Chapter 1 Prerequisites
Port Usage
The Local Security Policy window appears.
Step 2 Click Local Polices > Security Options.
Step 3 Select System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing.
Step 4
Step 5 Select Enabled or Disabled to enable or disable FIPS compliant algorithms.
Step 6 Click Apply.
You must reboot the server for the changes to take effect.
Port Usage
Before you install Service Monitor, ensure that the ports listed in Table
Note The ports in Table
Table
Table | Service Monitor Port Usage | |
|
|
|
Protocol | Port Number | Service Name |
|
|
|
TCP | 22 | |
|
| Communications Manager versions 5.x and later. |
|
|
|
UDP | 53 | DNS. |
|
|
|
UDP | 67 and 68 | DHCP. |
|
|
|
TCP | 2000 | |
|
|
|
TCP | 43459 | Database. |
|
|
|
UDP | 5666 | |
|
|
|
TCP | Interprocess communication between the user interface and | |
|
| processes. |
|
| These ports must be free. |
|
|
|
Note Service Monitor uses TFTP to find the configuration file for a given Cisco 1040. Service Monitor by default uses port 69 on the TFTP servers.
Common Services is also installed on the Service Monitor system. Table
Installation Guide for Cisco Unified Service Monitor
|
| |
|