Port listener
Author: t | 2025-04-24
Port Listener is a free lightweight utility to listen on the specified port. Download Port Listener v1.03 Help Improve Port Listener - Share Your Feedback!
GitHub - nocapscripts/Port-Listener: Port listening tool for
Skip to main content This browser is no longer supported. Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support. Configure a DNN listener for an availability group Article06/18/2024 In this article -->Applies to: SQL Server on Azure VMWith SQL Server on Azure VMs in a single subnet, the distributed network name (DNN) routes traffic to the appropriate clustered resource. It provides an easier way to connect to an Always On availability group (AG) than the virtual network name (VNN) listener, without the need for an Azure Load Balancer.This article teaches you to configure a DNN listener to replace the VNN listener and route traffic to your availability group with SQL Server on Azure VMs for high availability and disaster recovery (HADR).For an alternative connectivity option, consider a VNN listener and Azure Load Balancer instead.OverviewA distributed network name (DNN) listener replaces the traditional virtual network name (VNN) availability group listener when used with Always On availability groups on SQL Server VMs. This negates the need for an Azure Load Balancer to route traffic, simplifying deployment, maintenance, and improving failover.Use the DNN listener to replace an existing VNN listener, or alternatively, use it in conjunction with an existing VNN listener so that your availability group has two distinct connection points - one using the VNN listener name (and port if non-default), and one using the DNN listener name and port.CautionThe routing behavior when using a DNN differs when using a VNN. Do not use port 1433. To learn more, see the Port consideration section later in this article.PrerequisitesBefore you complete the steps in this article, you should already have:SQL Server starting with either SQL Server 2019 CU8 and later, SQL Server 2017 CU25 and later, or SQL Server 2016 SP3 and later on Windows Server 2016 and later.Decided that the distributed network name is the appropriate connectivity option for your HADR solution.Configured your Always On availability group.Installed the latest version of PowerShell.Identified the unique port that you will use for the DNN listener. The port used for a DNN listener must be unique across all replicas of the availability group or failover cluster instance. No other connection can share the same port.NoteIf you have multiple AGs or FCIs on the same cluster and you use either a DNN or VNN listener, then each AG or FCI needs its own independent connection point.Create scriptUse PowerShell to create the distributed network name (DNN) resource and associate it with your availability group.To do so, follow these steps:Open a text editor, such as Notepad.Copy and paste the following script:param ( [Parameter(Mandatory=$true)][string]$Ag, [Parameter(Mandatory=$true)][string]$Dns, [Parameter(Mandatory=$true)][string]$Port)Write-Host "Add a DNN listener for availability group $Ag with DNS name $Dns and port $Port"$ErrorActionPreference = "Stop"# create the DNN resource with the port as the resource nameAdd-ClusterResource -Name $Port -ResourceType "Distributed Network Name" -Group $Ag # set the DNS name of the DNN resourceGet-ClusterResource -Name $Port | Set-ClusterParameter -Name DnsName -Value $Dns # start the DNN resourceStart-ClusterResource -Name $Port$Dep = Get-ClusterResourceDependency -Resource $Agif ( $Dep.DependencyExpression
operavps/port-listener-windows: Port Listener Windows /
Receive operations. SEND_BUF_SIZEUse the SEND_BUF_SIZE parameter to specify buffer space for session send operations. 8.2.1 ADDRESS The protocol ADDRESS parameter’s networking parameter is in the listener.ora file. It specifies the protocol address under the DESCRIPTION parameter for one listener. Purpose Specifies a single listener protocol address in the DESCRIPTION parameter Usage Notes Use this parameter to define the protocol, the host, and the port number for the listener. Examplelistener_name= (DESCRIPTION= (ADDRESS_LIST= (ADDRESS=(PROTOCOL=tcp)(HOST=hr-server)(PORT=1521)) (ADDRESS=(PROTOCOL=tcp)(HOST=sales-server)(PORT=1521)))) 8.2.2 DESCRIPTION DESCRIPTION networking parameter of the listener.ora file contains listener protocol addresses. Purpose To contain listener protocol addresses. Example 8-2 Examplelistener_name= (DESCRIPTION= (ADDRESS_LIST= (ADDRESS=(PROTOCOL=tcp)(HOST=hr-server)(PORT=1521)) (ADDRESS=(PROTOCOL=tcp)(HOST=sales-server)(PORT=1521)))) 8.2.3 Firewall Purpose It can be set in endpoint to enable firewall functionality. 