Solved

window command to clear a network port in use

Posted on 2009-07-07
4
5,139 Views
Last Modified: 2013-12-04
Is there any windows script/command used to clear a network port in use?
For example,  how to clear a port "1099"  if it is in listening state on windows xp system?
0
Comment
Question by:JOEANEMAV
  • 3
4 Comments
 
LVL 47

Accepted Solution

by:
Donald Stewart earned 400 total points
ID: 24797518
From here
http://wiki.answers.com/Q/What_is_the_Dos_command_to_close_an_open_port
 
1)Type

netstat -a -o -n

in command prompt.

2) find the PID number for that port number
3) goto task manager and end process the corresponding PID number.  
0
 
LVL 9

Assisted Solution

by:PC_Rob
PC_Rob earned 100 total points
ID: 24797553
You can use netstat -b at the command line to show the executable that is using the port in question.

Once you know what is using it, you can stop that program top clear the port.

Regards,

Rob
0
 
LVL 47

Assisted Solution

by:Donald Stewart
Donald Stewart earned 400 total points
ID: 24797608
I also like to use this great utility to both view and close open ports
 
 
Currports
http://nirsoft.net/utils/cports.html 
0
 
LVL 47

Expert Comment

by:Donald Stewart
ID: 24806896
"B" ????
what possible more info is needed?? It was a clear and concise answer.
0

Featured Post

Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article is in response to a question (http://www.experts-exchange.com/Networking/Network_Management/Network_Analysis/Q_28230497.html) here at Experts Exchange. The Original Poster (OP) requires a utility that will accept a list of IP addresses …
The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

830 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question