[Last Call] Learn about multicloud storage options and how to improve your company's cloud strategy. Register Now

x
?
Solved

Required Ports for Ghost Console to be able to capture and blast images from client machines with McAfee 8.5.0i

Posted on 2008-10-10
4
Medium Priority
?
947 Views
Last Modified: 2013-12-09
What ports are required to be open for the Ghost Console and Client to communicate, capture and transfer images over a network using Ghost Solution Suite 2.5 when working with McAfee 8.5.0i clients managed with EPO?
0
Comment
Question by:tc100years
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 8

Expert Comment

by:TDKD
ID: 22689197
I may be reading your question incorrectly, but if you are trying to Multicast Images accross a network It should'nt matter, I have a Ghost server setup on a network that Multicasts/Broadcasts, and all I do is create a disk. I stick the disk in each PC I want to Image, start the PC in question and the Multicast session connects to the Ghost Server.
0
 

Author Comment

by:tc100years
ID: 23069914
The solution to this problem involed permiting ghostsrv.exe as exempted in the prevent IRC communcation settings of our protection server in the standard protection rule set.

This didn't permit the remote installation of the agent which is still blocked by the firewall but that should work if tcp and udp traffic is permitted on 137, 1346, 1347, 6666 and 7777.
0
 

Accepted Solution

by:
ee_auto earned 0 total points
ID: 23268780
Question PAQ'd, 125 points not refunded, and stored in the solution database.
0

Featured Post

Are You Ready for GDPR?

With the GDPR deadline set for May 25, 2018, many organizations are ill-prepared due to uncertainty about the criteria for compliance. According to a recent WatchGuard survey, a staggering 37% of respondents don't even know if their organization needs to comply with GDPR. Do you?

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.
VM backup deduplication is a method of reducing the amount of storage space needed to save VM backups. In most organizations, VMs contain many duplicate copies of data, such as VMs deployed from the same template, VMs with the same OS, or VMs that h…
This tutorial will walk an individual through the process of installing of Data Protection Manager on a server running Windows Server 2012 R2, including the prerequisites. Microsoft .Net 3.5 is required. To install this feature, go to Server Manager…
This tutorial will show how to configure a single USB drive with a separate folder for each day of the week. This will allow each of the backups to be kept separate preventing the previous day’s backup from being overwritten. The USB drive must be s…

650 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question