8.2.4 IP The protocol address parameter IP determine which IP address the listener listens on when a host name is specified Purpose To determine which IP address the listener listens on when a host name is specified. Usage Notes This parameter is only applicable when the HOST parameter specifies a host name. Values first Listen on the first IP address returned by the DNS resolution of the host name. If the user wants the listener to listen on the first IP to which the specified host name resolves, then the address must be qualified with (IP=first). v4_only Listen only on IPv4 addresses. v6_only Listen only on IPv6 addresses. Default This feature is disabled by default. Example listener_name= (DESCRIPTION= (ADDRESS=(PROTOCOL=tcp)(HOST=rancode1-vip)(PORT=1522)(IP=v6_only)) 8.2.5 QUEUESIZE Purpose To specify the number of concurrent connection requests that the listener can accept on a TCP/IP or IPC listening endpoint (protocol address). Usage Notes The number of concurrent connection requests is dependent on the platform and listener usage scenarios. If the listener is heavily-loaded, then set the parameter to a higher number. Put this parameter at the end of the protocol address with its value set to the expected number of concurrent connection requests. Default The default number of concurrent connection requests is operating system specific. Example listener_name= (DESCRIPTION= (ADDRESS=(PROTOCOL=tcp)(HOST=hr-server)(PORT=1521)(QUEUESIZE=20))) 8.2.6 RECV_BUF_SIZE Use the RECV_BUF_SIZE parameter to specify buffer space for session receive operations. Purpose To specify, in bytes, the buffer space for receive operations ofFree port listener Download - port listener for Windows - UpdateStar
SecTrace Level offSecurity ON: Local OS AuthenticationSNMP OFFListener Parameter File /u01/app/11.2.0.3/grid/network/admin/listener.oraListener Log File /u01/app/grid/diag/tnslsnr/node2/listener/alert/log.xmlListening Endpoints Summary... (DESCRIPTION=(ADDRESS=(PROTOCOL=ipc)(KEY=LISTENER))) (DESCRIPTION=(ADDRESS=(PROTOCOL=tcp)(HOST=10.141.21.360)(PORT=1521))) (DESCRIPTION=(ADDRESS=(PROTOCOL=tcp)(HOST=10.141.21.366)(PORT=1521)))Services Summary...Service "+ASM" has 1 instance(s). Instance "+ASM2", status READY, has 1 handler(s) for this service...Service "newdb" has 1 instance(s). Instance "newdb2", status READY, has 1 handler(s) for this service...Service "newdbXDB" has 1 instance(s). Instance "newdb2", status READY, has 1 handler(s) for this service...The command completed successfullyHere, DBA can see Listner is registered with two IP addresses 10.141.21.360 is Node IP address and 10.141.21.366 is node VIP address.Local_Listener: This is a database parameter which is used to provide detail of local listener running on database node itself. In Real Application Cluster environment this has Node VIP address as value.SQL> show parameter local_listenerNAME TYPE VALUE------------------------------------ ----------- ------------------------------local_listener string (DESCRIPTION=(ADDRESS_LIST=(A DDRESS=(PROTOCOL=TCP)(HOST=10. 141.21.366)(PORT=1521))))When a new connection request is made my SCAN Listener, This address is returned to the SCAN Listener and then connection is made to database local listener. The difference between SCAN Listener and Local Listener is SCAN listener runs corosponding to SCAN VIP's while Local Listener runs with Node VIP or Node IP address.SCAN Listener can move to another database node in case of node failure but local Listener doesn't have this kind of behavior.Remote_Listener: Each database instance has this parameter set to SCAN NAME of the cluster environment. SCAN NAME in turn has one or more IP address further called SCAN VIP and each SCAN VIP has SCAN Listener running on it, so finally each database instance register itself with all SCAN Listeners running across the clusterware.SQL> show parameter remote_listenerNAME TYPE VALUE------------------------------------ ----------- ------------------------------remote_listener string orarac-scan:1521The solo purpose of remote_listener parameter is to register each database instance with all SCAN Listeners in RAC. This provide information on what services are being provided by the instance,the current load, and a recommendation on how. Port Listener is a free lightweight utility to listen on the specified port. Download Port Listener v1.03 Help Improve Port Listener - Share Your Feedback!GitHub - Devsteer/Port-Listener: relatively simple Port Listener
