Using Double-Take Through a Firewall



Similar documents
High Availability for Microsoft SQL Server 7.0 Using Double-Take

High Availability for Microsoft SQL Server Using Double-Take 4.x

Domain Controller Failover When Using Active Directory

High Availability for Internet Information Server Using Double-Take 4.x

Cluster to Cluster Failover Using Double-Take

Cluster to Cluster Failover Using Double-Take

High Availability for VMware GSX Server

How to Configure Double-Take on Microsoft Exchange Server

High Availability for Oracle 8 Using Double-Take

High Availability for Exchange Server 5.5 Using Double-Take

High Availability for Oracle 10g Using Double-Take

Double-Take AVAILABILITY

Overview - Using ADAMS With a Firewall

Overview - Using ADAMS With a Firewall

MilsVPN VPN Tunnel Port Translation. Table of Contents Introduction VPN Tunnel Settings...2

Windows Firewall Configuration with Group Policy for SyAM System Client Installation

Double-Take Application Manager User s Guide

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability

Introduction. What is a Remote Console? What is the Server Service? A Remote Control Enabled (RCE) Console

Yale Software Library

F-SECURE MESSAGING SECURITY GATEWAY

Network Load Balancing

ms-help://ms.technet.2005mar.1033/security/tnoffline/security/smbiz/winxp/fwgrppol...

Configuring a Pure-IP SIP Trunk in Lync 2013

Link Load Balancing :50:44 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

Craig Pelkie Bits & Bytes Programming, Inc. craig@web400.com

Troubleshooting This document outlines some of the potential issues which you may encouter while administering an atech Telecoms installation.

freesshd SFTP Server on Windows

This document explains how to enable the SIP option and adjust the levels for the connected radio(s) using the below network example:

Drobo How-To Guide. What You Will Need. Configure Replication for DR Using Double-Take Availability and Drobo iscsi SAN

Hyper-V Replica Essentials

OfficeScan 10 Enterprise Client Firewall Updated: March 9, 2010

SQL Server Mirroring. Introduction. Setting up the databases for Mirroring

SecureIT Plus Firewall Features and Functionality

How To Configure Virtual Host with Load Balancing and Health Checking

How To Block On A Network With A Group Control On A Router On A Linux Box On A Pc Or Ip Access Group On A Pnet 2 On A 2G Router On An Ip Access-Group On A Ip Ip-Control On A Net

WhatsUp Event Alarm v10.x Listener Console User Guide

Windows XP Service Pack 2 Windows Firewall Group Policy Setup for Executive Software Products

Extending Your Availability Group for Disaster Recovery

the client omits the BranchCache identifier from the request message.

MailMarshal SMTP in a Load Balanced Array of Servers Technical White Paper September 29, 2003

Configuring Firewall Settings For Configuration Manager 2012 R2

Double-Take Application Manager User s Guide

Volume SYNAMETRICS TECHNOLOGIES. A Division of IndusSoft Technologies, Inc. DeltaCopy User s Guide

Setup Guide for Exchange Server

CONFIGURING TALKSWITCH FOR RUBICON SERVICE

Basic Exchange Setup Guide

Overview... 1 Requirements Installing Roles and Features Creating SQL Server Database... 9 Setting Security Logins...

Double-Take Replication in the VMware Environment: Building DR solutions using Double-Take and VMware Infrastructure and VMware Server

Implementing Network Address Translation and Port Redirection in epipe

How to Configure Terminal Services for Pro-Watch in Remote Administration Mode (Windows 2000)

Firewall Firewall August, 2003

Automating Server Firewalls

OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version ForeScout Mobile

FAQs: MATRIX NAVAN CNX200. Q: How to configure port triggering?

