Monitoring for windows DMZ server

This support forum board is for support questions relating to Nagios XI, our flagship commercial network monitoring solution.
Locked
divya_resideo
Posts: 3
Joined: Fri Jun 12, 2020 7:36 am

Monitoring for windows DMZ server

Post by divya_resideo »

HI,

I am trying to monitoring windows edge server which is in DMZ through NCPA agent. But I am not able to connect with telnet.

If there any firewall rule I need to enable on server end ?

Regards,
Divya
ssax
Dreams In Code
Posts: 7682
Joined: Wed Feb 11, 2015 12:54 pm

Re: Monitoring for windows DMZ server

Post by ssax »

You need to allow port 5693 TCP for NCPA to work.

What is the output of this command from your XI server?
- Change X.X.X.X to the IP of the NCPA host

Code: Select all

nmap -Pn -p 5693 X.X.X.X
Send the output of this one as well:

Code: Select all

tcptraceroute X.X.X.X 5693
That should show you roughly where it's failing.
divya_resideo
Posts: 3
Joined: Fri Jun 12, 2020 7:36 am

Re: Monitoring for windows DMZ server

Post by divya_resideo »

Hi,

Below is the output from the commands you gave.

[root@@@@@@tmp]# nmap -Pn -p 5693 X.X.X.X

Starting Nmap 6.47 ( http://nmap.org ) at 2021-01-21 08:25 UTC
Nmap scan report for X.X.X.X
Host is up (0.080s latency).
PORT STATE SERVICE
5693/tcp open unknown

IPs removed by moderator


[root@tmp]

Thanks,
ssax
Dreams In Code
Posts: 7682
Joined: Wed Feb 11, 2015 12:54 pm

Re: Monitoring for windows DMZ server

Post by ssax »

That looks good.

What does this output from your XI server?
- Change the token to your token

Code: Select all

/usr/local/nagios/libexec/check_ncpa.py -H X.X.X.X -t 'mytoken' -P 5693 -M system/agent_version 
Please attach (or PM) the ncpa.cfg and the ncpa_listener.log file from the windows server.
divya_resideo
Posts: 3
Joined: Fri Jun 12, 2020 7:36 am

Re: Monitoring for windows DMZ server

Post by divya_resideo »

Hi ssax,

I have sent you log files on PM.

Regards,
ssax
Dreams In Code
Posts: 7682
Joined: Wed Feb 11, 2015 12:54 pm

Re: Monitoring for windows DMZ server

Post by ssax »

Send the output of this command:
- Adjust the IP and token as necessary

Code: Select all

/usr/local/nagios/libexec/check_ncpa.py -H X.X.X.X -t 'mytoken' -P 5693 -M system/agent_version -D
Locked