Hi,
Users are connecting thru a KCML Client to UNIX machine, and I want to know which TCP/UDP port that client uses? How can I check the port of a user logged in?
Regards,
Tayyab (2 Replies)
Hi,
My network dep. telles me that they have opened the FW but my application still can not get through to other server. If it was TCP I could simply test it myself with "telnet", but how can I check it when the connection is UDP?
Tnx (1 Reply)
hi guys
My linux server have SNMP configure port by default is 161 (UDP)
now my monitor team - who are using Nagios - say the server are not being monitor
so check netstat -lnu and I see all is OK and snmp service is running fine
what else should I check about this port 161? to see if it is... (0 Replies)
May I know what is the TCP/UCP port range for any default AIX NFS? Based on rpcinfo -p, I got the following output:
program vers proto port service
100000 4 udp 111 portmapper
100000 3 udp 111 portmapper
100000 2 udp 111 portmapper
100000 4 ... (4 Replies)
Hi ,
Currently DELL OMSA SNMP sends data through default udp port 161.I want my custom SNMP MIB also to send data in the same udp port 161.Whether its possible.If yes where to configure .I tried starting my custom MIB in udp port 161,but it throws port already in use.Kindly guide. (0 Replies)
Hi ,
Currently DELL OMSA SNMP sends data through default udp port 161.I want my custom SNMP MIB also to send data in the same udp port 161.Whether its possible.If yes where to configure .I tried starting my custom MIB in udp port 161,but it throws port already in use.Kindly guide. (1 Reply)
I have RHEL 5.8 in our production environment. We are using SSL, my query is how to find the port used for SSL. In /etc/services, it shows 443 but when I give
netstat -tulpn | grep 443
Or
netstat -tulp | grep https
I do not get any output.
I hope, my question is clear of how to find... (4 Replies)
Discussion started by: RHCE
4 Replies
LEARN ABOUT OSF1
snmp_traprcv
snmp_traprcv(8) System Manager's Manual snmp_traprcv(8)NAME
snmp_traprcv - A program that listens for SNMP trap messages and prints any it receives
SYNOPSIS
/usr/sbin/snmp_traprcv [-d] [-tcp] [-p port]
OPTIONS
Sends a hexadecimal dump of the received packet to stdout. Specifies that the TCP transport be used instead of the UDP transport. If a
connection cannot be established, the program silently receives the trap on the standard transport address (UDP 162). Specifies the port
number on the local host on which to listen to messages. The default is 162, the well-known SNMP trap port.
DESCRIPTION
The snmp_traprcv program listens on the SNMP Trap port specified in the /etc/services file. If no entry exists in the /etc/services file,
the program listens on port 162. If any SNMP trap messages arrive, snmp_traprcv prints them to stdout. The program runs until terminated
by typing Ctrl/c.
RESTRICTIONS
When using the default or well-known port, you must have root privileges in order to run this program. The program may not be able to bind
to the default or specified port if other software on the system is already bound to that port.
SEE ALSO
Commands: snmpd(8), snmp_request(8), snmp_trapsnd(8)snmp_traprcv(8)