Solved

BES question

Posted on 2008-10-30
3
441 Views
Last Modified: 2008-11-02
Hi

We are running BES 4.1.5

We have a couple of servers and about 2000 devices.

I have a query regarding the way the BES servers speak to the devices, via the RIM server. Is a seperate connection opened up on port 3101 between the BES and the RIM server, or is it just one connection?

The reason I ask is that I am receiving the following error messages on my BES;

[SERVICE_RELAY_SESSION:xxx:xxx] Service transaction not found. SERVICESESSION_TAG=xx

This only happens after reboots for about an hour or so, apparently they are due to dropped packets after a device has authenticated, but I was curious.

Cheers
0
Comment
Question by:yoshi66
  • 2
3 Comments
 
LVL 11

Expert Comment

by:ALogvin
Comment Utility
I had this exact question a few years back, and I put it to RIM. They indicated these messages were data packets that were encypted and in transmission right before your servers are rebooted. When the servers come back up, they attempt to decrypt the data packet and fail, as the service (message service) could not find record of the current transaction in its tables.

So, that may not have made a lot of sense, but the end result is this... dont worry about it. Any data that didnt get there during the reboot would be requeued and transmitted shortly afterward anyway. I let all of my techs know to expect these errors and ignore them if they appear after a reboot.
0
 
LVL 4

Author Comment

by:yoshi66
Comment Utility
Hi there

Thanks...just one clarification question; When you say that the data packets were in transmission before the server was rebooted, do you mean from the BES server to RIM, or RIM to the BES server? And what sort of data would this be?

0
 
LVL 11

Accepted Solution

by:
ALogvin earned 500 total points
Comment Utility
Usually the packets were from your BES to a device, or vice-versa. Anything from e-mails to status updates, pretty much any data.
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

Suggested Solutions

This article will help those of you having problems with the Nextel Blackberry 8350i.  Recent Software updates cause the problems issues described below, and this article will help you revert back to the older software. As we know, Nextel has alw…
Last night I received a weird phone call, from a number I didn’t recognized.  I answered it and no one responded back so I hung up.   Didn’t look at my phone until my husband said “Your phone is doing something weird”.   I had what I’ll consider the…
This video discusses moving either the default database or any database to a new volume.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now