<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Monitor Socket Connection Attempts? in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/monitor-socket-connection-attempts/m-p/2956501#M577965</link>
    <description>Absolutely, tcpdump:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://hpux.cs.utah.edu/hppd/hpux/Networking/Admin/tcpdump-3.7.2/" target="_blank"&gt;http://hpux.cs.utah.edu/hppd/hpux/Networking/Admin/tcpdump-3.7.2/&lt;/A&gt; &lt;BR /&gt;&lt;BR /&gt;The best.&lt;BR /&gt;&lt;BR /&gt;Also try lsof:&lt;BR /&gt;&lt;BR /&gt;lsof -i tcp:23&lt;BR /&gt;lsof -i udp:23</description>
    <pubDate>Tue, 22 Apr 2003 17:14:53 GMT</pubDate>
    <dc:creator>Michael Steele_2</dc:creator>
    <dc:date>2003-04-22T17:14:53Z</dc:date>
    <item>
      <title>Monitor Socket Connection Attempts?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/monitor-socket-connection-attempts/m-p/2956497#M577961</link>
      <description>Greetings!&lt;BR /&gt;&lt;BR /&gt;Here's the situation:  I'm working with an outside vendor that connects to us via MQ Series through a firewall to a server in our environment.  The vendor says he's making a connection attempt.  The LAN guys say they see the connection attempt at the firewall and that it must be a problem on "our end" not accepting the connection.  However, I never see a socket connection from the vendor with netstat.  Further, it is our contention that the connection request is never making it to our box.&lt;BR /&gt;&lt;BR /&gt;Is there a good way to reliably monitor/log all TCP connection attempts (successful and unsuccessful) that my HP-UX box gets?&lt;BR /&gt;&lt;BR /&gt;Thanks!&lt;BR /&gt;Jim&lt;BR /&gt;&lt;BR /&gt;[Cross-posted to dutchworks]</description>
      <pubDate>Tue, 22 Apr 2003 14:23:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/monitor-socket-connection-attempts/m-p/2956497#M577961</guid>
      <dc:creator>Jim Turner</dc:creator>
      <dc:date>2003-04-22T14:23:45Z</dc:date>
    </item>
    <item>
      <title>Re: Monitor Socket Connection Attempts?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/monitor-socket-connection-attempts/m-p/2956498#M577962</link>
      <description>I should add that we can connect to the queue in question from a local server with no problem at all.</description>
      <pubDate>Tue, 22 Apr 2003 14:36:58 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/monitor-socket-connection-attempts/m-p/2956498#M577962</guid>
      <dc:creator>Jim Turner</dc:creator>
      <dc:date>2003-04-22T14:36:58Z</dc:date>
    </item>
    <item>
      <title>Re: Monitor Socket Connection Attempts?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/monitor-socket-connection-attempts/m-p/2956499#M577963</link>
      <description>Hi Jim!&lt;BR /&gt;&lt;BR /&gt;Restart 'inetd' with logging enabled:&lt;BR /&gt;&lt;BR /&gt;# /usr/sbin/inetd -l&lt;BR /&gt;&lt;BR /&gt;From the man pages for 'inetd(1M)', "If no inetd is running, the -l option causes the inetd to start with connection logging enabled. Otherwise the -l option causes inetd to send the signal SIGQUIT to the inetd that is already running, which causes it to toggle the state of connection logging."&lt;BR /&gt;&lt;BR /&gt;Regards!&lt;BR /&gt;&lt;BR /&gt;...JRF...</description>
      <pubDate>Tue, 22 Apr 2003 14:44:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/monitor-socket-connection-attempts/m-p/2956499#M577963</guid>
      <dc:creator>James R. Ferguson</dc:creator>
      <dc:date>2003-04-22T14:44:18Z</dc:date>
    </item>
    <item>
      <title>Re: Monitor Socket Connection Attempts?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/monitor-socket-connection-attempts/m-p/2956500#M577964</link>
