05-21-2006
u can see in /etc/services for the standard port allocation.
10 More Discussions You Might Find Interesting
1. IP Networking
Giving netstat command on the prompt gives commands such as
localhost.43592 localhost.35237 32768 0 32768 0 TIME_WAIT
localhost.43594 localhost.43595 32768 0 32768 0 TIME_WAIT
localhost.43598 localhost.35237 32768 0 32768 0 TIME_WAIT... (6 Replies)
Discussion started by: DPAI
6 Replies
2. UNIX for Advanced & Expert Users
Hi..,
Now, I am reading about the netstat command and its implementation. I have doubts in some options and its functionalities,
natstat - M (Which is described as display masqueraded connections), what it means?
What is Forwarding Information Base.?(--fib)
Thanks in advance,... (3 Replies)
Discussion started by: nagalenoj
3 Replies
3. BSD
For FreeBSD I use this command to determine what ports are listenning
netstat -an | grep LISTEN
is there another way, perhaps another command? (2 Replies)
Discussion started by: edgarvm
2 Replies
4. IP Networking
I can't tell what the output of the netstat command means. Is there anywhere that has this information? I tried the man pages, but they weren't helpful. (3 Replies)
Discussion started by: Ultrix
3 Replies
5. Solaris
Greetings to all,
Here is a line of output from my netstat command
cbp031.904 wdcprodhome.nfsd 98304 0 49640 0 ESTABLISHED
The only thing i recognize is the unix machine "cbp031" but what is .904 and all the other data telling me?
Thanks in advance. (3 Replies)
Discussion started by: Harleyrci
3 Replies
6. Shell Programming and Scripting
Hi,
In my project we use sftp with batch mode (password less) script in parallel for 14 sessions which connects to 2 different servers alternatively i.e. 7 connects to one server say server1 and the other 7 connects to say server 2.
Now the problem is that these 14 sessions are run in... (5 Replies)
Discussion started by: dips_ag
5 Replies
7. UNIX for Advanced & Expert Users
Hi,
I want to list the time for how long a secure connections last to my server/blade. i am using netstat command to get the same, but not sure how to get the time for how long connections is being ESTABLISHED.
netstat -na | grep 'ESTABLISHED' | grep :443 |awk '{print $4}' | cut -d: -f1 |... (1 Reply)
Discussion started by: Siddheshk
1 Replies
8. UNIX for Dummies Questions & Answers
Do I have this command correct to show all current connections/sessions my Solaris box has? It does not seem to do anything.
netstat -an | grep EST (6 Replies)
Discussion started by: SIFT3R
6 Replies
9. Red Hat
Hi
Can any body tell me about TIME_WAIT status meaning in the following command output.
# netstat -anp|grep 5000
tcp 0 0 127.0.0.1:50006 0.0.0.0:* LISTEN 5058/ccsd
tcp 0 0 0.0.0.0:50008 0.0.0.0:* ... (3 Replies)
Discussion started by: mastansaheb
3 Replies
10. OS X (Apple)
When running netstat -i from the Command Terminal,
It returns with 21 different connections..
The addresses all look like this:
::1
fe80:1::1
10:dd:b1:a5:c4:ba
with Network names like
Linke#2
fe80::8e2d
How can I delve deeper into this to clarify what is going on with my network?... (0 Replies)
Discussion started by: dwfiedler
0 Replies
LEARN ABOUT OSF1
snmp_traprcv
snmp_traprcv(8) System Manager's Manual snmp_traprcv(8)
NAME
snmp_traprcv - A program that listens for SNMP trap messages and prints any it receives
SYNOPSIS
/usr/sbin/snmp_traprcv [-d] [-tcp] [-p port]
OPTIONS
Sends a hexadecimal dump of the received packet to stdout. Specifies that the TCP transport be used instead of the UDP transport. If a
connection cannot be established, the program silently receives the trap on the standard transport address (UDP 162). Specifies the port
number on the local host on which to listen to messages. The default is 162, the well-known SNMP trap port.
DESCRIPTION
The snmp_traprcv program listens on the SNMP Trap port specified in the /etc/services file. If no entry exists in the /etc/services file,
the program listens on port 162. If any SNMP trap messages arrive, snmp_traprcv prints them to stdout. The program runs until terminated
by typing Ctrl/c.
RESTRICTIONS
When using the default or well-known port, you must have root privileges in order to run this program. The program may not be able to bind
to the default or specified port if other software on the system is already bound to that port.
SEE ALSO
Commands: snmpd(8), snmp_request(8), snmp_trapsnd(8)
snmp_traprcv(8)