      = 140.85.51.3 
   IP Destination Address = 140.85.2.30 

 
 
 
 
-----------------------------------------------------------------------

    UCX INTERnet trace XMT packet seq # = 12017 at  4-FEB-1997 14:40:10.39 

   IP Version = 4,  IHL = 5,  TOS = 00,   Total Length = 140 = ^x008C 
   IP Identifier  = ^x415B,  Flags (0=0,DF=0,MF=0),  
         Fragment Offset = 0 = ^x0000,   Calculated Offset = 0 = ^x0000 
   IP TTL = 128 = ^x80,  Protocol = 17 = ^x11,  Header Checksum = ^x5491 
   IP Source Address      = 140.85.2.30 
   IP Destination Address = 140.85.51.3 

   UDP Source Port = 601,   UDP Destination Port = 32856 
   UDP Header and Datagram Length = 120 = ^x0078,   Checksum = ^x6A63 

   1E02558C   54911180   0000415B   8C000045    0000    E...[A.....T.U..
   0CA37817 | 6A637800   58805902 | 0333558C    0010    .U3..Y.X.xcj.x..
   01000000   A5860100   02000000   00000000    0020    ................
   124AF732   20000000   01000000   01000000    0030    ............2.J.
   FEFFFFFF   00003173   6D766C6E   06000000    0040    ....nlvms1......
   00000000   FEFFFFFF   01000000   FEFFFFFF    0050    ................
   2F74726F   7078652F   23000000   00000000    0060    .......#/export/
   636F645F   63646C6E   2F317365   72616873    0070    shares1/nldc_doc
              00747365   75716552   5F4F502F    0080    /PO_Request.    
 
 
 
 
-----------------------------------------------------------------------

    UCX INTERnet trace RCV packet seq # = 12018 at  4-FEB-1997 14:40:10.39 

   IP Version = 4,  IHL = 5,  TOS = 00,   Total Length = 112 = ^x0070 
   IP Identifier  = ^xEB71,  Flags (0=0,DF=0,MF=0),  
         Fragment Offset = 0 = ^x0000,   Calculated Offset = 0 = ^x0000 
   IP TTL = 255 = ^xFF,  Protocol = 1 = ^x01,  Header Checksum = ^xD5FB 
   IP Source Address      = 140.85.51.3 
   IP Destination Address = 140.85.2.30 

 
 
 
 
-----------------------------------------------------------------------

    UCX INTERnet trace XMT packet seq # = 16290 at  4-FEB-1997 14:40:26.39 

   IP Version = 4,  IHL = 5,  TOS = 00,   Total Length = 140 = ^x008C 
   IP Identifier  = ^x6E63,  Flags (0=0,DF=0,MF=0),  
         Fragment Offset = 0 = ^x0000,   Calculated Offset = 0 = ^x0000 
   IP TTL = 128 = ^x80,  Protocol = 17 = ^x11,  Header Checksum = ^x2789 
   IP Source Address      = 140.85.2.30 
   IP Destination Address = 140.85.51.3 

   UDP Source Port = 601,   UDP Destination Port = 32856 
   UDP Header and Datagram Length = 120 = ^x0078,   Checksum = ^x6A63 

   1E02558C   27891180   00006E63   8C000045    0000    E...cn.....'.U..
   0CA37817 | 6A637800   58805902 | 0333558C    0010    .U3..Y.X.xcj.x..
   01000000   A5860100   02000000   00000000    0020    ................
   124AF732   20000000   01000000   01000000    0030    ............2.J.
   FEFFFFFF   00003173   6D766C6E   06000000    0040    ....nlvms1......
   00000000   FEFFFFFF   01000000   FEFFFFFF    0050    ................
   2F74726F   7078652F   23000000   00000000    0060    .......#/export/
   636F645F   63646C6E   2F317365   72616873    0070    shares1/nldc_doc
              00747365   75716552   5F4F502F    0080    /PO_Request.    
 
 
 
 
-----------------------------------------------------------------------

    UCX INTERnet trace RCV packet seq # = 16291 at  4-FEB-1997 14:40:26.39 

   IP Version = 4,  IHL = 5,  TOS = 00,   Total Length = 112 = ^x0070 
   IP Identifier  = ^x6676,  Flags (0=0,DF=0,MF=0),  
         Fragment Offset = 0 = ^x0000,   Calculated Offset = 0 = ^x0000 
   IP TTL = 255 = ^xFF,  Protocol = 1 = ^x01,  Header Checksum = ^x5AF7 
   IP Source Address      = 140.85.51.3 
   IP Destination Address = 140.85.2.30 


T.RTitleUserPersonal
Name
DateLines
5193.1UTRTSC::KNOPPERSOswald KnoppersThu Feb 06 1997 07:088
Can anyone comment?

I am really puzzled by the fact that UCX sends it's UDP packets to port
32856. Shouldn't that be port 2049?

Thanks,

Oswald
5193.2LASSIE::CORENZWITstuck in postcrypt queueThu Feb 06 1997 14:0220
    The reply packets are not even UDP.  They are ICMP.  I consulted MyTH
    about them, and he does not understand why TCPIPTRACE does not dump
    them.  Presumably, they are either invalid or they are some unusual
    type that TCPIPTRACE does not understand.  It might be interesting to
    have a look with a line monitor.  If you do this, you are welcome to
    post the results.
    
    The client behavior is as expected when getting no answer from the
    server.
    
.1>>I am really puzzled by the fact that UCX sends it's UDP packets to port
.1>>32856. Shouldn't that be port 2049?
    
    No, 2049 is normal for the NFS port, but these are MOUNT calls, not NFS
    calls.  Even so, port 32856 is pretty odd for a MOUNT port also.  Maybe
    you should get the TCPIPTRACE going early enough to catch the client's
    GETPORT call to the server's portmapper to see if it is returning the
    correct port for MOUNT.
    
    Julie
5193.3UTRTSC::KNOPPERSOswald KnoppersFri Feb 07 1997 02:2413
>    The reply packets are not even UDP.  They are ICMP.  I consulted MyTH
>    about them, and he does not understand why TCPIPTRACE does not dump
>    them.  Presumably, they are either invalid or they are some unusual
>    type that TCPIPTRACE does not understand.  It might be interesting to
>    have a look with a line monitor.  If you do this, you are welcome to
>    post the results.

Well, I did a 'tcpiptrace/protocol=udp'. This probably explains the missing
data. I'll try to get more.

Thanks,

Oswald
5193.4is this following a server host reboot?LASSIE::CORENZWITstuck in postcrypt queueTue Feb 18 1997 16:088
    It has just come to my attention that the UCX client does not requery
    the portmapper for the MOUNT port if it has mounted from the same host
    previously.  If the server host reboots, MOUNT may be using a different
    port number.
    
    This is IPMT case CFS.48976.
    
    Julie