Customizing the Data Protector Environment

Firewall Support

Table 11-3

Connecting Component

Listening Component

 

 

 

 

Process

Port

Process

Port

 

 

 

 

Application Agent

N/Aa

Inet on CM

5555

 

N/Aa

CRS

Dynamic

 

N/Aa

RSM

Dynamic

 

 

 

 

 

N/Aa

BSM

Dynamic

 

 

 

 

 

N/Aa

xMA-NET

Dynamic

 

 

 

 

a.The source port of a connection is always assigned by the operating system and cannot be limited to a specific range.

b.To be more precise, it is the Inet process that accepts the connection on port 5555 and then starts the requested agent process. The agent process inherits the connection.

c.This applies only to the MMD on the system running the CMMDB in a Manager-of-Managers (MoM) environment.

d.Only for backup sessions with the reconnect feature enabled.

e.Connections to the Utility Media Agent (UMA) are only required when sharing a library across several systems.

Examples of Configuring Data Protector in Firewall

Environments

The following section provides examples on how to configure Data

Protector in four different firewall environments.

Example 1: Disk Agent and Media Agent Installed Outside, Other Components Installed Inside a Firewall

You can configure your backup environment so that the Cell Manager and GUI are in the intranet and some Disk Agents and Media Agents are in the Demilitarized Zone (DMZ):

Chapter 11

535

Page 565
Image 565
HP B6960-90078 manual