Configuring Inbound Rules for the Windows Firewall Function

If the Windows firewall function is enabled after the ATIC is installed, all packets sent to the firewall will be discarded. To resolve this problem, you can configure exception port numbers for the Windows firewall function to allow connection establishment before enabling the ATIC service.

Context

NOTE:
The port numbers added in the following operations are basic port numbers for ATIC services. If there are other service requirements, add the related port numbers as exception ports of the Windows firewall function according to the Communication Matrix port list in the product documentation. For the meanings of the following ports, see Communication Matrix. If an actually used port is different from the port list in the communication matrix, add the port as an exception.

If the ATIC is deployed in centralized mode, you must configure inbound rules for the Windows firewall function on the ATIC server.

If the ATIC is deployed in distributed mode, you must configure inbound rules for the Windows firewall function on both the ATIC server and collector.

Procedure

  1. Click Control Panel and then Windows Firewall.
  2. Click Advanced settings on the left side.

  3. Select Inbound Rules from the navigation tree and click New Rules....

  4. Select Port and click Next.

  5. Add UDP ports 9110, 9112, 9114, 514, and 162.

  6. Select Allow Connections.
  7. Click Next until the configuration is complete.
  8. Repeat steps 1 to 6 to allow TCP ports 3389, 8080, and 443.

    NOTE:
    For the distributed ATIC, you also need to configure ports 10098 and 10099 as exceptions.


Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.