CA Access Control uses the following TCP ports on UNIX by default:
|
Number |
Description |
Listener |
Senders |
Comments |
|---|---|---|---|---|
|
8891 |
CA Access Control client applications |
CA Access Control Agent |
dbmgr (when seosd is running), devcalc, dmsmgr, policydeploy, policyreport, sechkey (when managing a remote computer), secons, segrace, segracex, seini (when managing a remote computer), selang (when seosd is running), senable, sepass, sereport, seretrust, serevu, sesu, sesudo, sewhoami, sepmdd (PMD) |
You can change the default port number by modifying the /etc/services file settings. To do this, add the following line, then restart CA Access Control daemons: seoslang2 port-number/ tcp |
|
5249 |
SSL communications |
CA Access Control Agent |
Note: For information about which of the components provide FIPS compliant communications, see the Release Notes. |
FIPS 140-2 compliant |
|
8892 |
Starting seosd from remote computer |
seosload |
selaod |
When seload loads daemons on a remote computer, inetd (Internet services daemon) on the remote computer executes the rseloadd program. This program executes seload locally and exits; it receives the parameters on this port. You can change the default port number by modifying the /etc/services file settings. To do this, add the following line, then restart CA Access Control daemons: seosload port-number/ tcp Note: The communication on this port is not encrypted since it does not send any sensitive information. |
| Copyright © 2012 CA. All rights reserved. | Tell Technical Publications how we can improve this information |