-match '\s*\((.*)\)\s*' ){$DepStr = "$($Matches.1) or [$Port]"}else{$DepStr = "[$Port]"}Write-Host "$DepStr"# add the Dependency from availability group resource to the DNN resourceSet-ClusterResourceDependency -Resource $Ag -Dependency "$DepStr"#bounce the AG resourceStop-ClusterResource -Name $AgStart-ClusterResource -Name $AgSave the script as a .ps1 file, such as add_dnn_listener.ps1.Execute scriptTo create the DNN listener, execute the script passing in parameters for the name of the availability group, listener name, and port.For example, assuming an availability group name of ag1, listener name of dnnlsnr, and listener port as 6789, follow these steps:Open a command-line interface tool, such as command prompt or PowerShell.Navigate to where you saved the .ps1 script, such as c:\Documents.Execute the script: add_dnn_listener.ps1 . For example:c:\Documents> .\add_dnn_listener.ps1 ag1 dnnlsnr 6789Verify listenerUse either SQL Server Management Studio or Transact-SQL to confirm your DNN listener is created successfully.SQL Server Management StudioExpand Availability Group Listeners in SQL Server Management Studio (SSMS) to view your DNN listener:Transact-SQLUse Transact-SQL to view the status of the DNN listener:SELECT * FROM SYS.AVAILABILITY_GROUP_LISTENERSA value of 1 for is_distributed_network_name indicates the listener is a distributed network name (DNN) listener:Update connection stringUpdate the connection string for any application that needs to connect to the DNN listener. The connection string to the DNN listener must provide the DNN port number, and specify MultiSubnetFailover=True in the connection string. If the SQL client does not support the MultiSubnetFailover=True parameter, then it is not compatible with a DNN listener.The following is an example of a connection string for listener name DNN_Listener and port 6789:DataSource=DNN_Listener,6789;MultiSubnetFailover=TrueTest failoverTest failover of the availability group to ensure functionality.To test failover, follow these steps:Connect to the DNN listener or one of the replicas by using SQL Server Management Studio (SSMS).Expand Always On Availability Group in Object Explorer.Right-click the availability group and choose Failover to open the Failover Wizard.Follow the prompts to choose a failover target and fail the availability group over to a secondary replica.Confirm the database is in a synchronized state on the new primary replica.(Optional) Fail back to the original primary, or another secondary replica.Test connectivityTest the connectivity to your DNN listener with these steps:Open SQL Server Management Studio.Connect to your DNN listener.Open a new query window and check which replica you're connected to by running SELECT @@SERVERNAME.Fail the availability group over to another replica.After a reasonable amount of time, run SELECT @@SERVERNAME to confirm your availability group is now hosted on another replica.LimitationsDNN Listeners MUST be configured with a unique port. The port cannot be shared with any other connection on any replica.The client connecting to the DNN listener must support the MultiSubnetFailover=True parameter in the connection string.There might be additional considerations when you're working with other SQL Server features and an availability group with a DNN. For more information, see AG with DNN interoperability.Port considerationsDNN listeners are designed to listen on all IP addresses, but on a specific, unique port. The DNS entry for the listener name should resolve to the addresses of all replicas in the availability group. This is done automatically with the PowerShell script provided in the Create Script section.Port Listener 1.0 free download. Use Port Listener as a free
Since DNN listeners accept connections on all IP addresses, it is critical that the listener port be unique, and not in use by any other replica in the availability group. Since SQL Server listens on port 1433 by default, either directly or via the SQL Browser service, using port 1433 for the DNN listener is strongly discouraged.If the listener port chosen for the VNN listener is between 49,152 and 65,536 (the default dynamic port range for TCP/IP, add an exclusion for this. Doing so will prevent other systems from being dynamically assigned the same port.You can add a port exclusion with the following command:netsh int ipv4 add excludedportrange tcp startport= numberofports=1 store=persistentNext stepsOnce the availability group is deployed, consider optimizing the HADR settings for SQL Server on Azure VMs.To learn more, see:Windows Server Failover Cluster with SQL Server on Azure VMsAlways On availability groups with SQL Server on Azure VMsAlways On availability groups overview --> Feedback Additional resources In this articlePort Listener XP 1.4 free download. Port Listener XP is designed