A-AUTO 50 for Windows Setup Guide

Troubleshooting File and Printer Sharing in Microsoft Windows XP

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

Webinar Information. Title: Websense Remote Filtering Audio information: Dial-in numbers:

Basic instructions for configuring PPP MSSQL Express Firewall Settings for Server 2008 and Windows 7 Operating Systems

Monitor network traffic in the Dashboard tab

1. Server Microsoft FEP Instalation

Configuring MDaemon for High Availability

Network Configuration Settings

SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE

Spam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5

1:1 NAT in ZeroShell. Requirements. Overview. Network Setup

Enterprise Manager. Version 6.2. Installation Guide

Basic Exchange Setup Guide

Configuring the BIG-IP and Check Point VPN-1 /FireWall-1

Installation Troubleshooting Guide

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

How To Connect Xbox 360 Game Consoles to the Router by Ethernet cable (RJ45)?

Hyper-V Replica Broker Configuration Lab By Yung Chou, Microsoft Platform Evangelist,

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.

How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface

Network Agent Quick Start

Microsoft Labs Online

Lab Configure and Test Advanced Protocol Handling on the Cisco PIX Security Appliance

What communication protocols are used to discover Tesira servers on a network?

How to Configure Windows Firewall on a Single Computer

This presentation discusses the new support for the session initiation protocol in WebSphere Application Server V6.1.

Security IIS Service Lesson 6

RSA Authentication Manager 8.1 Planning Guide. Revision 1

ilaw Installation Procedure

Firewall Load Balancing

1.1.3 Versions Verified SIP Carrier status as of 18 Sep 2014 : validated on CIC 4.0 SU6.

Sage HRMS 2012 Sage Employee Self Service. Technical Installation Guide for Windows Server 2003 and Windows Server 2008

Syslog Server Configuration on Wireless LAN Controllers (WLCs)

How To Manage My Smb Ap On Cwm On Pc Or Mac Or Ipad (Windows) On A Pc Or Ipa (Windows 2) On Pc (Windows 3) On An Ipa Or Mac (Windows 5) On Your Pc

Firewall Defaults and Some Basic Rules

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?

Transcription:

Using Double-Take Through a Firewall Using Double-Take Through a Firewall published August 2001 NSI and Double-Take are registered trademarks of Network Specialists, Inc. All other products are trademarks of their respective companies. 1996-2001 NSI Software

Double-Take Support for Application Failover Double-Take s file system replication process is application independent and replicates any file system changes (including permissions and attributes) written to NTFS, FAT or FAT32 file systems by any application or process, subject to specific exceptions called out in the User s Guide or readme.txt file. Maintaining point-in-time consistent file system replicas and providing server monitoring and automatic or manual failover of the server name and IP address are the primary functions of the Double-Take software and we offer support to qualified customers should these functions fail to operate in accordance with our published documentation, regardless of what application or process is manipulating the data. NSI Software may provide application notes and other documents that provide implementation guidelines on how to use Double-Take functions and replicas to manually or automatically failover or recover many popular third party applications and a general process to accomplish failover or recovery of many other third party applications. While these steps are believed to be accurate for the specific configuration, Double-Take version, and application versions originally tested, due to the number of possible configurations and variables, NSI Software can only test selected combinations and may provide only limited support for the operation and configuration of third party applications or the behavior of those applications before, during, or after failover, in its discretion. In cases where NSI Software has no direct access to or experience with a particular application or configuration, NSI Software support may also be limited to only the actual replication of the file system data and failover (name and IP address) of the server. For assistance in validating, implementing or troubleshooting these or other possible configurations with third party applications, NSI Software and its partners may offer professional services on a fee basis to apply best practices for assisting with third party applications to recover automatically or manually using replicated data. This, and any other, application note is provided solely for the convenience of our customers and is not intended to bind NSI Software to any obligation.

