Test communication between 2 pc's on a domain over a specific udp port

Posted on 2008-11-17
Last Modified: 2012-06-22
I apologize ahead of time if this has been answered - I've checked the knowledge base and am having trouble finding exactly what I need...

We have a client running a medical database program on a Windows Server 2003 (dual NIC) domain with XP Pro client machines. The only firewall software running is Windows Firewall on the clients and the default RARS firewall on the WAN port on the server.

The medical database program has a built-in messaging system for messaging between users within the office, while in the software. The messaging system works by posting the message to the database and then sending out a "refresh" command via UDP port 3060.

This messaging is not working. Can anyone direct me to a program that I can use to test UDP port 3060 between the server and clients, clients and the server, and clients and clients?

Thank you in advance,
Question by:CompTechNS
    LVL 16

    Expert Comment

    Would TELNET work for you ? Just to check connectivity to the UDP port
    LVL 1

    Author Comment

    Telnet is available - but even if the port is open, will an XP machine respond to an unsolicited telnet request on a non-standard request?
    LVL 31

    Assisted Solution

    by:Henrik Johansson
    LVL 1

    Author Comment

    OK - so I ran PortQry on the server, querying UDP port 3060 on one of the client machines (querying the server by name). The response I received was "LISTENING or FILTERED".

    Same response when queryong the client from the server.

    Does this mean that client is open on port 3060?
    LVL 1

    Accepted Solution

    I found a program that can scan both UDP and TCP on selected ports and ranges.  It's called Network Activ Port Scanner V4.0.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Top 6 Sources for Identifying Threat Actor TTPs

    Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

    Suggested Solutions

    Step by step guide to Clean and Sort your windows registry! Introduction: Always remember: A Clean registry = Better performance = Save your invaluable time In this article we're going to clear our registry manually! Yes, manually! The e…
    If you have done a reformat of your hard drive and proceeded to do a successful Windows XP installation, you may notice that a choice between two operating systems when you start up the machine. Here is how to get rid of this: Click Start Clic…
    how to add IIS SMTP to handle application/Scanner relays into office 365.
    Internet Business Fax to Email Made Easy - With eFax Corporate (, you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…

    737 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    22 Experts available now in Live!

    Get 1:1 Help Now