Knowledgebase

Troubleshooting Rcs Network Connections Print

  • 0

If you are having trouble connecting to your server application, this guide has the tools you'll need to diagnose issues with your firewall, application, name servers, and connectivity.

Rcs Standard Port Blocking

We block several outbound ports for network security. Please review the Standard Port Blocking topic.

Rcs Firewall

Server instances at Rcs may be protected by the Rcs firewall, an OS firewall, or both simultaneously. Make sure the Rcs Firewall is configured properly. For debugging purposes, if your server instance is linked to a Rcs Firewall group, try removing it from the group temporarily. See the Rcs Firewall quickstart guide for an overview.

Web console SSH

If you are blocked from SSH, use the noVNC console in your customer portal at https://my.vultr.com/.

  • Click on your server instance.
  • Click the "View Console" icon.
  • The noVNC console will open.

Log in through this web-based console to perform additional diagnostic steps.

See our complete Web Console FAQ.

OS Firewalls

Rcs's standard OS image have firewalls enabled by default that block a great deal of traffic. If you are having trouble connecting to your server applications, verify your firewall configuration.

CentOS

If you installed a Rcs CentOS image, firewalld is enabled by default, and blocks a great deal of traffic. If you are having trouble connecting to your server applications, verify your firewalld configuration.

If you installed from your own ISO, the default firewall installation varies between versions. These are the most common configurations, your specific server may have a different firewall installed.

CoreOS

CoreOS has no default firewall. The most popular choice for an OS-level firewall is iptables. See the iptables quickstart guide.

Debian

Debian 9 and 10 may use one of several firewalls. If you installed a Rcs Debian image, UFW is enabled by default.

Fedora

If you installed a Rcs Fedora image, firewalld is enabled by default.

FreeBSD

If you installed a Rcs FreeBSD image, pf is enabled by default. IPFW and IPFILTER are also available.

OpenBSD

If you installed a Rcs OpenBSD image, pf is enabled by default.

Ubuntu

If you installed a Rcs Ubuntu image, UFW is enabled by default.

Windows

The Windows Firewall is enabled by default on Rcs's Windows image. See the Windows Firewall quickstart guide.

More Diagnostic Steps

If you have determined that your traffic isn't blocked by either a Rcs Firewall or an OS-level firewall, try some additional debugging steps.

Is the server alive?

ping

ping is a basic debugging step to verify a server is available by sending an ICMP packet and receiving a reply.

It's possible to configure a machine to ignore ping. A ping failure doesn't prove the server is down, but a ping success does verify the server is available. This example pings 192.0.2.22 four times (using the -c 4 option), then stops and prints statistics.

# ping -c 4 192.0.2.22
PING 192.0.2.22 (192.0.2.22) 56(84) bytes of data.
64 bytes from 192.0.2.22: icmp_seq=1 ttl=54 time=15.4 ms
64 bytes from 192.0.2.22: icmp_seq=2 ttl=54 time=15.3 ms
64 bytes from 192.0.2.22: icmp_seq=3 ttl=54 time=15.4 ms
64 bytes from 192.0.2.22: icmp_seq=4 ttl=54 time=15.4 ms

--- 192.0.2.22 ping statistics ---
4 packets transmitted, 4 received, 0% packet loss, time 3004ms
rtt min/avg/max/mdev = 15.340/15.377/15.424/0.030 ms

For advanced options, use ping -h.

Is the application is listening on the correct port?

netstat

netstat (Network Statistics) is useful to query the state of your network connections. It is available for Linux, Windows and MacOS. See our netstat troubleshooting guide to check your application.

nmap

Try scanning the server with nmap, which is available for all Linux systems via their respective package managers. Windows users can download namp from the official site, which also has a version for MacOS.

Use the Rcs nmap troubleshooting guide for information on scanning your server.

Does the server name match the expected IP address?

nslookup

nslookup is used to query internet domain name servers. This is useful to verify your servers name properly resolves to the expected IP address.

Verify the IP address of example.com using the internal name resolver.

# nslookup example.com
Server:         127.0.0.53
Address:        127.0.0.53#53

Non-authoritative answer:
Name:   example.com
Address: 93.184.216.34
Name:   example.com
Address: 2606:2800:220:1:248:1893:25c8:1946

Verify the IP address of example.com using Google's public DNS (8.8.8.8).

# nslookup example.com 8.8.8.8
Server:         8.8.8.8
Address:        8.8.8.8#53

Non-authoritative answer:
Name:   example.com
Address: 93.184.216.34
Name:   example.com
Address: 2606:2800:220:1:248:1893:25c8:1946

Compare both examples to verify the server resolves the same IP address for example.com as a public name server.

For advanced options, see the nslookup help with man nslookup.

dig

Many Linux systems have replaced nslookup with dig, the Domain Internet Groper. dig also queries domain name servers, but provides more information than nslookup.

Example:

# dig example.com

; <<>> DiG 9.11.5-P4-5.1ubuntu2.1-Ubuntu <<>> example.com
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 55898
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;example.com.                   IN      A

;; ANSWER SECTION:
example.com.            6521    IN      A       93.184.216.34

;; Query time: 0 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Wed Apr 01 20:07:19 UTC 2020
;; MSG SIZE  rcvd: 56

For advanced options, see the dig help with dig -h.

MTR Reports

After completing these debugging steps, you may still have questions. Please generate an MTR network report in both directions and then open a support ticket. We are happy to assist you.