Kafka ListenersKafka uses three settings to configure how client can connect to brokers within a cluster; lister.security.protocol.map, listeners and advertised.listeners. This page demonstrate how to configure Kafka to for different client connectivity scenarios.Before looking at different scenarios, let’s go through how to configure Kafka listeners.Configuring ListenersThe listener configuration is a comma separated list that defines what interfaces, ports and associated security protocols Kafka will use to listen for client connections. A listener can be configured using the name of a security protocol or a listener can be named using the setting lister.security.protocol.map. Naming listeners is not required but can help make the intent of a specific listener clearer.Note: Lister names and port numbers must be unique.The listener setting format is ://:.A HOSTNAME value of ‘0.0.0.0’ binds the lister to all interfaces.An HOSTNAME value binds the listener to the default interface.Set the HOSTNAME value to the IP address of an interface to bind the listener to a specific interface.listener: SSL://0.0.0.0:9091 - Use all interfaces to listen on port 9091 for incoming SSL connectionslistener: PLAINTEXT://192.168.1.43:9092 - Use the interface with IP address 192.168.1.43 to listen on port 9092 for incoming PLAINTEXT connectionslistener: EXTERNAL://172.20.20.32:9093 - Use the interface with IP address 172.20.20.32 to listen on port 9093 for incoming connections. The lister name and protocol must be configured using lister.security.protocol.map for this to work.Multiple listeners could be configured like this: listener: SSL://192.168.1.43:9091,PLAINTEXT://192.168.1.43:9092,EXTERNAL://172.20.20.32:9093 which may suit a multi network environment.Named ListenersNamed listeners are defined by using the lister.security.protocol.map setting to create a map between a listener name and security protocol.The configuration lister.security.protocol.map: PUBLIC:PLAINTEXT defines a single listener named ‘PUBLIC’ with the ‘PLAINTEXT’ security protocol.The configuration lister.security.protocol.map: PUBLIC:PLAINTEXT, EXTERNAL:SSL defines an additional listener called ‘EXTERNAL’ with the ‘SSL’’ security protocolAdvertised ListenersIn a multi-broker cluster scenarios a front end load balancer would be used to forward a clients initial connection to one of the brokers. The broker provides a new address which is specific to that broker, to the client. The returned address is based on the listener (interface and port) which the broker received initial connection on. This address is the ‘advertised listener address’ and is what the client will use for future connections to the cluster.Advertised listeners are unique to each broker, the cluster will not start if multiple brokers have the same advertised listener addresses set.The above scenario demonstrates how advertised listeners allow balancing of initial connections while providing persistence for ongoing connectivity.Additional ConfigurationsYou can specify the listener for inter-broker communicate using the setting inter.broker.listener.name. If you’re not using named listeners you can use security.inter.broker.protocol to set inter-broker communication by lister security protocol. Note that Kafka will not store if both inter.broker.listener.name and security.inter.broker.protocol are configured.Scenario 1: Simple TopologyOur first scenario is a simple one network topology with a load balancer in front of the Kafka brokers. The load balancer is used to ensure clients connect to a healthy broker when initially attempting connection.The client first connects to the load balancer which forwards the connection to one of the brokers.The broker is receivingPort Listener - Download - LO4D.com
