Solved

Backup Servers on DMZ

Posted on 2009-04-08
2
640 Views
Last Modified: 2013-12-01
I am trying to back up 2 servers that are on my DMZ.  The ports that are open on the firewall (between LAN to DMZ are:  1434 (MS SQL named), 6101 (BU Exec Agent Browser), 10000 (BU Exec Remote Agent), 3527 (BU Exec Server) and 1125 (BU Exec SQL).  

The Symantec Backup Exec 11d is installed on a MS Server 2003 Server Standard and is located on the LAN.

I know I'm missing something on firewall - if I open up all ports then of course the backup works.  But I'm sure other people have to backup servers on the DMZ but I am at a loss as to what I'm missing.
On the Backup Exec 11.d server I have Enabled remote agent TCP dynamic port range of:  1025 - 10000  (This can be found under Job Defaults, Network and Security)

I always get "A communications failure has occurred."  All my servers on the LAN back up ok - it's just the ones on the DMZ.
0
Comment
Question by:sylvieann
2 Comments
 
LVL 5

Accepted Solution

by:
50centos earned 250 total points
ID: 24101002
What is your Firewall? You can temporarily create a rule:
BEX Media Server --> ANY --> DMZ Servers
Then find out what ports BEX used to successfully ran a backup job to your DMZ Servers.
0
 

Author Comment

by:sylvieann
ID: 24172357
I found that I was missing port 1025
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

By default, Carbonite Server Backup manages your encryption key for you using Advanced Encryption Standard (AES) 128-bit encryption. If you choose to manage your private encryption key, your backups will be encrypted using AES 256-bit encryption.
Microservice architecture adoption brings many advantages, but can add intricacy. Selecting the right orchestration tool is most important for business specific needs.
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…
This tutorial will walk an individual through the process of configuring basic necessities in order to use the 2010 version of Data Protection Manager. These include storage, agents, and protection jobs. Launch Data Protection Manager from the deskt…

896 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now