![]() 3777) are being denied by my default firewall rule. 3776) to the isaserver (UDP 2161) is allowed, however, immediately following that I'm seeing connections from the isaserver (UDP 2161) to the powerchute server (random source port (from above) + 1, i.e. If I monitor the traffic, i see that the initial connection from the powerchute server (random source port, i.e. ![]() ![]() I've created 2 other custom protocols (TCP 2161 Outbound) and (UDP 2161 Send) and created a rule to allow these protocols from my internal network to localhost (ISAserver), but it doesn't seem to work. That rule works fine and I'm able to access the web console for the agent.Īs for the populating the agent to my powerchute console, the discovery of the agent on the ISAserver seems to be failing. I create a protocol for the powerchute agent web console (TCP 3052 Outbound) and created a rule to allow this protocol from my internal network to localhost (ISAserver). Anyway, I have created custom protocols, but I'm guessing I goofed somewhere. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |