Page 1 of 1
Monitoring for windows DMZ server
Posted: Wed Jan 20, 2021 8:28 am
by divya_resideo
HI,
I am trying to monitoring windows edge server which is in DMZ through NCPA agent. But I am not able to connect with telnet.
If there any firewall rule I need to enable on server end ?
Regards,
Divya
Re: Monitoring for windows DMZ server
Posted: Wed Jan 20, 2021 5:48 pm
by ssax
You need to allow port 5693 TCP for NCPA to work.
What is the output of this command from your XI server?
- Change X.X.X.X to the IP of the NCPA host
Send the output of this one as well:
That should show you roughly where it's failing.
Re: Monitoring for windows DMZ server
Posted: Thu Jan 21, 2021 3:39 am
by divya_resideo
Hi,
Below is the output from the commands you gave.
[root@@@@@@tmp]# nmap -Pn -p 5693 X.X.X.X
Starting Nmap 6.47 (
http://nmap.org ) at 2021-01-21 08:25 UTC
Nmap scan report for X.X.X.X
Host is up (0.080s latency).
PORT STATE SERVICE
5693/tcp open unknown
IPs removed by moderator
[root@tmp]
Thanks,
Re: Monitoring for windows DMZ server
Posted: Thu Jan 21, 2021 7:00 pm
by ssax
That looks good.
What does this output from your XI server?
- Change the token to your token
Code: Select all
/usr/local/nagios/libexec/check_ncpa.py -H X.X.X.X -t 'mytoken' -P 5693 -M system/agent_version
Please attach (or PM) the ncpa.cfg and the ncpa_listener.log file from the windows server.
Re: Monitoring for windows DMZ server
Posted: Wed Jan 27, 2021 7:21 am
by divya_resideo
Hi ssax,
I have sent you log files on PM.
Regards,
Re: Monitoring for windows DMZ server
Posted: Thu Jan 28, 2021 5:51 pm
by ssax
Send the output of this command:
- Adjust the IP and token as necessary
Code: Select all
/usr/local/nagios/libexec/check_ncpa.py -H X.X.X.X -t 'mytoken' -P 5693 -M system/agent_version -D