Previous Topic: Used Ports

Next Topic: Windows Used Ports

UNIX Used Ports

CA Access Control uses the following TCP ports on UNIX by default:

Number

Description

Listener

Senders

Comments

8891

CA Access Control client applications

CA Access Control Agent

dbmgr (when seosd is running), devcalc, dmsmgr, policydeploy, policyreport, sechkey (when managing a remote computer), secons, segrace, segracex, seini (when managing a remote computer), selang (when seosd is running), senable, sepass, sereport, seretrust, serevu, sesu, sesudo, sewhoami, sepmdd (PMD)

You can change the default port number by modifying the /etc/services file settings. To do this, add the following line, then restart CA Access Control daemons:

seoslang2   port-number/ tcp

5249

SSL communications

CA Access Control Agent

Note: For information about which of the components provide FIPS compliant communications, see the Release Notes.

FIPS 140-2 compliant

8892

Starting seosd from remote computer

seosload

selaod

When seload loads daemons on a remote computer, inetd (Internet services daemon) on the remote computer executes the rseloadd program. This program executes seload locally and exits; it receives the parameters on this port.

You can change the default port number by modifying the /etc/services file settings. To do this, add the following line, then restart CA Access Control daemons:

seosload   port-number/ tcp

Note: The communication on this port is not encrypted since it does not send any sensitive information.