The primary replica through the listener with Windows authentication:sqlcmd -S -EIf the listener is using a port other than the default port (1433), specify the port in the connection string. For example, the following sqlcmd command connects to a listener at port 1435:sqlcmd -S ,1435 -EThe SQLCMD connection automatically connects to whichever instance of SQL Server hosts the primary replica.NoteMake sure that the port you specify is open on the firewall of both SQL Servers. Both servers require an inbound rule for the TCP port that you use. For more information, see Add or Edit Firewall Rule.If you're on the secondary replica VM, and you're unable to connect to the listener, it's possible the probe port was not configured correctly.You can use the following script to validate the probe port is correctly configured for the availability group:Clear-HostGet-ClusterResource `| Where-Object {$_.ResourceType.Name -like "IP Address"} `| Get-ClusterParameter `| Where-Object {($_.Name -like "Network") -or ($_.Name -like "Address") -or ($_.Name -like "ProbePort") -or ($_.Name -like "SubnetMask")}Guidelines and limitationsNote the following guidelines on availability group listener in Azure using internal load balancer:With an internal load balancer, you only access the listener from within the same virtual network.If you're restricting access with an Azure Network Security Group, ensure that the allow rules include:The backend SQL Server VM IP addressesThe load balancer floating IP addresses for the AG listenerThe cluster core IP address, if applicable.Create a service endpoint when using a standard load balancer with Azure Storage for the cloud witness. For more information, see Grant access from a virtual network.PowerShell cmdletsUse the following PowerShell cmdlets to create an internal load balancer for Azure Virtual Machines.New-AzLoadBalancer creates a load balancer.New-AzLoadBalancerFrontendIpConfig creates a front-end IP configuration for a load balancer.New-AzLoadBalancerRuleConfig creates a rule configuration for a load balancer.New-AzLoadBalancerBackendAddressPoolConfig creates a backend address pool configuration for a load balancer.New-AzLoadBalancerProbeConfig. Port Listener is a free lightweight utility to listen on the specified port. Download Port Listener v1.03 Help Improve Port Listener - Share Your Feedback! Port Listener Free Download - Use Port Listener as a free lightweight utility to listen on the specified port.
Check For Listening (Open) Ports With
For each port. Such resources might include:SQL Server database engineAlways On availability group listenerHealth probe for the failover cluster instanceDatabase mirroring endpointCluster core IP resourceAdding an exclusion will prevent other system processes from being dynamically assigned to the same port. For this scenario, configure the following exclusions on all cluster nodes:netsh int ipv4 add excludedportrange tcp startport=58888 numberofports=1 store=persistentnetsh int ipv4 add excludedportrange tcp startport=59999 numberofports=1 store=persistentIt's important to configure the port exclusion when the port is not in use. Otherwise, the command will fail with a message like "The process cannot access the file because it is being used by another process."To confirm that the exclusions are configured correctly, use the following command: netsh int ipv4 show excludedportrange tcp.WarningThe port for the availability group listener's health probe has to be different from the port for the cluster core IP address's health probe. In these examples, the listener port is 59999 and the cluster core IP address's health probe port is 58888. Both ports require an "allow inbound" firewall rule.Set the listener port in SQL Server Management StudioLaunch SQL Server Management Studio and connect to the primary replica.Navigate to Always On High Availability > Availability Groups > Availability Group Listeners.You should now see the listener name that you created in Failover Cluster Manager. Right-click the listener name and select Properties.In the Port box, specify the port number for the availability group listener by using the $EndpointPort you used earlier (1433 was the default), then select OK.Test the connection to the listenerTo test the connection:Use Bastion to connect to a SQL Server that is in the same virtual network, but does not own the replica. It might be the other SQL Server in the cluster.Use sqlcmd utility to test the connection. For example, the following script establishes a sqlcmd connection toPort Listener 1.03 - TaiMienPhi.VN
