Writer instructions

Page title

For most spaces, this page must be titled Space announcements.

For spaces with localized content, this page must be titled Space announcements l10n.

Purpose

Provide an announcement banner on every page of your space.

Location

Move this page outside of your home branch.

Guidelines

Limited supportBMC provides limited support for this version of the product. As a result, BMC no longer accepts comments in this space. If you encounter problems with the product version or the space, contact BMC Support.BMC recommends upgrading to the latest version of the product. To see documentation for that version, see MainView Middleware Monitor 9.2.

Network ports


The following table lists the default TCP/IP ports used by the MainView Middleware Monitor (MVMM) product. All TCP/IP ports can be changed (except where noted). If a firewall exists between your MVMM Agents, the Services, Management Console, or database, the same TCP/IP ports must be open on your firewall. 

Note that the direction of the arrows in the diagrams below indicates the direction in which the connection is made. You must make sure your network configuration (for example, firewall) allows connections between hosts in the direction specified.

This section includes diagrams for the two main types of tunneling:

Chapter 4

Default configuration

tmtmReferenceArchitecture_ports.png

Note

MainView Middleware Administrator (TSMA) connects to the queue managers through SVRCONN channels; as a result, its (listener) port should be opened in both directions.


TLS tunnel configuration

tmtmReferenceArchitecture_secureports.png

Note

If the secured connections to the agents are all server initiated, you must make sure your network configuration (for example, firewall) allows connections from the services host to the agent host on the secured agent port (default of 15010). If the secured connections to the agents are all agent initiated, you must make sure your network configuration allows connections from the agent host to the services host on the secured agent port. If there is a mix, connections from both directions must be allowed.

Default ports



    1. This port must be accessible from the TSMA installation when using the TMTM security service
    2. See Running-performance-and-availability-monitoring-extensions for information about changing QPEA, QPMON, and QPCFG port numbers.
    3. If this port number needs to be changed, create or edit the eaapi.ini file in a text editor and modify or insert the following stanza:
      [networksettings]
      agent_listen_port=port number
    4. Port 389 is used to contact Active Directory Domain Controllers when configured for Active Directory Delegate mode security and when using SASL. Port 636 is used to contact Active Directory Domain Controllers when configured for Active Directory Delegate mode security and when using SSL. These ports are not reconfigurable due to Microsoft requirements.

 

 


 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*