New Question
 
 
PRTG Network Monitor

Intuitive to Use.
Easy to manage.

300.000 administrators have chosen PRTG to monitor their network. Find out how you can reduce cost, increase QoS and ease planning, as well.

Free PRTG
Download >>

 

What is this?

This knowledgebase contains questions and answers about PRTG Network Monitor and network monitoring in general. You are invited to get involved by asking and answering questions!

Learn more

 

Top Tags


View all Tags


Limit number of WMI/DCOM ports in DMZ for PRTG

Votes:

0

Your Vote:

Up

Down

Hello, does any supported configuration of PRTG monitoring include having WMI/DCOM ports range limited to a count of about 200? Is after performing such configuration on windows side also necessary to adjust some settings on PRTG side? By the way, as probe requires just about one open port, what about having separate probe on each monitored server? Would such approach cause some problems?

dcom ports probe security wmi

Created on May 4, 2017 9:27:52 PM by  R (1) 1



1 Reply

Votes:

0

Your Vote:

Up

Down

Hi there,

Next to the TCP port 135, WMI connections require ports of the range 1024 to 5000. It's not possible to limit this number in PRTG. The best approach to monitor devices in a DMZ is to install one or more remote probes in the DMZ. This way you just need to open one TCP port (23560 by default). If you plan to deploy multiple remote probes, this single port is still sufficient.

You can install the remote probe software on every machine, but it's not required if all devices in the DMZ are located in the same network segment. The scans can then be sent from the remote probe to the hosts of the DMZ without any firewall blocking the connections. The gathered data is then forwarded to the core server via one open port in the DMZ firewall.

Best regards, Felix

Created on May 5, 2017 10:21:47 AM by  Felix Saure [Paessler Support]



Please log in or register to enter your reply.


Disclaimer: The information in the Paessler Knowledge Base comes without warranty of any kind. Use at your own risk. Before applying any instructions please exercise proper system administrator housekeeping. You must make sure that a proper backup of all your data is available.