Managing Syslog Servers The Syslog Server Settings page lets you manage the various virtual syslog servers set up to receive exported logs at different ports. The default listener ports for the syslog server in Firewall Analyzer are 514 and 1514. If your firewalls are exporting log files to either of these ports, you do not have to set up any virtual syslog servers. The Syslog Servers table shows the various virtual syslog servers set up so far, along with their IP address, listener port, and status. You can delete a virtual syslog server by clicking the icon. Once a virtual syslog server is deleted, the corresponding listener port is also freed. You can also stop the syslog collection by clicking the icon and restart the syslog collection by clicking on the icon. Adding a New Syslog Server The Add Syslog Server box lets you add a new virtual syslog server and begin listening on a new port for exported log files.Enter a unique SysLog Server Name for the new virtual syslog server, and the listener port. The Host Name/IP Address field is currently not editable, and takes the IP address of the machine on which the Firewall Analyzer server is running. Click Add Syslog Server to add this virtual syslog server, and begin listening for log files at the specified port.. Port Listener is a free lightweight utility to listen on the specified port. Download Port Listener v1.03 Help Improve Port Listener - Share Your Feedback!Port Listener 1.02 - TaiMienPhi.VN
Measure of receiving performance. Two types of sinkhole listeners are queueing and non-queueing . The queueing listener saves the message to the queue, but then immediately deletes it. Use a queuing listener when you are interested in measuring the performance of the entire injection portion of your message generation system. The non-queueing listener accepts a message, and then immediately deletes it without saving it. Use the non-queueing listener when you want to troubleshoot the connection from your message generation system to the email gateway . For example, in the following figure, you could create a sinkhole listener “C” to mirror the private listener labeled “B.” A non-queueing version tests the performance path of the system from the groupware client to the groupware server to the email gateway. A queueing version tests that same path and the email gateway's ability to enqueue messages and prepare them for delivery via SMTP. Figure 1. Sinkhole Listener for an Enterprise Gateway In the following example, the listenerconfig command is used to create a sinkhole queueing listener named Sinkhole_1 on the Management interface. This Host Access Table (HAT) for the listener is then edited to accept connections from the following hosts: yoursystem.example.com 10.1.2.29 badmail.tst .tst Note The final entry, .tst , configures the listener so that any host in the .tst domain can send email to the listener named Sinkhole_1 . Example mail3.example.com> listenerconfigCurrently configured listeners:1. InboundMail (on PublicNet, 192.168.2.1) SMTP Port 25 Public2. OutboundMail (on PrivateNet, 192.168.1.1) SMTP Port 25 PrivateChoose the operation youComments
Skip to main content This browser is no longer supported. Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support. Configure a DNN listener for an availability group Article06/18/2024 In this article -->Applies to: SQL Server on Azure VMWith SQL Server on Azure VMs in a single subnet, the distributed network name (DNN) routes traffic to the appropriate clustered resource. It provides an easier way to connect to an Always On availability group (AG) than the virtual network name (VNN) listener, without the need for an Azure Load Balancer.This article teaches you to configure a DNN listener to replace the VNN listener and route traffic to your availability group with SQL Server on Azure VMs for high availability and disaster recovery (HADR).For an alternative connectivity option, consider a VNN listener and Azure Load Balancer instead.OverviewA distributed network name (DNN) listener replaces the traditional virtual network name (VNN) availability group listener when used with Always On availability groups on SQL Server VMs. This negates the need for an Azure Load Balancer to route traffic, simplifying deployment, maintenance, and improving failover.Use the DNN listener to replace an existing VNN listener, or alternatively, use it in conjunction with an existing VNN listener so that your availability group has two distinct connection points - one using the VNN listener name (and port if non-default), and one using the DNN listener name and port.CautionThe routing behavior when using a DNN differs when using a VNN. Do not use port 1433. To learn more, see the Port consideration section later in this article.PrerequisitesBefore you complete the steps in this article, you should already have:SQL Server