This article shows how to set exceptions in the windows firewall necessary for SmartDisk to operate.
If the firewall is enabled and you do not set the necessary exceptions for SmartDisk, you may have problems.
1. To see if the firewall is enabled, use the following command.
netsh firewall show state
Example
C:\>netsh firewall show state
Firewall status:
-------------------------------------------------------------------
Profile = Domain
Operational mode = Enable
Exception mode = Enable
Multicast/broadcast response mode = Enable
Notification mode = Enable
Group policy version = Windows Firewall
Remote admin mode = Disable
If Operational mode = Enable, then Windows firewall is on
If Operational mode = Disable, then Windows firewall is off
If Exception mode = Enable, then Windows firewall will allow exceptions.
If Exception mode = Disable, then Windows firewall will not allow exceptions. In this mode you will be able to add the exceptions SmartDisk needs to run.
Configure windows firewall exceptions for the smartdisk processes as shown in the example below using the full path to the executables listed. The path may vary to the executable depending on the location that smartdisk is installed
Example using default smartdisk installation path:
netsh advfirewall firewall add rule name="smartdisk chunkstore process" dir=in action=allow program="C:\Program Files\Quest Software\NetVault SmartDisk\dedupe\bin\chunkstored.exe" enable=yes
list of smartdisk executables:
...\smartdisk\dedupe\bin
19/03/2014 16:22 56,176 chunkstored.exe
19/03/2014 16:22 61,296 dedupecheck.exe
19/03/2014 16:22 25,456 dedupe_ex.exe
19/03/2014 16:22 17,776 stream.exe
Directory of \ ...\smartdisk\diskmanager\bin
19/03/2014 16:22 28,016 ciscanner.exe
19/03/2014 16:22 21,360 deduplicator.exe
19/03/2014 16:22 25,456 replicator.exe
19/03/2014 16:22 40,304 sdconfig.exe
19/03/2014 16:22 19,312 stats.exe
19/03/2014 16:22 246,128 storageservice.exe
19/03/2014 16:22 481,648 superserver.exe
Directory of ...\smartdisk\foundation\bin
19/03/2014 16:23 31,088 configupdate.exe
19/03/2014 16:23 16,240 echoserver.exe
19/03/2014 16:23 16,752 file_ex.exe
19/03/2014 16:23 19,312 foundationlicenseinstall.exe
19/03/2014 16:23 25,968 logd.exe
19/03/2014 16:23 28,016 logdregupd.exe
19/03/2014 16:23 21,360 logs.exe
19/03/2014 16:23 61,440 percolatormonitor.exe
19/03/2014 16:23 91,504 percolatorslave.exe
19/03/2014 16:23 23,920 procpasswrd.exe
19/03/2014 16:23 28,528 resourcemanager.exe
19/03/2014 16:23 25,968 servicetool.exe
19/03/2014 16:23 15,728 setstanza.exe
19/03/2014 16:23 763,760 sqlite3.exe
19/03/2014 16:23 17,264 tracetoascii.exe
19/03/2014 16:23 18,944 winservicerunner.exe
19/03/2014 16:23 18,288 wput.exe
Allow TCP and UDP packet on ports 37453 and 37452 to transfer bi-directionally