Configuring Third-Party Connections Between Client Computers
You can configure third-party connections between two client computers (source and destination client) by running the predefined workflow ConfigureThirdPartyConnections. This workflow allows you to route third-party traffic through a specific set of network ports. The ports that you specify are saved in the firewall configuration file (FWConfig.txt) of each client.
This procedure is useful when you run into the following scenario:
- You have a third-party application running on a specific port on a computer that is behind the firewall.
- You do not want to open additional ports for connection requests to the third-party application.
- You prefer to route the connection requests through a network proxy.
To address the third-party traffic described in the scenario, you must set up SnapProtect firewall settings between the computer running the third-party application (destination client) and a computer that can act as the network proxy (source client). After configuring the firewall settings, you must run the workflow to route the connection requests to the third-party application through the network proxy. This operation is known as configuring third-party connections between two clients.
You can use this procedure to route connection requests to the following third-party components:
- ODBC (see Firewall Configurations for the Web Server)
- WOPI (see Configuring Office Online in Edge Drive)
- VPN from Macintosh to Windows (see Allowing Remote Access Between Macintosh Clients and Windows Clients)
Before You Begin
- Download the workflow from the Software Store.
For instructions, see Download Workflows from Software Store.
- Configure SnapProtect firewall connection routes, such as direct or proxy connections, between the source and destination clients.
If you configured firewall on client groups, you can associate the clients to the client groups by using one of the options provided in the workflow.
- From the CommCell Browser, go to Workflows.
- Right-click ConfigureThirdPartyConnections and then click All Tasks > Execute.
- From the Run workflow on list, select the workflow engine and click OK.
- In the Select Operation dialog box, select the operation that you want perform, and then click Next.
- If you selected Insert, perform the following steps:
- From the Source Client box list, select the client that will act as the network proxy and that will forward incoming third-party connections to the destination client.
- In the Source Port Number box, enter the port number that will route third-party connection requests. To enter multiple ports, use a comma (,) to separate the port numbers.
- If you want the source client to inherit the firewall settings of a client group, select the client group from the Firewall Source Client Group list.
- Determine the type of third-party port mapping (TPPM) setting that you want to use:
- If you want all third-party connections to initiate from the source client, click None. This is the default option.
- If third-party connections can be initiated from any client, but routed through the source client, click Any.
- From the Destination Client list, select the client where the third-party application is running. This client will receive the third-party connection requests that are forwarded by the source client.
- In the Destination Port Number box, enter the application port number that should receive the connection requests forwarded by the source client. This operation is defined as "port forwarding" or "port mapping".
- If you want the destination client to inherit the firewall settings of a client group, select the client group from the Firewall Destination Client Group list.
- Click Next.
- If you selected Delete, select the check box next to the third-party connections that you want to delete, and then click Next.
- In the User Info Message dialog box, the workflow reminds you that you must push the firewall configuration on the clients after the workflow finishes to run. Click OK.
You can track the progress of the workflow job from the Job Controller.
What to Do Next
After the workflow job finishes, push the firewall configuration on the source and destination clients. To push the firewall configuration, right-click the client, and then click All Tasks > Push Firewall Configuration.