Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

How to configure a firewall rule to let you deploy the System Center Data Protection Manager agent to a computer that is running ISA Server


View products that this article applies to.

Introduction

This article describes how to configure a firewall rule to let you deploy the Microsoft System Center Data Protection Manager agent to a computer that is running Microsoft Internet Security and Acceleration (ISA) Server.

↑ Back to the top


More information

To configure a firewall rule that lets you deploy the Data Protection Manager agent to an ISA Server computer, follow these steps:
  1. Start the ISA Server Management Microsoft Management Console (MMC) snap-in.
  2. Expand Arrays if you have an array configured, expand the ISA Server computer, and then click Firewall Policy.
  3. On the View menu, click Show System Policy Rules.
  4. Disable the Allow remote management from selected computers using MMC system policy rule. To do this, follow these steps:
    1. Double-click Allow remote management from selected computers using MMC.
    2. In the System Policy Editor dialog box, click to clear the Enable check box, and then click OK.
    3. Click Apply to update the firewall configuration, and then click OK.
  5. Remove strict remote procedure call (RPC) compliance from System Policy rule 22. To do this, follow these steps:
    1. Double-click the Allow RPC from ISA server to trusted servers system policy rule.
    2. In the System Policy Editor dialog box, click to clear the Enforce strict RPC compliance check box, and then click OK.
    3. Click Apply to update the firewall configuration, and then click OK.
  6. On the View menu, click Show System Policy Rules to hide System Policy rules.
  7. Click the Tasks tab in the right pane, and then click Create New Access Rule.

    Note If you are running ISA Server 2004, Enterprise Edition, click Create Array Access Rule.
  8. In the New Access Rule Wizard, type a descriptive name in the Name box. For example, type DPM.
  9. Click Next, click Allow, click Next, click All outbound traffic in the This rule applies to list, and then click Next.
  10. On the Access Rule Sources page, click Add.
  11. In the Add Network Entities dialog box, click Computer on the New menu, type the name of the Data Protection Manager 2006 server in the Name box, type the IP address of the Data Protection Manager 2006 server in the Computer IP Address box, and then click OK.
  12. In the Add Network Entities dialog box, expand Computers, click the new computer entry that you created, and then click Add.

    Note If you want to manage the ISA Server computer by using Remote Desktop Protocol or by using the ISA Server Management MMC snap-in from another computer, you can add those other computers to this rule. To do this, follow steps 10 through 12 for each computer that you want to add.

    Expand Networks, click Local Host, click Add, and then click Close.

    At a minimum, the This rule applies to traffic from these sources box should contain the Data Protection Manager 2006 computer entry and the Local Host entry.
  13. Click Next, and then click Add.
  14. In the Add Network Entities dialog box, expand Computers, click the Data Protection Manager 2006 computer entry, click Add, expand Networks, click Local Host, click Add, and then click Close. The Data Protection Manager 2006 computer entry and the Local Host entry are listed in the This rule applies to traffic sent to these destinations box.
  15. Click Next, leave the default All Users entry in the This rule applies to requests from the following user sets box, click Next, and then click Finish.
  16. Right-click the new rule, and then click Move Up to move this rule to the top of the rules list in the firewall policy rules. This configuration causes the rule to be matched before other rules are applied to traffic that is sent to or received from the Data Protection Manager 2006 server.
  17. Right-click the new rule, and then click Properties.
  18. In the RuleName Properties dialog box, click the Protocols tab, click Filtering, and then click Configure RPC Protocol.
  19. In the Configure RPC Protocol policy dialog box, click to clear the Enforce strict RPC compliance check box, and then click OK two times.
  20. Click Apply to update the firewall policy, and then click OK.

↑ Back to the top


Keywords: KB929102, kbinfo, kbhowto, kbdeployment

↑ Back to the top

Article Info
Article ID : 929102
Revision : 2
Created on : 10/31/2008
Published on : 10/31/2008
Exists online : False
Views : 412