Windows
Some operating systems including Windows XP with Service Pack 2 and Windows Server 2003 SBS implement a firewall that prevents browsers from accessing the ports required for the HP VCRM access. To resolve this issue, configure the firewall with exceptions to enable browsers to access the ports used by HP SIM and HP VCRM.
![]() | NOTE: For Windows XP with Service Pack 2, the firewall configuration leaves the default SP2 security enhancements intact, but enables traffic over the ports. These ports are required for the HP VCRM to run. The secure and insecure ports must be added to enable proper communication with your browser. |
To configure the firewall settings, double-click Windows Firewall.
Enter the following product name and the port number information.
Add the exceptions listed in the following table to the firewall protection:
Click OK to save your settings and close the Add a Port dialog box.
Click OK to save your settings and close the Windows Firewall dialog box.
Linux
Configuring firewalls varies, depending on the version of Linux installed.
Red Hat Enterprise Linux 4, 5, and 6
The following displays an example of iptables
firewall rules for Red Hat Enterprise Linux 4 and 5 in the /etc/sysconfig/iptables
file:
# Firewall configuration written
by redhat-config-securitylevel
# Manual customization of this
file is not recommended.
-A INPUT -j RH-Firewall-1-INPUT
-A FORWARD -j RH-Firewall-1-INPUT
-A RH-Firewall-1-INPUT -i lo
-j ACCEPT
-A RH-Firewall-1-INPUT -p icmp
--icmp-type any -j ACCEPT
-A RH-Firewall-1-INPUT -p 50
-j ACCEPT
-A RH-Firewall-1-INPUT -p 51
-j ACCEPT
-A RH-Firewall-1-INPUT -m state
--state ESTABLISHED,RELATED -j ACCEPT
-A RH-Firewall-1-INPUT -m state
--state NEW -m tcp -p tcp --dport 80 -j ACCEPT
-A RH-Firewall-1-INPUT -m state
--state NEW -m tcp -p tcp --dport 21 -j ACCEPT
-A RH-Firewall-1-INPUT -m state
--state NEW -m tcp -p tcp --dport 22 -j ACCEPT
-A RH-Firewall-1-INPUT -j REJECT
--reject-with icmp-host-prohibited
The following displays the new value in the iptables
firewall rules for Red Hat Enterprise Linux 4 and 5 that allows access
to HP SMH in the /etc/sysconfig/iptables
file:
# Firewall configuration written
by redhat-config-securitylevel
# Manual customization of this
file is not recommended.
-A INPUT -j RH-Firewall-1-INPUT
-A FORWARD -j RH-Firewall-1-INPUT
-A RH-Firewall-1-INPUT -i lo
-j ACCEPT
-A RH-Firewall-1-INPUT -p icmp
--icmp-type any -j ACCEPT
-A RH-Firewall-1-INPUT -p 50
-j ACCEPT
-A RH-Firewall-1-INPUT -p 51
-j ACCEPT
-A RH-Firewall-1-INPUT -m state
--state ESTABLISHED,RELATED -j ACCEPT
-A RH-Firewall-1-INPUT -m state
--state NEW -m tcp -p tcp --dport 80 -j ACCEPT
-A RH-Firewall-1-INPUT -m state
--state NEW -m tcp -p tcp --dport 21 -j ACCEPT
-A RH-Firewall-1-INPUT -m state
--state NEW -m tcp -p tcp --dport 22 -j ACCEPT
-A RH-Firewall-1-INPUT -m state
--state NEW -m tcp -p tcp --dport 2301 -j ACCEPT
-A RH-Firewall-1-INPUT -m state
--state NEW -m tcp -p tcp --dport 2381 -j ACCEPT
-A RH-Firewall-1-INPUT -j REJECT
--reject-with icmp-host-prohibited
SUSE Linux Enterprise Server 9 and 10 firewalls are configured using the YAST2 utility.
Using the YAST2 utility, select Security & Users⇒Firewall.
The Firewall Configuration (Step 1 of 4): Basic Settings window appears.
-
The Firewall Configuration (Step 2 of 4): Services window appears.
In the Additional Services field, enter 2301:2381, and then click Next.
The Firewall Configuration (Step 3 of 4): Features window appears.
-
The Firewall Configuration (Step 4 of 4): Logging Options window appears.
-
A dialog box appears asking you to confirm your intention to save settings and active firewall.
Getting started |
Signing in |
Automatically importing certificates |
Signing out |
HP SMH pages |