Solved

openjms behind a gnatbox firewall

Posted on 2004-09-08
8
229 Views
Last Modified: 2010-03-31
I can not figure out what ports to open up to allow openjms to communicate using the RMI protocol through a gnatbox ... Any body?
0
Comment
Question by:akruger
  • 4
  • 2
8 Comments
 
LVL 35

Expert Comment

by:girionis
ID: 12005100
The defautl port is 3030 (from: http://openjms.sourceforge.net/config/reference.html)
0
 
LVL 35

Expert Comment

by:girionis
ID: 12005102
If you also ned to open an RMI port, it defaults to 1099.
0
 

Author Comment

by:akruger
ID: 12009780
Right ... I have opened up port 1099 tcp through the firewall because I am using RMI ...
Inside the firewall it works like a charm .... so openjms is set up correctly

I open up a NAT to the host running openjms and then open up a filter to the host using TCP.

When I watch the logs it looks like a connection is made ... but no data ever flows ... so do I have to open up UDP/ICMP or something else to get RMI to work?

0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 
LVL 35

Expert Comment

by:girionis
ID: 12010793
>  so do I have to open up UDP/ICMP or something else to get RMI to work?

You shouldn't, opening up port 1099 should be enough. Have you checked if RMI is using the default port, you might have configured it to use some other port.
0
 

Author Comment

by:akruger
ID: 12013013
I have kept digging and RMI uses a random port ... not nice in a firewall.  Will have to use TCP ...
0
 
LVL 35

Accepted Solution

by:
girionis earned 250 total points
ID: 12014007
This shouldn't happen. How do you start the rmiregistry. You can assign a port while you start it:

rmiregistry 1099
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Exception after setting jdbc session management 2 51
topping1 challenge 7 72
java jdbc batch example 8 17
How to convert String matching to regex in java 4 16
For customizing the look of your lightweight component and making it look opaque like it was made of plastic.  This tip assumes your component to be of rectangular shape and completely opaque.   (CODE)
Java functions are among the best things for programmers to work with as Java sites can be very easy to read and prepare. Java especially simplifies many processes in the coding industry as it helps integrate many forms of technology and different d…
This theoretical tutorial explains exceptions, reasons for exceptions, different categories of exception and exception hierarchy.
This video teaches viewers about errors in exception handling.

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now