starting with either SQL Server 2019 CU8 and later, SQL Server 2017 CU25 and later, or SQL Server 2016 SP3 and later on Windows Server 2016 and later.Decided that the distributed network name is the appropriate connectivity option for your HADR solution.Configured your Always On availability group.Installed the latest version of PowerShell.Identified the unique port that you will use for the DNN listener. The port used for a DNN listener must be unique across all replicas of the availability group or failover cluster instance. No other connection can share the same port.NoteIf you have multiple AGs or FCIs on the same cluster and you use either a DNN or VNN listener, then each AG or FCI needs its own independent connection point.Create scriptUse PowerShell to create the distributed network name (DNN) resource and associate it with your availability group.To do so, follow these steps:Open a text editor, such as Notepad.Copy and paste the following script:param ( [Parameter(Mandatory=$true)][string]$Ag, [Parameter(Mandatory=$true)][string]$Dns, [Parameter(Mandatory=$true)][string]$Port)Write-Host "Add a DNN listener for availability group $Ag with DNS name $Dns and port $Port"$ErrorActionPreference = "Stop"# create the DNN resource with the port as the resource nameAdd-ClusterResource -Name $Port -ResourceType "Distributed Network Name" -Group $Ag # set the DNS name of the DNN resourceGet-ClusterResource -Name $Port | Set-ClusterParameter -Name DnsName -Value $Dns # start the DNN resourceStart-ClusterResource -Name $Port$Dep = Get-ClusterResourceDependency -Resource $Agif ( $Dep.DependencyExpression
2025-04-07Receive operations. SEND_BUF_SIZEUse the SEND_BUF_SIZE parameter to specify buffer space for session send operations. 8.2.1 ADDRESS The protocol ADDRESS parameter’s networking parameter is in the listener.ora file. It specifies the protocol address under the DESCRIPTION parameter for one listener. Purpose Specifies a single listener protocol address in the DESCRIPTION parameter Usage Notes Use this parameter to define the protocol, the host, and the port number for the listener. Examplelistener_name= (DESCRIPTION= (ADDRESS_LIST= (ADDRESS=(PROTOCOL=tcp)(HOST=hr-server)(PORT=1521)) (ADDRESS=(PROTOCOL=tcp)(HOST=sales-server)(PORT=1521)))) 8.2.2 DESCRIPTION DESCRIPTION networking parameter of the listener.ora file contains listener protocol addresses. Purpose To contain listener protocol addresses. Example 8-2 Examplelistener_name= (DESCRIPTION= (ADDRESS_LIST= (ADDRESS=(PROTOCOL=tcp)(HOST=hr-server)(PORT=1521)) (ADDRESS=(PROTOCOL=tcp)(HOST=sales-server)(PORT=1521)))) 8.2.3 Firewall Purpose It can be set in endpoint to enable firewall functionality. 8.2.4 IP The protocol address parameter IP determine which IP address the listener listens on when a host name is specified Purpose To determine which IP address the listener listens on when a host name is specified. Usage Notes This parameter is only applicable when the HOST parameter specifies a host name. Values first Listen on the first IP address returned by the DNS resolution of the host name. If the user wants the listener to listen on the first IP to which the specified host name resolves, then the address must be qualified with (IP=first). v4_only Listen only on IPv4 addresses. v6_only Listen only on IPv6 addresses. Default This feature is disabled by default. Example listener_name= (DESCRIPTION= (ADDRESS=(PROTOCOL=tcp)(HOST=rancode1-vip)(PORT=1522)(IP=v6_only)) 8.2.5 QUEUESIZE Purpose To specify the number of concurrent connection requests that the listener can accept on a TCP/IP or IPC listening endpoint (protocol address). Usage Notes The number of concurrent connection requests is dependent on the platform and listener usage scenarios. If the listener is heavily-loaded, then set the parameter to a higher number. Put this parameter at the end of the protocol address with its value set to the expected number of concurrent connection requests. Default The default number of concurrent connection requests is operating system specific. Example listener_name= (DESCRIPTION= (ADDRESS=(PROTOCOL=tcp)(HOST=hr-server)(PORT=1521)(QUEUESIZE=20))) 8.2.6 RECV_BUF_SIZE Use the RECV_BUF_SIZE parameter to specify buffer space for session receive operations. Purpose To specify, in bytes, the buffer space for receive operations of