Table of Contents Introduction...1 Verifying Double-Take Settings...1 Opening the Firewall s...3 Using Double-Take Through a Firewall

Introduction A firewall is a program that helps prevent unauthorized access to or from a private network. A firewall examines each packet entering or leaving the network and blocks those that do not meet the specified security criteria. NSI Software's Double-Take, which provides real-time data protection and replication, can be used through a firewall as long as the firewall ports are configured to allow Double-Take servers to communicate with each other. This document describes the ports used for Double-Take communications, how to verify the port settings for your Double-Take servers, and the proper firewall port configuration for use with Double-Take. Due to the complexities of this process, this document is intended for network administrators with experience installing, configuring, and maintaining network applications, including Double-Take and firewalls. This document assumes the following:! You have Double-Take installed on two servers.! For Windows 2000/NT, you are using Double-Take 4.0.1 Service Pack 2 or later! For Solaris, you are using Double-Take 4.0.3 Hotfix 4 or later! For Netware, you are using Double-Take 4.0.2 NOTE: To obtain either a service pack or hotfix, contact NSI Technical Support.! You have a firewall program installed and you know how to open your firewall ports. NOTE:! If you do not have Double-Take installed, see the Double-Take Getting Started guide for information on installing Double-Take.! If you do not have a firewall installed or if you do not know how to open your firewall ports, see your firewall reference manual. Verifying Double-Take Settings Double-Take uses specific ports for communication between the source, target, and client machines. In order to use Double-Take through a firewall, you must first verify the current Double-Take port settings so that you can open the correct ports on your firewall to allow Double-Take machines to communicate with each other. Using the following table, locate and record your port settings for each of the four Double-Take ports. As the table indicates, there are three different Double-Take clients (Management Console, Text Client, and Failover Control Center) that you can use to verify each of the four port settings. For more specific information on using a particular Double-Take client to verify a port setting, see the chapter named for that client in the Double-Take User s Guide. Using Double-Take Through a Firewall Page 1 of 3

Name Additional Names Communication Type and Usage Use Any of These Clients to Verify the Double-Take Setting Default Setting Record Your Setting Net! Service Listen! Service Transmit The Net is used for TCP communication between Double-Take servers and clients. Network tab on the Server Properties dialog box.! Text Client Use the get netport command.! Failover Control Center See the Set Communication Parameters dialog box. 1100 UNet! Heartbeat Advertisement! Heartbeat Transmit! Heartbeat Listen The UNet is used to send and receive Double-Take heartbeats which are broadcast UDP communications. Configuration tab on the Management Console Options dialog box. Network tab on the Server Properties dialog box.! Text Client Use the get unetport command.! Failover Control Center See the Set Communication Parameters dialog box. 1100 DirUNet! Status Transmit! Status Listen The DirUNet sends directed UDP comunications to request and receive status updates, keeping the Double-Take Management Console at-a-glance monitoring current. Configuration tab on the Management Console Options dialog box. Network tab on the Server Properties dialog box.! Text Client Use the get dirunetport command. 1105 Stats The Stats accepts TCP communications from DTStat.! Text Client Use the get statsport command. 1106 NOTE: Because these ports appear on multiple machines (sources, targets, and clients), the port settings have to be identical on the machines that need to communicate with each other. For example, a source with a Net setting of 1100 will only be able to communicate with other machines (sources, target, and clients) that also have a Net of 1100. If any machine has a Net setting of any value other than 1100, that machine cannot communicate with this source. Therefore, if you change a port setting on one machine, perhaps your source, you will also need to make the same change to the target(s) and client(s) that the source needs to communicate with. Using Double-Take Through a Firewall Page 2 of 3

Opening the Firewall s Using the values from the table in Verifying Double-Take Settings, configure your firewall ports for both inbound and outbound traffic so that the Double-Take servers can communicate with each other. For specific steps in configuring these ports, see your firewall reference manual. 1. Open the port assigned to the Net and Stats for the inbound and outbound transmission of TCP packets. 2. Open the port assigned to the UNet and DirUNet for the inbound and outbound transmission of UDP packets. Using Double-Take Through a Firewall Page 3 of 3