How to configure Windows firewall program exceptions and port exceptions for System Recovery

How to configure Windows firewall program exceptions and port exceptions for System Recovery

Article: 100027250
Last Published: 2021-07-20
Ratings: 71 58
Product(s): System Recovery

Description

If System Recovery Monitor or System Recovery console is remotely used, you need to configure the firewall exceptions. If System Recovery is locally used, you do not need to configure the firewall exceptions. 

To add a Windows firewall port exception:

  1. On the client operating system, go to Start > Run and type firewall.cpl. The Windows Firewall window opens.
  2. Click on the “Advanced Settings” link on the left pane. The Windows Firewall with Advanced security window opens.
  3. Click on the “Inbound Rules” option.
  4. On the  left pane, click on “New rule”.
  5. Under “Rule Type” select the option “Port” and click next.
  6. Select “TCP”and “specific local ports” options.
  7. Key in the port number, the default port is TCP port 135.
  8. Click Next.
  9. Select the option “Allow the connection”.
  10. Click Next, do not change any option here and click Next again.
  11. Specify a name for this rule.
  12. Click Finish.

To add a program exception:

  1. On the client operating system, go to Start > Run and type firewall.cpl.
  2. Click on the “Advanced Settings” link on the left pane.
    Windows Firewall with Advanced security window opens up.
  3. Click on the “Inbound Rules” option.
  4. On the  left pane, click on “New rule”.
  5. Under “Rule Type” select the option “Program” and click next.
  6. Select the option “This Program path”.
  7. Browse to the Veritas System Recovery service location [Default location for System Recovery: C:\Program Files\Veritas\Veritas System Recovery\Agent\Vprosvc.exe” location.
  8. Select the option “Allow the connection”.
  9. Click Next, do not change any option here and click Next again.
  10. Specify a name for this rule.
  11. Click  Finish.
     

For more details review: Best practices for configuring Windows Defender Firewall

Please note that this article references sites not owned or maintained by Veritas and, as such, Veritas is not responsible for the content portrayed on such sites, including any revisions to or deletions of content or third-party software on which this article relies. User is responsible for conducting all necessary due diligence prior to following the instructions described in this article.

 

Was this content helpful?