From: Michael Friedrich Date: Mon, 18 Sep 2017 14:25:29 +0000 (+0200) Subject: Docs: Add firewall details for check_nscp_api X-Git-Tag: v2.8.0~83^2 X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=549ab29876eaa8a37c49a9ce37d1485ef3f517d0;p=icinga2 Docs: Add firewall details for check_nscp_api --- diff --git a/doc/06-distributed-monitoring.md b/doc/06-distributed-monitoring.md index f7076af8b..957acb870 100644 --- a/doc/06-distributed-monitoring.md +++ b/doc/06-distributed-monitoring.md @@ -2220,16 +2220,26 @@ function ensures to only create services for the master nodes. ### Windows Firewall +#### ICMP Requests + By default ICMP requests are disabled in the Windows firewall. You can change that by [adding a new rule](https://support.microsoft.com/en-us/kb/947709). C:\WINDOWS\system32>netsh advfirewall firewall add rule name="ICMP Allow incoming V4 echo request" protocol=icmpv4:8,any dir=in action=allow +#### Icinga 2 + If your master/satellite nodes should actively connect to the Windows client you'll also need to ensure that port `5665` is enabled. C:\WINDOWS\system32>netsh advfirewall firewall add rule name="Open port 5665 (Icinga 2)" dir=in action=allow protocol=TCP localport=5665 +#### NSClient++ API + +If the [check_nscp_api](06-distributed-monitoring.md#distributed-monitoring-windows-nscp-check-api) +plugin is used to query NSClient++ remotely, you need to ensure that its port is enabled. + + C:\WINDOWS\system32>netsh advfirewall firewall add rule name="Open port 8443 (NSClient++ API)" dir=in action=allow protocol=TCP localport=8443 ### Windows Client and Plugins