Page 1 of 1

Monitoring for windows DMZ server

Posted: Wed Jan 20, 2021 8:28 am
by divya_resideo
HI,

I am trying to monitoring windows edge server which is in DMZ through NCPA agent. But I am not able to connect with telnet.

If there any firewall rule I need to enable on server end ?

Regards,
Divya

Re: Monitoring for windows DMZ server

Posted: Wed Jan 20, 2021 5:48 pm
by ssax
You need to allow port 5693 TCP for NCPA to work.

What is the output of this command from your XI server?
- Change X.X.X.X to the IP of the NCPA host

Code: Select all

nmap -Pn -p 5693 X.X.X.X
Send the output of this one as well:

Code: Select all

tcptraceroute X.X.X.X 5693
That should show you roughly where it's failing.

Re: Monitoring for windows DMZ server

Posted: Thu Jan 21, 2021 3:39 am
by divya_resideo
Hi,

Below is the output from the commands you gave.

[root@@@@@@tmp]# nmap -Pn -p 5693 X.X.X.X

Starting Nmap 6.47 ( http://nmap.org ) at 2021-01-21 08:25 UTC
Nmap scan report for X.X.X.X
Host is up (0.080s latency).
PORT STATE SERVICE
5693/tcp open unknown

IPs removed by moderator


[root@tmp]

Thanks,

Re: Monitoring for windows DMZ server

Posted: Thu Jan 21, 2021 7:00 pm
by ssax
That looks good.

What does this output from your XI server?
- Change the token to your token

Code: Select all

/usr/local/nagios/libexec/check_ncpa.py -H X.X.X.X -t 'mytoken' -P 5693 -M system/agent_version 
Please attach (or PM) the ncpa.cfg and the ncpa_listener.log file from the windows server.

Re: Monitoring for windows DMZ server

Posted: Wed Jan 27, 2021 7:21 am
by divya_resideo
Hi ssax,

I have sent you log files on PM.

Regards,

Re: Monitoring for windows DMZ server

Posted: Thu Jan 28, 2021 5:51 pm
by ssax
Send the output of this command:
- Adjust the IP and token as necessary

Code: Select all

/usr/local/nagios/libexec/check_ncpa.py -H X.X.X.X -t 'mytoken' -P 5693 -M system/agent_version -D