2025-04-11-match '\s*\((.*)\)\s*' ){$DepStr = "$($Matches.1) or [$Port]"}else{$DepStr = "[$Port]"}Write-Host "$DepStr"# add the Dependency from availability group resource to the DNN resourceSet-ClusterResourceDependency -Resource $Ag -Dependency "$DepStr"#bounce the AG resourceStop-ClusterResource -Name $AgStart-ClusterResource -Name $AgSave the script as a .ps1 file, such as add_dnn_listener.ps1.Execute scriptTo create the DNN listener, execute the script passing in parameters for the name of the availability group, listener name, and port.For example, assuming an availability group name of ag1, listener name of dnnlsnr, and listener port as 6789, follow these steps:Open a command-line interface tool, such as command prompt or PowerShell.Navigate to where you saved the .ps1 script, such as c:\Documents.Execute the script: add_dnn_listener.ps1 . For example:c:\Documents> .\add_dnn_listener.ps1 ag1 dnnlsnr 6789Verify listenerUse either SQL Server Management Studio or Transact-SQL to confirm your DNN listener is created successfully.SQL Server Management StudioExpand Availability Group Listeners in SQL Server Management Studio (SSMS) to view your DNN listener:Transact-SQLUse Transact-SQL to view the status of the DNN listener:SELECT * FROM SYS.AVAILABILITY_GROUP_LISTENERSA value of 1 for is_distributed_network_name indicates the listener is a distributed network name (DNN) listener:Update connection stringUpdate the connection string for any application that needs to connect to the DNN listener. The connection string to the DNN listener must provide the DNN port number, and specify MultiSubnetFailover=True in the connection string. If the SQL client does not support the MultiSubnetFailover=True parameter, then it is not compatible with a DNN listener.The following is an example of a connection string for listener name DNN_Listener and port 6789:DataSource=DNN_Listener,6789;MultiSubnetFailover=TrueTest failoverTest failover of the availability group to ensure functionality.To test failover, follow these steps:Connect to the DNN listener or one of the replicas by using SQL Server Management Studio (SSMS).Expand Always On Availability Group in Object Explorer.Right-click the availability group and choose Failover to open the Failover Wizard.Follow the prompts to choose a failover target and fail the availability group over to a secondary replica.Confirm the database is in a synchronized state on the new primary replica.(Optional) Fail back to the original primary, or another secondary replica.Test connectivityTest the connectivity to your DNN listener with these steps:Open SQL Server Management Studio.Connect to your DNN listener.Open a new query window and check which replica you're connected to by running SELECT @@SERVERNAME.Fail the availability group over to another replica.After a reasonable amount of time, run SELECT @@SERVERNAME to confirm your availability group is now hosted on another replica.LimitationsDNN Listeners MUST be configured with a unique port. The port cannot be shared with any other connection on any replica.The client connecting to the DNN listener must support the MultiSubnetFailover=True parameter in the connection string.There might be additional considerations when you're working with other SQL Server features and an availability group with a DNN. For more information, see AG with DNN interoperability.Port considerationsDNN listeners are designed to listen on all IP addresses, but on a specific, unique port. The DNS entry for the listener name should resolve to the addresses of all replicas in the availability group. This is done automatically with the PowerShell script provided in the Create Script section.
2025-04-14Since DNN listeners accept connections on all IP addresses, it is critical that the listener port be unique, and not in use by any other replica in the availability group. Since SQL Server listens on port 1433 by default, either directly or via the SQL Browser service, using port 1433 for the DNN listener is strongly discouraged.If the listener port chosen for the VNN listener is between 49,152 and 65,536 (the default dynamic port range for TCP/IP, add an exclusion for this. Doing so will prevent other systems from being dynamically assigned the same port.You can add a port exclusion with the following command:netsh int ipv4 add excludedportrange tcp startport= numberofports=1 store=persistentNext stepsOnce the availability group is deployed, consider optimizing the HADR settings for SQL Server on Azure VMs.To learn more, see:Windows Server Failover Cluster with SQL Server on Azure VMsAlways On availability groups with SQL Server on Azure VMsAlways On availability groups overview --> Feedback Additional resources In this article
2025-03-25