From: Michael Friedrich Date: Mon, 18 Sep 2017 14:25:29 +0000 (+0200) Subject: Docs: Add firewall details for check_nscp_api X-Git-Tag: v2.7.1~8 X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=5f7e59d92b3448904de4968f64b9b6d7045255fe;p=icinga2 Docs: Add firewall details for check_nscp_api refs #5582 --- diff --git a/doc/06-distributed-monitoring.md b/doc/06-distributed-monitoring.md index 266077565..70ffe62ef 100644 --- a/doc/06-distributed-monitoring.md +++ b/doc/06-distributed-monitoring.md @@ -2066,16 +2066,26 @@ function ensures to only create services for the master nodes. ### Windows Firewall +#### ICMP Requests + By default ICMP requests are disabled in the Windows firewall. You can change that by [adding a new rule](https://support.microsoft.com/en-us/kb/947709). C:\WINDOWS\system32>netsh advfirewall firewall add rule name="ICMP Allow incoming V4 echo request" protocol=icmpv4:8,any dir=in action=allow +#### Icinga 2 + If your master/satellite nodes should actively connect to the Windows client you'll also need to ensure that port `5665` is enabled. C:\WINDOWS\system32>netsh advfirewall firewall add rule name="Open port 5665 (Icinga 2)" dir=in action=allow protocol=TCP localport=5665 +#### NSClient++ API + +If the [check_nscp_api](06-distributed-monitoring.md#distributed-monitoring-windows-nscp-check-api) +plugin is used to query NSClient++ remotely, you need to ensure that its port is enabled. + + C:\WINDOWS\system32>netsh advfirewall firewall add rule name="Open port 8443 (NSClient++ API)" dir=in action=allow protocol=TCP localport=8443 ### Windows Client and Plugins