Using Telnet or Powershell to troubleshoot connectivity between CCS components.
search cancel

Using Telnet or Powershell to troubleshoot connectivity between CCS components.


Article ID: 195968


Updated On:


Control Compliance Suite Control Compliance Suite Standards Server Control Compliance Suite Standards Module


Control Compliance Suite (CCS)

Telnet or Powershell can be used to determine connectivity between CCS components outside of CCS.  This helps if communication is being blocked or misrouted to another server.


CCS Network Ports:  CCS 12.6.x Network Ports

Common listening ports for the different CCS components:

All CCS Managers: 5600

All Windows agents: 5601

All UNIX/Linux agents: 5600


How use Telnet or Powershell to test connectivity 

It is best to test communication from each server that is running a CCS component.  Example: from ManagerA  to ManagerB, and then from ManagerB to ManagerA.

How to run Telnet:

Start -> Run -> cmd (to open a command prompt.  You might have to open the cmd 'As administrator')

Telnet syntax:
telnet <> <listening_port>

(NOTE: You can use the hostname, FQDN, or IP of the CCS component you would like to connect to test)

telnet 5600 (this example shows an attempt to telnet to the target server EXAMPLE.COM using port 5600)

If a blank screen appears with no errors a telnet session has been established.  Press another key to break the connection and return to a command prompt.

How to use Powershell to test connectivity

Start Powershell and run the following command.  In this example, you are running this on the CCS manager to test communication to a CCS agent, but it could also be used to test communication from an agent to a manager, etc.

Test-NetConnection -Port <Port_number> -ComputerName Example -InformationLevel Detailed

Managers listens on port 5600
Windows agent listens on port 5601
Unix\Linux agent listens on port 5600


PS C:\Users\####> Test-NetConnection -Port 5601 -ComputerName -InformationLevel Detailed
WARNING: TCP connect to failed

ComputerName            :
RemoteAddress           :
RemotePort              : 5601
NameResolutionResults   :
MatchingIPsecRules      :
NetworkIsolationContext : Internet
IsAdmin                 : False
InterfaceAlias          : Ethernet
SourceAddress           :
NetRoute (NextHop)      :
PingSucceeded           : True
PingReplyDetails (RTT)  : 1 ms
TcpTestSucceeded        : False


If the TcpTestSucceeded in the Powershell results shows False, then it was not able to connect to that port on that agent, and you need to determine what is blocking it.  

If the TcpTestSucceeded in the Powershell results shows True, then check the esmd.log (Unix\Linux) or the esmagent.log (Windows) on the agent to see if the agent registers the connection.  See the 'How to verify that Telnet or Powershell connected to the target server' section below.


How to verify that Telnet or Powershell connected to the target server

Just running Telnet or Powershell and connecting to a server is only part of the test.  If the DNS is incorrect, or if there are firewalls between the originating server and the target server, it can seem to connect but it might not be the correct server.  Checking the logs of the target server can confirm that the telnet did indeed connect to the target server is required.

Confirm connectivity by checking the CCS logs on the target server:

For example if you were checking connectivity from a CCS agent to a CCS manager, perform the Telnet section above on the agent to see if it can telnet to the manager.  To verify it connected to the manager, open the C:\Program Files (x86)\Symantec\CCS\Reporting and Analytics\ESM\system\<EXAMPLE>\esmmanager.log on the manager.  Scroll to the bottom and see if you see a generic connection attempt like the following:

Response if using Telnet to test communication:

[04960] [2020/07/23 16:55:21:015] [CRITICAL] Scheduler: connection handshaking failed.
csp__server_handshake: error reading version from client
buffer is not large enough (data length = 3338, buffer size = 2064)


Response if using PowerShell to test communication:

[08704] [2023/05/09 11:05:32:685] [CRITICAL] connection handshaking failed.
csp__server_handshake: error reading version from client
connection closed by remote process

Note the date/time in the entry above on the target server, and compare that to when you ran the telnet (or PowerShell) command on the originating server.  If it matches then it did connect to the target server correctly.

Log location for the CCS agents: (For checking connectivity issues from CCS manager to a CCS agent)

  • Windows agent: \Program Files (x86)\Symantec\Enterprise Security Manager\ESM\system\<EXAMPLE>\esmagent.log
  • UNIX/Linux agent: /esm/bin/<EXAMPLE>/esmd.log


Note about Firewalls:

Firewalls between the servers may seem to allow the connectivity to be successful, but the CCS components will still not be able to function correctly.  If you are getting the following error, this indicates that the two CCS components are able to connect, but firewall(s) (including the local firewall on the target server) may be impacting the packets and CCS is not able to validate the connection.

[06428] [2020/07/24 17:32:40:294] [INFO] TCP server: 2020/07/24 <IP>: Connect from ##.##.#.#

[06428] [2020/07/24 17:32:40:294] [ERROR] TCP server: common port - failed to read initial few bytes from the socket with error 10054

[06428] [2020/07/24 17:32:40:294] [ERROR] TCP server: common port - The CCS manager failed to validate the inbound connection. Ignoring the connection.

If you see the above error in the esmmanager.log file, you typically have firewall(s) impacting the packets.  Contact your network administrator to allow the required ports for CCS to work correctly.

Additional Information

On UNIX\Linux agents, the IPTables (or NFTables on RHEL 8) are often overlooked and can block connection to the CCS agent.  For troubleshooting, disable IPTables and then see if the manager is able to connect to the CCS agent.  If it does, enable IPTables and configure it to allow connectivity to the CCS agent listening on 5600, and also 5599 for agent upgrades.