From 5f7e59d92b3448904de4968f64b9b6d7045255fe Mon Sep 17 00:00:00 2001 From: Michael Friedrich Date: Mon, 18 Sep 2017 16:25:29 +0200 Subject: [PATCH] Docs: Add firewall details for check_nscp_api refs #5582 --- doc/06-distributed-monitoring.md | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/doc/06-distributed-monitoring.md b/doc/06-distributed-monitoring.md index 266077565..70ffe62ef 100644 --- a/doc/06-distributed-monitoring.md +++ b/doc/06-distributed-monitoring.md @@ -2066,16 +2066,26 @@ function ensures to only create services for the master nodes. ### Windows Firewall +#### ICMP Requests + By default ICMP requests are disabled in the Windows firewall. You can change that by [adding a new rule](https://support.microsoft.com/en-us/kb/947709). C:\WINDOWS\system32>netsh advfirewall firewall add rule name="ICMP Allow incoming V4 echo request" protocol=icmpv4:8,any dir=in action=allow +#### Icinga 2 + If your master/satellite nodes should actively connect to the Windows client you'll also need to ensure that port `5665` is enabled. C:\WINDOWS\system32>netsh advfirewall firewall add rule name="Open port 5665 (Icinga 2)" dir=in action=allow protocol=TCP localport=5665 +#### NSClient++ API + +If the [check_nscp_api](06-distributed-monitoring.md#distributed-monitoring-windows-nscp-check-api) +plugin is used to query NSClient++ remotely, you need to ensure that its port is enabled. + + C:\WINDOWS\system32>netsh advfirewall firewall add rule name="Open port 8443 (NSClient++ API)" dir=in action=allow protocol=TCP localport=8443 ### Windows Client and Plugins