Solved

Required Ports for Ghost Console to be able to capture and blast images from client machines with McAfee 8.5.0i

Posted on 2008-10-10
4
944 Views
Last Modified: 2013-12-09
What ports are required to be open for the Ghost Console and Client to communicate, capture and transfer images over a network using Ghost Solution Suite 2.5 when working with McAfee 8.5.0i clients managed with EPO?
0
Comment
Question by:tc100years
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 8

Expert Comment

by:TDKD
ID: 22689197
I may be reading your question incorrectly, but if you are trying to Multicast Images accross a network It should'nt matter, I have a Ghost server setup on a network that Multicasts/Broadcasts, and all I do is create a disk. I stick the disk in each PC I want to Image, start the PC in question and the Multicast session connects to the Ghost Server.
0
 

Author Comment

by:tc100years
ID: 23069914
The solution to this problem involed permiting ghostsrv.exe as exempted in the prevent IRC communcation settings of our protection server in the standard protection rule set.

This didn't permit the remote installation of the agent which is still blocked by the firewall but that should work if tcp and udp traffic is permitted on 137, 1346, 1347, 6666 and 7777.
0
 

Accepted Solution

by:
ee_auto earned 0 total points
ID: 23268780
Question PAQ'd, 125 points not refunded, and stored in the solution database.
0

Featured Post

[Webinar] How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Workplace bullying has increased with the use of email and social media. Retain evidence of this with email archiving to protect your employees.
Ransomware continues to be a growing problem for both personal and business users alike and Antivirus companies are still struggling to find a reliable way to protect you from this dangerous threat.
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question