<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: figure out all ntp clinets in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/figure-out-all-ntp-clinets/m-p/2975199#M575445</link>
    <description>The problem is---I don't know what all the boxes are.  This box is extremely old and has been a NTP server forever.  Previous employees are gone, don't know what they did, just trying to be proactive to avoid a mess.</description>
    <pubDate>Fri, 16 May 2003 13:19:41 GMT</pubDate>
    <dc:creator>Dan Copeland</dc:creator>
    <dc:date>2003-05-16T13:19:41Z</dc:date>
    <item>
      <title>figure out all ntp clinets</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/figure-out-all-ntp-clinets/m-p/2975197#M575443</link>
      <description>Admins,&lt;BR /&gt;&lt;BR /&gt;I have a hp-ux NTP server that I'm decommissioning and want to find out all clients that are using it.  It's a 10.20 hosts so I believe tcpdump will not work.  Other than a network sniffer, is there a way to tell which clients are connecting to my NTP server.  I played w/ ntpq for a while but didn't get what I was looking for.&lt;BR /&gt;&lt;BR /&gt;tia,&lt;BR /&gt;Frank</description>
      <pubDate>Fri, 16 May 2003 12:51:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/figure-out-all-ntp-clinets/m-p/2975197#M575443</guid>
      <dc:creator>Dan Copeland</dc:creator>
      <dc:date>2003-05-16T12:51:52Z</dc:date>
    </item>
    <item>
      <title>Re: figure out all ntp clinets</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/figure-out-all-ntp-clinets/m-p/2975198#M575444</link>
      <description>from this server run ntpq -p "hostname" This inquires the peer for ntp.&lt;BR /&gt;&lt;BR /&gt;run this command on all hosts you have. Those pointing to you are using this server(which you plan to decommission) as ntp.</description>
      <pubDate>Fri, 16 May 2003 13:00:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/figure-out-all-ntp-clinets/m-p/2975198#M575444</guid>
      <dc:creator>RAC_1</dc:creator>
      <dc:date>2003-05-16T13:00:03Z</dc:date>
    </item>
    <item>
      <title>Re: figure out all ntp clinets</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/figure-out-all-ntp-clinets/m-p/2975199#M575445</link>
      <description>The problem is---I don't know what all the boxes are.  This box is extremely old and has been a NTP server forever.  Previous employees are gone, don't know what they did, just trying to be proactive to avoid a mess.</description>
      <pubDate>Fri, 16 May 2003 13:19:41 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/figure-out-all-ntp-clinets/m-p/2975199#M575445</guid>
      <dc:creator>Dan Copeland</dc:creator>
      <dc:date>2003-05-16T13:19:41Z</dc:date>
    </item>
    <item>
      <title>Re: figure out all ntp clinets</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/figure-out-all-ntp-clinets/m-p/2975200#M575446</link>
      <description>Hi Frank:&lt;BR /&gt;&lt;BR /&gt;Ideally your clients have specified more than one ntp source to which they listen, so the disappearance of your old server should not precipitate catastrophe for them.&lt;BR /&gt;&lt;BR /&gt;Regards!&lt;BR /&gt;&lt;BR /&gt;...JRF...</description>
      <pubDate>Fri, 16 May 2003 13:29:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/figure-out-all-ntp-clinets/m-p/2975200#M575446</guid>
      <dc:creator>James R. Ferguson</dc:creator>
      <dc:date>2003-05-16T13:29:18Z</dc:date>
    </item>
    <item>
      <title>Re: figure out all ntp clinets</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/figure-out-all-ntp-clinets/m-p/2975201#M575447</link>
      <description>for i in `cat /etc/hosts|awk '{print $1}'`&lt;BR /&gt;do&lt;BR /&gt;ntpq -p $i|grep "your host"&lt;BR /&gt;done&lt;BR /&gt;&lt;BR /&gt;Those pointing to your server are using your server as ntp server.&lt;BR /&gt;&lt;BR /&gt;(You need to have list of servers in your environment to further check it)</description>
      <pubDate>Fri, 16 May 2003 13:34:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/figure-out-all-ntp-clinets/m-p/2975201#M575447</guid>
