7.1 Add Workload - Configuration

Problems or Messages

Solutions

“The domain in the credentials is invalid or blank”

This error occurs when the Credential Format is incorrect.

Try the discovery using a local admin account with the user name syntax: hostname\LocalAdmin

Or try the discovery with a domain admin account with the user name syntax: domain\DomainAdmin

“Unable to connect to Windows server...Access is denied.”

A Non-admin account is used when trying to add a workload—Use an admin account or add the user to the administrators group and try again.

WMI connectivity failure. For each of the following possible resolutions, attempt the solution and then perform the WMI Connectivity Test again. If the test succeeds, try adding the workload again. Possible resolutions are:

“Unable to connect to Windows server...The network path was not found.”

Network connectivity failure—perform the Network Connectivity Test. If it fails, ensure that Forge and the workload are on the same network. Reconfigure the network and try again.

7.1.1 Network Connectivity Test

NOTE:If the VMware Infrastructure Client is already installed, skip to Step 3.

  1. From a workstation other than your Forge appliance, open a Web browser and navigate to the ESX Server’s IP address (the first IP address you configured when you set up your Forge appliance).

  2. Click the Download VMware Infrastructure Client link, then follow the instructions to download and install the software. Ignore any SSL warnings.

  3. Login using the ESX Server (Appliance Host) IP address and the username/password you setup.

    The VIC Inventory UI is displayed.

  4. Select the Forge VM in the inventory list on the left.

  5. Click on the Console tab.

  6. Click Start > Run, type in cmd and press Enter.

    A terminal window is displayed.

  7. Type ping server_ip and press Enter to ping the workload.

7.1.2 WMI Connectivity Test

NOTE:If the VMware Infrastructure Client is already installed, skip to Step 3.

  1. From a workstation other than your Forge appliance, open a Web browser and navigate to the ESX Server’s IP address (the first IP address you configured when you set up your Forge appliance).

  2. Click the Download VMware Infrastructure Client link, then follow the instructions to download and install the software. Ignore any SSL warnings.

  3. Login using the ESX Server (Appliance Host) IP address and the username/password you setup.

    The VIC Inventory UI is displayed.

  4. Select the Forge VM in the inventory list on the left.

  5. Click on the Console tab.

  6. From the Forge Management VM, click Start > Run, type Wbemtest and press Enter.

  7. In the Namespace type in the name of the machine you are trying to discover with \root\cimv2 appended to it. For example, if your machine name is win2k type:

    \\win2k\root\cimv2

  8. Enter the appropriate credentials using either the hostname\LocalAdmin or domain\DomainAdmin format.

  9. Click Connect to test the WMI connection. If an error message is returned a WMI connection cannot be established between Forge and the workload being added.

7.1.3 Enabling DCOM

  1. Log into the workload that you would like to protect.

  2. Click Start > Run.

  3. Type dcomcnfg and press Enter.

  4. On a Windows NT/2000 server machine, the DCOM Configuration dialog is displayed. Click the Default Properties tab and ensure that Enable Distributed COM on this computer is checked.

    For Windows 2003, the Component Services window is displayed. In the Computers folder of the console tree of the Component Services administrative tool, right-click on the computer for which you want to check if DCOM is enabled and then click Properties. Click the Default Properties tab and ensure that Enable Distributed COM on this computer is checked.

  5. If DCOM was not enabled, please enable it and restart the Windows Management Instrumentation Service (if rebooting the server is not possible) and try adding the workload again.

7.1.4 Ensuring RPC Service is Running

There are three potential blockages for the RPC service:

  • Windows Service

  • Windows Firewall

  • Hardware Firewall

For the Windows Service, ensure that the RPC service is running on the workload. To access the services panel, run services.msc from a command prompt. For a Windows firewall, add RPC exception.For hardware firewalls, you can try:

  • Putting Forge and the workload on the same side of the firewall

  • Opening up specific ports between Forge and the workload (see Table 7-1)

  • Opening up all the ports

Table 7-1 Required Source Ports

Port

Protocol

Description

135/445

TCP

DCOM\RPC ports used to add Windows workloads.

137-139/445

TCP

Ports used for Named Pipe communications and File and Printer Sharing between the protected workload and the corresponding target VM on the Forge appliance.

SMB (TCP 139, TCP 445, UDP 137, UDP 138)

TCP/UDP

Ports used during failback process.

3725

TCP

Port used to transfer files for file-based and VSS based protection.

10000 and higher

TCP

After the initial handshake, another TCP connection from the source to the target is initiated. The source machine uses port 10000 + X (where X = drive letter ‘A’ to ‘X’). For example, the port for drive C is 10002, D will use TCP port 10003, and so on. There is one TCP connection for every drive being mirrored.

Random port above 1024

 

WMI uses the DCOM and RPC ports, but also uses a randomly assigned port above 1024.

9999

 

Block-based component