Check the connection between a client computer and Administration Server manually. Klnagchk utility
14 June 2022
ID 127690
Check the connection between a remote computer and Administration Server
After Network Agent has been installed, the klnagchk utility is located in the /Library/Application Support/Kaspersky Lab/klnagent/Binaries folder.
Depending on the parameters that you specify, the klnagchk utility performs the following operations when run from the command line:
- Displays the settings specified for the connection between Network Agent installed on the remote computer and Administration Server, or saves them in a file.
- Saves Network Agent statistics (since the last startup of Network Agent) and utility execution results in a file, or displays this information on the screen.
- Tries to establish a connection between Network Agent and Administration Server.
- If the utility can't establish a connection, it sends an ICMP packet to check the status of the computer on which Administration Server is installed.
Before running the utility, go to /Library/Application Support/Kaspersky Lab/klnagent/Binaries in the command line.
Command syntax:
sudo ./klnagchk [-logfile <file name>] [-sp] [-savecert <path to certificate file>] [-restart]
Important: Administrator rights are required to run the utility.
Parameter descriptions
-logfile <file name>
– Save the settings of the connection between Network Agent and Administration Server and utility execution results in a file. If this parameter is not specified, the server connection settings, execution results, and error messages are displayed on the screen.
-sp
– Display the password for proxy server authentication on the screen or save it in a file. This parameter is used if Network Agent connects to Administration Server via a proxy server. By default, this parameter is not used.
-savecert <file name>
– Save the certificate for authentication on Administration Server in a specified file.
-restart
– Restart Network Agent after the utility finishes running.
Example: sudo ./klnagchk -logfile klnagchk.log -sp
|