From the NetVault Server run the command nmap localhost:
[root@NVBU01 ~]# nmap localhost
Starting Nmap 5.51 ( http://nmap.org ) at 2014-07-15 16:08 SGT
Nmap scan report for localhost (127.0.0.1)
Host is up (0.000017s latency).
Other addresses for localhost (not scanned): 127.0.0.1
Not shown: 993 closed ports
PORT STATE SERVICE
22/tcp open ssh
25/tcp open smtp
80/tcp open http
111/tcp open rpcbind
631/tcp open ipp
8443/tcp open https-alt
20031/tcp open unknown
Here you can see the open ports used by certain services/applications but you do not know what application they are in used.
Run the command netstat to see where these ports belong to:
[root@NVBU01 ~]# netstat -tulpn | grep --color :80
tcp 0 0 0.0.0.0:80 0.0.0.0:* LISTEN 2500/nvwsrequesthan
[root@NVBU01 ~]# netstat -tulpn | grep --color :8443
tcp 0 0 0.0.0.0:8443 0.0.0.0:* LISTEN 2500/nvwsrequesthan
Ports 80 and 8443 are both on process 2500:
[root@NVBU01 ~]# fuser 8443/tcp
8443/tcp: 2500
[root@NVBU01 ~]# fuser 80/tcp
80/tcp: 2500
Note: The process ID is dynamic, you need to change the process ID 2500 from what your machine has reported.
Now check the process exe to see who uses the ports:
[root@NVBU01 ~]# ls -l /proc/2500/exe
lrwxrwxrwx. 1 root root 0 Jul 15 16:04 /proc/2500/exe -> /usr/netvault/bin/nvwsrequesthandler