[Last Call] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Required Ports for Ghost Console to be able to capture and blast images from client machines with McAfee 8.5.0i

Posted on 2008-10-10
4
Medium Priority
?
949 Views
Last Modified: 2013-12-09
What ports are required to be open for the Ghost Console and Client to communicate, capture and transfer images over a network using Ghost Solution Suite 2.5 when working with McAfee 8.5.0i clients managed with EPO?
0
Comment
Question by:tc100years
3 Comments
 
LVL 8

Expert Comment

by:TDKD
ID: 22689197
I may be reading your question incorrectly, but if you are trying to Multicast Images accross a network It should'nt matter, I have a Ghost server setup on a network that Multicasts/Broadcasts, and all I do is create a disk. I stick the disk in each PC I want to Image, start the PC in question and the Multicast session connects to the Ghost Server.
0
 

Author Comment

by:tc100years
ID: 23069914
The solution to this problem involed permiting ghostsrv.exe as exempted in the prevent IRC communcation settings of our protection server in the standard protection rule set.

This didn't permit the remote installation of the agent which is still blocked by the firewall but that should work if tcp and udp traffic is permitted on 137, 1346, 1347, 6666 and 7777.
0
 

Accepted Solution

by:
ee_auto earned 0 total points
ID: 23268780
Question PAQ'd, 125 points not refunded, and stored in the solution database.
0

Featured Post

Get quick recovery of individual SharePoint items

Free tool – Veeam Explorer for Microsoft SharePoint, enables fast, easy restores of SharePoint sites, documents, libraries and lists — all with no agents to manage and no additional licenses to buy.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Microservice architecture adoption brings many advantages, but can add intricacy. Selecting the right orchestration tool is most important for business specific needs.
Your data is at risk. Probably more today that at any other time in history. There are simply more people with more access to the Web with bad intentions.
This tutorial will walk an individual through the process of configuring basic necessities in order to use the 2010 version of Data Protection Manager. These include storage, agents, and protection jobs. Launch Data Protection Manager from the deskt…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…

834 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question