Configuring Third-Party Connections Between Client Computers

You can configure third-party connections between two client computers (source and destination client) by running the ConfigureThirdPartyConnections predefined workflow. This workflow allows you to route third-party traffic through a specific set of network ports. The ports that you specify are saved in the network configuration file (FWConfig.txt) of each client.

This procedure is useful when you run into the following scenarios:

  • You have a third-party application running on a specific port on a computer that is behind the network.

  • You do not want to open additional ports for connection requests to the third-party application.

  • You prefer to route the connection requests through a network proxy.

To address the third-party traffic described in the scenarios above, you must set up Commvault network settings between the computer running the third-party application (destination client) and a computer that can act as the network proxy (source client). After configuring the network settings, you must run the workflow to route the connection requests to the third-party application through the network proxy. This operation is known as configuring third-party connections between two clients.

You can use this procedure to route connection requests to the following third-party components:

Before You Begin

  • Download the ConfigureThirdPartyConnections workflow from the Commvault Store.

    For instructions, see Download Workflows from Commvault Store.

  • Configure Commvault network connection routes, such as direct or network gateway connections, between the source and destination clients.

    If you configured network routes on client groups, you can associate the clients to the client groups by using one of the options provided in the workflow.

Procedure

  1. From the CommCell Browser, go to Workflows.

  2. Right-click ConfigureThirdPartyConnections, and then click All Tasks > Execute.

  3. From the Run workflow on list, select the workflow engine.

  4. In the Select Operation dialog box, select the operation that you want perform.

  5. If you selected Insert, perform the following steps:

    1. From the Select source client list, select the client that will act as the network proxy and that will forward incoming third-party connections to the destination client.

      Note

      If you select Dynamic TPPM in Step d, below, you do not need to select a source client.

    2. In the Provide source port number field, enter the port number that will route third-party connection requests. To enter multiple ports, use a comma (,) to separate the port numbers.

      Note

      If you select Dynamic TPPM in Step d, below, you do not need to enter a source port number.

    3. If you want the source client to inherit the firewall settings of a client group, select the client group from the Select firewall source client group list.

      Note

      If you select Dynamic TPPM in Step d, below, you do not need to select a firewall source client group.

    4. Select one of the following third-party port mapping (TPPM) settings:

      • None: Select this if you want all third-party connections to initiate from the source client. This is the default option.

      • Any: Select this if third-party connections can be initiated from any client, but routed through the source client.

      • Dynamic TPPM: Select this to allow application-based TPPM connections on a port on a destination client.

    5. From the Select destination client list, select the client where the third-party application is running. This client will receive the third-party connection requests that are forwarded by the source client.

    6. In the Provide destination port box, enter the application port number that should receive the connection requests forwarded by the source client. This operation is defined as "port forwarding" or "port mapping".

    7. If you want the destination client to inherit the firewall settings of a client group, select the client group from the Select firewall destination client group list.

      Note

      If you selected Dynamic TPPM in Step d, above, you do not need to select a client group.

  6. If you selected Delete, perform the following steps:

    1. Select the check boxes next to the third-party connections that you want to delete.
  7. Click OK.

    You can track the progress of the workflow job from the Job Controller.

Loading...