If you are having trouble connecting to your server application, this guide has the tools you'll need to diagnose issues with your firewall, application, name servers, and connectivity. Rcs Standard Port Blocking We block several outbound ports for network security. Please review the Standard Port Blocking topic. Rcs Firewall Server instances at Rcs may be protected by the Rcs firewall, an OS firewall, or both simultaneously. Make sure the Rcs Firewall is configured properly. For debugging purposes, if your server instance is linked to a Rcs Firewall group, try removing it from the group temporarily. See the Rcs Firewall quickstart guide for an overview. Web console SSH If you are blocked from SSH, use the noVNC console in your customer portal at https://my.vultr.com/. Click on your server instance. Click the "View Console" icon. The noVNC console will open. Log in through this web-based console to perform additional diagnostic steps. See our complete Web Console FAQ. OS Firewalls Rcs's standard OS image have firewalls enabled by default that block a great deal of traffic. If you are having trouble connecting to your server applications, verify your firewall configuration. CentOS If you installed a Rcs CentOS image, firewalld is enabled by default, and blocks a great deal of traffic. If you are having trouble connecting to your server applications, verify your firewalld configuration. If you installed from your own ISO, the default firewall installation varies between versions. These are the most common configurations, your specific server may have a different firewall installed. CentOS 6 - See the iptables quickstart guide. CentOS 7 - See the firewalld quickstart guide. CentOS 8 - See the nftables quickstart guide. CoreOS CoreOS has no default firewall. The most popular choice for an OS-level firewall is iptables. See the iptables quickstart guide. Debian Debian 9 and 10 may use one of several firewalls. If you installed a Rcs Debian image, UFW is enabled by default. See the iptables quickstart guide. See the nftables quickstart guide. See the UFW quickstart guide. Fedora If you installed a Rcs Fedora image, firewalld is enabled by default. Fedora, all versions, see the firewalld quickstart guide. FreeBSD If you installed a Rcs FreeBSD image, pf is enabled by default. IPFW and IPFILTER are also available. See the pf quickstart guide. See the IPFW quickstart guide. See the IPFILTER quickstart guide. OpenBSD If you installed a Rcs OpenBSD image, pf is enabled by default. See the pf quickstart guide. Ubuntu If you installed a Rcs Ubuntu image, UFW is enabled by default. See the UFW quickstart guide. Windows The Windows Firewall is enabled by default on Rcs's Windows image. See the Windows Firewall quickstart guide. More Diagnostic Steps If you have determined that your traffic isn't blocked by either a Rcs Firewall or an OS-level firewall, try some additional debugging steps. Is the server alive? ping ping is a basic debugging step to verify a server is available by sending an ICMP packet and receiving a reply. It's possible to configure a machine to ignore ping. A ping failure doesn't prove the server is down, but a ping success does verify the server is available. This example pings 192.0.2.22 four times (using the -c 4 option), then stops and prints statistics. # ping -c 4 192.0.2.22 PING 192.0.2.22 (192.0.2.22) 56(84) bytes of data. 64 bytes from 192.0.2.22: icmp_seq=1 ttl=54 time=15.4 ms 64 bytes from 192.0.2.22: icmp_seq=2 ttl=54 time=15.3 ms 64 bytes from 192.0.2.22: icmp_seq=3 ttl=54 time=15.4 ms 64 bytes from 192.0.2.22: icmp_seq=4 ttl=54 time=15.4 ms --- 192.0.2.22 ping statistics --- 4 packets transmitted, 4 received, 0% packet loss, time 3004ms rtt min/avg/max/mdev = 15.340/15.377/15.424/0.030 ms For advanced options, use ping -h. Is the application is listening on the correct port? netstat netstat (Network Statistics) is useful to query the state of your network connections. It is available for Linux, Windows and MacOS. See our netstat troubleshooting guide to check your application. nmap Try scanning the server with nmap, which is available for all Linux systems via their respective package managers. Windows users can download namp from the official site, which also has a version for MacOS. Use the Rcs nmap troubleshooting guide for information on scanning your server. Does the server name match the expected IP address? nslookup nslookup is used to query internet domain name servers. This is useful to verify your servers name properly resolves to the expected IP address. Verify the IP address of example.com using the internal name resolver. # nslookup example.com Server: 127.0.0.53 Address: 127.0.0.53#53 Non-authoritative answer: Name: example.com Address: 93.184.216.34 Name: example.com Address: 2606:2800:220:1:248:1893:25c8:1946 Verify the IP address of example.com using Google's public DNS (8.8.8.8). # nslookup example.com 8.8.8.8 Server: 8.8.8.8 Address: 8.8.8.8#53 Non-authoritative answer: Name: example.com Address: 93.184.216.34 Name: example.com Address: 2606:2800:220:1:248:1893:25c8:1946 Compare both examples to verify the server resolves the same IP address for example.com as a public name server. For advanced options, see the nslookup help with man nslookup. dig Many Linux systems have replaced nslookup with dig, the Domain Internet Groper. dig also queries domain name servers, but provides more information than nslookup. Example: # dig example.com ; <<>> DiG 9.11.5-P4-5.1ubuntu2.1-Ubuntu <<>> example.com ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 55898 ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 65494 ;; QUESTION SECTION: ;example.com. IN A ;; ANSWER SECTION: example.com. 6521 IN A 93.184.216.34 ;; Query time: 0 msec ;; SERVER: 127.0.0.53#53(127.0.0.53) ;; WHEN: Wed Apr 01 20:07:19 UTC 2020 ;; MSG SIZE rcvd: 56 For advanced options, see the dig help with dig -h. MTR Reports After completing these debugging steps, you may still have questions. Please generate an MTR network report in both directions and then open a support ticket. We are happy to assist you.

Was this answer helpful?
Back

Powered by WHMCompleteSolution