Sun Java System Application Server 9.1 High Availability Administration Guide

ProcedureTo Edit the Node Agent’s Listener for JMX

The node agent uses JMX to communicate with the Domain Administration Server. Therefore it must have a port to listen on for JMX requests, and other listener information.

  1. In the tree component, expand the Node Agents node.

  2. Select the node agent configuration to edit.

  3. Click the JMX tab.

  4. In the Address field, enter an IP address or host name.

    Enter if the listener listens on all IP addresses for the server using a unique port value. Otherwise, enter a valid IP address for the server.

  5. In the Port field, type the port on which the node agent’s JMX connector will listen.

    If the IP address is, the port number must be unique.

  6. In the JMX Protocol field, type the protocol that the JMX connector supports.

    The default is rmi_jrmp.

  7. Click the checkbox next to Accept All Addresses to allow a connection to all IP addresses.

    The node agent listens on a specific IP address associated to a network card or listens on all IP addresses. Accepting all addresses puts the value in the “listening host address” property.

  8. In the Realm Name field, type the name of the realm that handles authentication for the listener.

    In the Security section of this page, configure the listener to use SSL, TLS, or both SSL and TLS security.

    To set up a secure listener, do the following:

  9. Check the Enabled box in the Security field.

    Security is enabled by default.

  10. Set client authentication.

    To require clients to authenticate themselves to the server when using this listener, check the Enabled box in the Client Authentication field.

  11. Enter a certificate nickname.

    Enter the name of an existing server keypair and certificate in the Certificate NickName field.

    For information about working with certificates and SSL, see the Admin Console online help.

  12. In the SSL3/TLS section:

    1. Check the security protocol(s) to enable on the listener.

      You must check either SSL3 or TLS, or both protocols.

    2. Check the cipher suite used by the protocol(s).

      To enable all cipher suites, check All Supported Cipher Suites.

  13. Click Save.