Configuring firewall settings

Windows

Some operating systems including Windows XP with Service Pack 2 and Windows Server 2003 SBS implement a firewall that prevents browsers from accessing the ports required for the HPE VCRM access. To resolve this issue, configure the firewall with exceptions to enable browsers to access the ports used by HPE SIM and HPE VCRM.


[NOTE: ]

NOTE: For Windows XP with Service Pack 2, the firewall configuration leaves the default SP2 security enhancements intact, but enables traffic over the ports. These ports are required for the HPE VCRM to run. The secure and insecure ports must be added to enable proper communication with your browser.


To configure the firewall:

  1. Select StartSettingsControl Panel.

  2. To configure the firewall settings, double-click Windows Firewall.

  3. Select Exceptions.

  4. Click Add Port.

  5. Enter the following product name and the port number information.

    Add the exceptions listed in the following table to the firewall protection:

    Firewall exceptions

    Product Port Number
    HPE SMH Insecure Port: 2301
    HPE SMH Secure Port: 2381
  6. Click OK to save your settings and close the Add a Port dialog box.

  7. Click OK to save your settings and close the Windows Firewall dialog box.

Linux

Configuring firewalls varies, depending on the version of Linux installed.

Red Hat Enterprise Linux 4, 5, and 6

The following displays an example of iptables firewall rules for Red Hat Enterprise Linux 4, 5, and 6 in the /etc/sysconfig/iptables file:

# Firewall configuration written by redhat-config-securitylevel

# Manual customization of this file is not recommended.

*filter

:INPUT ACCEPT [0:0]

:FORWARD ACCEPT [0:0]

:OUTPUT ACCEPT [0:0]

:RH-Firewall-1-INPUT - [0:0]

-A INPUT -j RH-Firewall-1-INPUT

-A FORWARD -j RH-Firewall-1-INPUT

-A RH-Firewall-1-INPUT -i lo -j ACCEPT

-A RH-Firewall-1-INPUT -p icmp --icmp-type any -j ACCEPT

-A RH-Firewall-1-INPUT -p 50 -j ACCEPT

-A RH-Firewall-1-INPUT -p 51 -j ACCEPT

-A RH-Firewall-1-INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT

-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 80 -j ACCEPT

-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 21 -j ACCEPT

-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT

-A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited

COMMIT

The following displays the new value in the iptables firewall rules for Red Hat Enterprise Linux 4 and 5 that allows access to HPE SMH in the /etc/sysconfig/iptables file:

# Firewall configuration written by redhat-config-securitylevel

# Manual customization of this file is not recommended.

*filter

:INPUT ACCEPT [0:0]

:FORWARD ACCEPT [0:0]

:OUTPUT ACCEPT [0:0]

:RH-Firewall-1-INPUT - [0:0]

-A INPUT -j RH-Firewall-1-INPUT

-A FORWARD -j RH-Firewall-1-INPUT

-A RH-Firewall-1-INPUT -i lo -j ACCEPT

-A RH-Firewall-1-INPUT -p icmp --icmp-type any -j ACCEPT

-A RH-Firewall-1-INPUT -p 50 -j ACCEPT

-A RH-Firewall-1-INPUT -p 51 -j ACCEPT

-A RH-Firewall-1-INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT

-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 80 -j ACCEPT

-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 21 -j ACCEPT

-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT

-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 2301 -j ACCEPT

-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 2381 -j ACCEPT

-A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited

COMMIT

SUSE Linux Enterprise Server

SUSE Linux Enterprise Server 9 and 10 firewalls are configured using the YAST2 utility.

To configure the firewall:

  1. Using the YAST2 utility, select Security & UsersFirewall.

    The Firewall Configuration (Step 1 of 4): Basic Settings window appears.

  2. Click Next.

    The Firewall Configuration (Step 2 of 4): Services window appears.

  3. In the Additional Services field, enter 2301:2381, and then click Next.

    The Firewall Configuration (Step 3 of 4): Features window appears.

  4. Click Next.

    The Firewall Configuration (Step 4 of 4): Logging Options window appears.

  5. Click Next.

    A dialog box appears asking you to confirm your intention to save settings and active firewall.

  6. Click Continue.

    The firewall is configured and your settings are saved.

Related Topics

Getting started
Signing in
Automatically importing certificates
Signing out
HPE SMH pages