      <description>You can monitor connections using a packet-capture tool like tcpdump&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://hpux.cs.utah.edu/hppd/hpux/Networking/Admin/tcpdump-3.7.2/" target="_blank"&gt;http://hpux.cs.utah.edu/hppd/hpux/Networking/Admin/tcpdump-3.7.2/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Also requires that you install libpcap:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://hpux.cs.utah.edu/hppd/hpux/Networking/Admin/libpcap-0.7.2/" target="_blank"&gt;http://hpux.cs.utah.edu/hppd/hpux/Networking/Admin/libpcap-0.7.2/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;You can also use nettl, which is likely on your system now.  Check the nettl manpage.&lt;BR /&gt;&lt;BR /&gt;Filter on the IP address or port of interest, and you should be able to tell if the SYN packets are ever reaching your host.  YOu should also see if a response if being sent from your host.</description>
      <pubDate>Tue, 22 Apr 2003 16:54:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/monitor-socket-connection-attempts/m-p/2956500#M577964</guid>
      <dc:creator>Bill Douglass</dc:creator>
      <dc:date>2003-04-22T16:54:47Z</dc:date>
    </item>
    <item>
      <title>Re: Monitor Socket Connection Attempts?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/monitor-socket-connection-attempts/m-p/2956501#M577965</link>
      <description>Absolutely, tcpdump:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://hpux.cs.utah.edu/hppd/hpux/Networking/Admin/tcpdump-3.7.2/" target="_blank"&gt;http://hpux.cs.utah.edu/hppd/hpux/Networking/Admin/tcpdump-3.7.2/&lt;/A&gt; &lt;BR /&gt;&lt;BR /&gt;The best.&lt;BR /&gt;&lt;BR /&gt;Also try lsof:&lt;BR /&gt;&lt;BR /&gt;lsof -i tcp:23&lt;BR /&gt;lsof -i udp:23</description>
      <pubDate>Tue, 22 Apr 2003 17:14:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/monitor-socket-connection-attempts/m-p/2956501#M577965</guid>
      <dc:creator>Michael Steele_2</dc:creator>
      <dc:date>2003-04-22T17:14:53Z</dc:date>
    </item>
    <item>
      <title>Re: Monitor Socket Connection Attempts?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/monitor-socket-connection-attempts/m-p/2956502#M577966</link>
      <description>&lt;BR /&gt;As root:&lt;BR /&gt;&lt;BR /&gt;cat &amp;gt;filter&lt;BR /&gt;filter tcp_sport &lt;PUT applications="" port=""&gt;&lt;BR /&gt;filter tcp_dport &lt;PUT applications="" port=""&gt;&lt;BR /&gt;^D&lt;BR /&gt;&lt;BR /&gt;nettl -tn pduin pduout -e ns_ls_ip -s 1024 | netfmt -N1nT -c filter -F&lt;BR /&gt;&lt;BR /&gt;The -F will cause the netfmt to "follow" the input pipe until you interupt it with ^C. The filter will sort out only the traffic for the one application.&lt;BR /&gt;&lt;BR /&gt;Try a connection from a client that works so you can see what it should look like. (If there's a lot of traffic, you might get 1000's of lines of output). Then try a connection from the client outside the firewall. If you don't see the packets from that host in the trace, it never got to you. &lt;BR /&gt;&lt;BR /&gt;The inetd logging is only valid if your app uses inetd to accept connections. If it has it's own listener (like oracle, for example), inetd logging won't do any good, but nettl will capture ANY traffic. &lt;BR /&gt;&lt;BR /&gt;&lt;/PUT&gt;&lt;/PUT&gt;</description>
      <pubDate>Wed, 23 Apr 2003 10:45:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/monitor-socket-connection-attempts/m-p/2956502#M577966</guid>
      <dc:creator>Jim Keeble</dc:creator>
      <dc:date>2003-04-23T10:45:34Z</dc:date>
    </item>
    <item>
      <title>Re: Monitor Socket Connection Attempts?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/monitor-socket-connection-attempts/m-p/2956503#M577967</link>
      <description>Thanks all for the excellent advice.  It turned out to be simplest to use inetd's logging to prove what we already knew.  Someone mucked-up a firewall ACL which jammed the traffic before it got to us.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Jim</description>
      <pubDate>Tue, 06 May 2003 17:39:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/monitor-socket-connection-attempts/m-p/2956503#M577967</guid>
      <dc:creator>Jim Turner</dc:creator>
      <dc:date>2003-05-06T17:39:02Z</dc:date>
    </item>
  </channel>
</rss>

