Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

How do I setup access for WMI from Windows 2003 to Windows 2003 through a firewall?

Posted on 2006-10-26
5
Medium Priority
?
1,012 Views
Last Modified: 2013-12-04
I have a monitor machine (Server A xxx.xxx.xxx.xxx) that needs to connect to a different server (Server B yyy.yyy.yyy.yyy).
Both machines are behind firewalls. Both machines have their own public ips but use NAT to a private IP.

I need to know what ports I need open on each firewall and what settings I need to change on each server.

Thanks in advance!
0
Comment
Question by:periker
  • 2
5 Comments
 
LVL 66

Expert Comment

by:johnb6767
ID: 17815693
I dont think WMI uses actual ports, but the the Admin Shares or else an application destined to accept WMI calls. What apps are you trying to communicate to?
0
 
LVL 66

Accepted Solution

by:
johnb6767 earned 252 total points
ID: 17815736
Domain and Forest Trust Tools and Settings
http://technet2.microsoft.com/WindowsServer/en/library/108124dd-31b1-4c2c-9421-6adbc1ebceca1033.mspx?mfr=true

Did find this though...
Enabling WMI Connectivity with Windows Firewall 'On'
http://spyxkb.stbernard.com/webhelp/Troubleshooting/Tasks/WMI/SX0038.htm

The proccesses that WMI use are primarilty RPC and DCOM, which travel on 135 I believe....
0
 
LVL 38

Assisted Solution

by:Rich Rumble
Rich Rumble earned 248 total points
ID: 17816115
Well to get to the admin shares you can/do use ports port 135, 137-139 and or port 445. Your firewalls can allow this_IP from this_port to that_IP to that_IP
I'd use port 445, only allow this IP to that IP, so that others can't see that port 445 is open.
http://www.grc.com/port_445.htm (see the "related ports" links also)
-rich
0
 
LVL 1

Expert Comment

by:Computer101
ID: 21091586
Forced accept.

Computer101
EE Admin
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
Integration Management Part 2
Are you ready to place your question in front of subject-matter experts for more timely responses? With the release of Priority Question, Premium Members, Team Accounts and Qualified Experts can now identify the emergent level of their issue, signal…

886 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question