Improve company productivity with a Business Account.Sign Up

x
?
Solved

Server is  blocking port 1205

Posted on 2009-04-13
6
Medium Priority
?
399 Views
Last Modified: 2013-12-09
I installed sysmantec endpoint protection this weekend and now users can't access ACT DB and it uses port 1205.
I have used the clean wipe utilitly on the server that is hosting the DB and on one WS and still can't access the DB.
I don't want to remove the protection manager untill I can restart the server.
Is there any way to find the port 1205 and allow it in SBS 2008 or Symantec?
0
Comment
Question by:calitech
  • 3
  • 3
6 Comments
 
LVL 30

Expert Comment

by:Mike Lazarus
ID: 24132338
What version of ACT!?
Are you trying to access a local database, network database or sync server?
0
 

Author Comment

by:calitech
ID: 24132386
ACT 2009
Network DB
0
 
LVL 30

Expert Comment

by:Mike Lazarus
ID: 24132615
The port you want to open is 1433. What made you think it's 1205?
0
Building an Effective Phishing Protection Program

Join Director of Product Management Todd OBoyle on April 26th as he covers the key elements of a phishing protection program. Whether you’re an old hat at phishing education or considering starting a program -- we'll discuss critical components that should be in any program.

 
LVL 30

Accepted Solution

by:
Mike Lazarus earned 2000 total points
ID: 24132643
While I can't help with SEP, this would give you the details for Windows firewall:

http://kb.sagesoftwareonline.com/cgi-bin/sagesoftwareonline.cfg/php/enduser/std_adp.php?p_faqid=19420
0
 

Author Comment

by:calitech
ID: 24133217
ACT support told me it was 1205. Shows what they know! LOL

Thanks for your input. I was able to get it working by disabling the firewall on the server using the registry edit and set it to 0 and restarted.

This will only be temporary untill I can get it all worked out.
0
 

Author Closing Comment

by:calitech
ID: 31569625
Thanks
0

Featured Post

Building an Effective Phishing Protection Program

Join Director of Product Management Todd OBoyle on April 26th as he covers the key elements of a phishing protection program. Whether you’re an old hat at phishing education or considering starting a program -- we'll discuss critical components that should be in any program.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

This article investigates the question of whether a computer can really be cleaned once it has been infected, and what the best ways of cleaning a computer might be (in this author's opinion).
This is a very interesting topic. Ransomware has been around for a while but has increased drastically over the last year or so.
Progress
Introduction to Processes

589 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question