- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
11-29-2022 09:35 PM
Dear Team,
First of all, I checked the 'port number usage' provided by paloalto.
However, port information related to 28777, 20077, 47631, and 20177 cannot be checked.
It seems to be the port used by dp0 and mgmt when executing commands in my lab.
If anyone knows information about the above 4 ports, please share with me.
Thanks in advance,
Kyungjun,
11-30-2022 12:38 AM
Hi @CHOE-KyungJun ,
Since they are not documented my guess is these are proprietary and internal ports on which different daemons/processes communicate.
That being the case my next step would be to contact your sales engineer or TAC for confirmation.
Kind regards,
-Kiwi.
11-30-2022 12:38 AM
Hi @CHOE-KyungJun ,
Since they are not documented my guess is these are proprietary and internal ports on which different daemons/processes communicate.
That being the case my next step would be to contact your sales engineer or TAC for confirmation.
Kind regards,
-Kiwi.
11-30-2022 01:13 AM
Those are ports used by the backplane fabric so the management plane and dataplane (and in larger chassis the control plane) can communicate with each other. They're purely used internally
06-11-2025 02:32 PM - edited 06-11-2025 02:38 PM
Add tcp6/7759 and tcp6/20277, these two plus tcp6/20177 are processes owned by gpsvc as of 10.2.x.
You can use the following command to find ports and their associated processes that are listening:
show netstat all yes numeric yes programs yes | except ' 127.\| ::1:\|ESTABLISHED\|SYN_SENT\|TIME_WAIT\|FIN_WAIT\|unix'
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!