HI,
I am trying to monitoring windows edge server which is in DMZ through NCPA agent. But I am not able to connect with telnet.
If there any firewall rule I need to enable on server end ?
Regards,
Divya
Monitoring for windows DMZ server
Re: Monitoring for windows DMZ server
You need to allow port 5693 TCP for NCPA to work.
What is the output of this command from your XI server?
- Change X.X.X.X to the IP of the NCPA host
Send the output of this one as well:
That should show you roughly where it's failing.
What is the output of this command from your XI server?
- Change X.X.X.X to the IP of the NCPA host
Code: Select all
nmap -Pn -p 5693 X.X.X.XCode: Select all
tcptraceroute X.X.X.X 5693-
divya_resideo
- Posts: 3
- Joined: Fri Jun 12, 2020 7:36 am
Re: Monitoring for windows DMZ server
Hi,
Below is the output from the commands you gave.
[root@@@@@@tmp]# nmap -Pn -p 5693 X.X.X.X
Starting Nmap 6.47 ( http://nmap.org ) at 2021-01-21 08:25 UTC
Nmap scan report for X.X.X.X
Host is up (0.080s latency).
PORT STATE SERVICE
5693/tcp open unknown
IPs removed by moderator
[root@tmp]
Thanks,
Below is the output from the commands you gave.
[root@@@@@@tmp]# nmap -Pn -p 5693 X.X.X.X
Starting Nmap 6.47 ( http://nmap.org ) at 2021-01-21 08:25 UTC
Nmap scan report for X.X.X.X
Host is up (0.080s latency).
PORT STATE SERVICE
5693/tcp open unknown
IPs removed by moderator
[root@tmp]
Thanks,
Re: Monitoring for windows DMZ server
That looks good.
What does this output from your XI server?
- Change the token to your token
Please attach (or PM) the ncpa.cfg and the ncpa_listener.log file from the windows server.
What does this output from your XI server?
- Change the token to your token
Code: Select all
/usr/local/nagios/libexec/check_ncpa.py -H X.X.X.X -t 'mytoken' -P 5693 -M system/agent_version -
divya_resideo
- Posts: 3
- Joined: Fri Jun 12, 2020 7:36 am
Re: Monitoring for windows DMZ server
Hi ssax,
I have sent you log files on PM.
Regards,
I have sent you log files on PM.
Regards,
Re: Monitoring for windows DMZ server
Send the output of this command:
- Adjust the IP and token as necessary
- Adjust the IP and token as necessary
Code: Select all
/usr/local/nagios/libexec/check_ncpa.py -H X.X.X.X -t 'mytoken' -P 5693 -M system/agent_version -D