How to enable the Firewall rules required by Veeam ONE on the Windows Server Core OS

KB ID: 2696
Product: Veeam ONE
Version: 7.x, 8.x, 9.x
Published:
Last Modified: 2018-07-30

Challenge

Veeam ONE cannot collect any data due to closed Firewall rules on the Windows Server Core OS side.

Cause

Due to the Windows Server Core OS limitations, it is impossible to enable the necessary Firewall rules required by Veeam ONE using Windows Firewall UI.

Solution

Enable the rules

CMD (Command line)

To enable these rules via the command line, launch the command prompt console with elevated permissions (as Administrator) and execute the command below:

netsh advfirewall firewall set rule name="Remote Event Log Management (NP-In)" new enable= Yes
netsh advfirewall firewall set rule name="Remote Event Log Management (RPC)" new enable= Yes
netsh advfirewall firewall set rule name="Remote Event Log Management (RPC-EPMAP)" new enable= Yes
netsh advfirewall firewall set rule name="COM+ Network Access (DCOM-In)" new enable= Yes
 

PowerShell

To enable these rules via the PowerShell, launch the PowerShell console with elevated permissions (as Administrator) and execute the command below:

Set-NetFirewallRule -Name 'RemoteEventLogSvc-NP-In-TCP' -Enabled True
Set-NetFirewallRule -Name 'RemoteEventLogSvc-In-TCP' -Enabled True
Set-NetFirewallRule -Name 'RemoteEventLogSvc-RPCSS-In-TCP' -Enabled True
Set-NetFirewallRule -Name 'ComPlusNetworkAccess-DCOM-In' -Enabled True

More Information

Should you have any questions, contact Veeam Support.

Please be aware that we’re making changes which will restrict access to product updates for users without an active contract.

OK

Rate the quality of this KB article: 
5 out of 5 based on 1 ratings

Couldn't find what you were looking for?

Below you can submit an idea for a new knowledge base article.

Request new content