      <dc:creator>RAC_1</dc:creator>
      <dc:date>2003-05-16T13:34:59Z</dc:date>
    </item>
    <item>
      <title>Re: figure out all ntp clinets</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/figure-out-all-ntp-clinets/m-p/2975202#M575448</link>
      <description>If you have the log file for ntp requests (some can be found from syslog.log) you will be able to figure out some cleints. If you are going to replace this ntp server with another one, then check the config files /etc/ntp.conf, /etc/ntp.drift, /etc/ntp.keys and /etc/rc.config.d/netdaemons.</description>
      <pubDate>Fri, 16 May 2003 13:40:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/figure-out-all-ntp-clinets/m-p/2975202#M575448</guid>
      <dc:creator>Helen French</dc:creator>
      <dc:date>2003-05-16T13:40:51Z</dc:date>
    </item>
    <item>
      <title>Re: figure out all ntp clinets</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/figure-out-all-ntp-clinets/m-p/2975203#M575449</link>
      <description>Assuming you are not running in broadcast mode: if you run &lt;BR /&gt;netstat -an |grep 123&lt;BR /&gt;&lt;BR /&gt;you will get any tcp connections on the server's ntp port 123 at that instant in time.  However the ntp faq says:&lt;BR /&gt;"For xntp3-5.93e the smallest and largest allowable polling values are 4 (16 seconds) and 14 (4.5 hours) respectively."&lt;BR /&gt;so there is no guarantee that you would catch all (or even any of the clients) unless you just happened to get lucky.&lt;BR /&gt;&lt;BR /&gt;IF there is a router in the network and most of your potential clients pass through the router your network admin can probably help you.  It is simple on a Cisco router to build a logging access list which permit all traffic but which log traffic which meets a certain requirement.&lt;BR /&gt;&lt;BR /&gt;conf t&lt;BR /&gt;&lt;BR /&gt;logging buff&lt;BR /&gt;&lt;BR /&gt;access-list 100 permit tcp any host "ipaddressof10.20" eq 123 log&lt;BR /&gt;access-list 100 permit ip any any&lt;BR /&gt;&lt;BR /&gt;int e0/0 (or whatever interface the 10.20 lives on)&lt;BR /&gt;ip access-list 100 out&lt;BR /&gt;&lt;BR /&gt;end&lt;BR /&gt;&lt;BR /&gt;wr me&lt;BR /&gt;&lt;BR /&gt;now wait overnight and&lt;BR /&gt;&lt;BR /&gt;show log&lt;BR /&gt;&lt;BR /&gt;will show any traffic to the 10.20's ntp port which passed through the router.  &lt;BR /&gt;&lt;BR /&gt;Actually tcpdump used to work for 10.20. The problem is finding the old version.  The faq at &lt;A href="http://www.pimpworks.org/hp/hpuxfaq.html" target="_blank"&gt;http://www.pimpworks.org/hp/hpuxfaq.html&lt;/A&gt;&lt;BR /&gt;says:&lt;BR /&gt;&lt;BR /&gt;"HP-UX 10.20 and 11.X can use tcpdump/libpcap as found at&lt;BR /&gt;&lt;A href="ftp://ftp.ee.lbl.gov./" target="_blank"&gt;ftp://ftp.ee.lbl.gov./&lt;/A&gt; To select the interface to trace, one uses the -i&lt;BR /&gt;option and gives the interface name as "/dev/dlpiN" where N is the PPA&lt;BR /&gt;of the device. One uses lanscan to find PPAs. On 10.20, the PPA happens&lt;BR /&gt;to be the same as the Network Management ID (NMID) and is not the same&lt;BR /&gt;as the N in "lanN." On 11.X, the PPA happens to be the same as the Card&lt;BR /&gt;Instance number and happens to be the same as the N in "lanN." The&lt;BR /&gt;/dev/dlpiN specified to tcpdump/libpcap is not the same as the device&lt;BR /&gt;file /dev/dlpiM. What actually happens is tcpdump/libcap opens /dev/dlpi&lt;BR /&gt;and bind to PPA N. The /dev/dlpiM device files are for other uses."&lt;BR /&gt;&lt;BR /&gt;This appears to be a quote from our own Rick Jones.  Note you will need libpcap installed before you install tcpdump.&lt;BR /&gt;&lt;BR /&gt;Ron&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 16 May 2003 14:10:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/figure-out-all-ntp-clinets/m-p/2975203#M575449</guid>
      <dc:creator>Ron Kinner</dc:creator>
      <dc:date>2003-05-16T14:10:44Z</dc:date>
    </item>
  </channel>
</rss>

