Skip to content

Commit de2a592

Browse files
authored
Merge pull request #94160 from Nickomang/smbportupdate
Updated SMB port requirements
2 parents a13b484 + 34e89aa commit de2a592

5 files changed

+7
-50
lines changed

articles/service-fabric/service-fabric-cluster-standalone-deployment-preparation.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -98,9 +98,8 @@ When a cluster administrator configures a Service Fabric standalone cluster, the
9898
* Have Service Fabric runtime uninstalled
9999
* Have the Windows Firewall service (mpssvc) enabled
100100
* Have the Remote Registry Service (remote registry) enabled
101-
* Have file sharing (SMB) enabled
102101
* Have necessary ports opened, based on cluster configuration ports
103-
* Have necessary ports opened for Windows SMB and Remote Registry service: 135, 137, 138, 139, and 445
102+
* Have necessary ports opened for Remote Registry service: 135, 137, 138, and 139
104103
* Have network connectivity to one another
105104
3. None of the cluster node machines should be a Domain Controller.
106105
4. If the cluster to be deployed is a secure cluster, validate the necessary security prerequisites are in place, and are configured correctly against the configuration.

articles/service-fabric/service-fabric-tutorial-create-vnet-and-windows-cluster.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,6 @@ The following inbound traffic rules are enabled in the **Microsoft.Network/netwo
107107

108108
* ClientConnectionEndpoint (TCP): 19000
109109
* HttpGatewayEndpoint (HTTP/TCP): 19080
110-
* SMB: 445
111110
* Internodecommunication: 1025, 1026, 1027
112111
* Ephemeral port range: 49152 to 65534 (need a minimum of 256 ports).
113112
* Ports for application use: 80 and 443

articles/service-fabric/service-fabric-tutorial-scale-cluster.md

Lines changed: 0 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -382,20 +382,6 @@ In the *template.json* file, add new network security group and virtual machine
382382
},
383383
"properties": {
384384
"securityRules": [
385-
{
386-
"name": "allowSvcFabSMB",
387-
"properties": {
388-
"access": "Allow",
389-
"destinationAddressPrefix": "*",
390-
"destinationPortRange": "445",
391-
"direction": "Inbound",
392-
"priority": 3950,
393-
"protocol": "*",
394-
"sourceAddressPrefix": "VirtualNetwork",
395-
"sourcePortRange": "*",
396-
"description": "allow SMB traffic within the net, used by fabric to move packages around"
397-
}
398-
},
399385
{
400386
"name": "allowSvcFabCluser",
401387
"properties": {

articles/service-fabric/service-fabric-tutorial-standalone-azure-create-infrastructure.md

Lines changed: 2 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -85,18 +85,12 @@ Launch two more **Virtual Machines**, being sure to maintain the same settings o
8585

8686
4. Open the RDP file, and when prompted enter the username and password you provided in the VM setup.
8787

88-
5. Once you are connected to an instance, you need to validate that remote registry was running, enable SMB, and open the requisite ports for SMB and remote registry.
89-
90-
To enable SMB, this is the PowerShell command:
91-
92-
```powershell
93-
netsh advfirewall firewall set rule group="File and Printer Sharing" new enable=Yes
94-
```
88+
5. Once you are connected to an instance, you need to validate that remote registry was running and open the requisite ports.
9589

9690
6. To open the ports in the firewall here is the PowerShell command:
9791

9892
```powershell
99-
New-NetFirewallRule -DisplayName "Service Fabric Ports" -Direction Inbound -Action Allow -RemoteAddress LocalSubnet -Protocol TCP -LocalPort 135, 137-139, 445
93+
New-NetFirewallRule -DisplayName "Service Fabric Ports" -Direction Inbound -Action Allow -RemoteAddress LocalSubnet -Protocol TCP -LocalPort 135, 137-139
10094
```
10195

10296
7. Repeat this process for your other instances, again noting the private IP addresses.
@@ -113,15 +107,6 @@ Launch two more **Virtual Machines**, being sure to maintain the same settings o
113107

114108
If your output looks like `Reply from 172.31.20.163: bytes=32 time<1ms TTL=128` repeated four times then your connection between the instances is working.
115109

116-
3. Now validate that your SMB sharing works with the following command:
117-
118-
```
119-
net use * \\172.31.20.163\c$
120-
```
121-
122-
It should return `Drive Z: is now connected to \\172.31.20.163\c$.` as the output.
123-
124-
125110
Now your instances are properly prepared for Service Fabric.
126111

127112
## Next steps

articles/service-fabric/service-fabric-tutorial-standalone-create-infrastructure.md

Lines changed: 4 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ Service Fabric requires a number of ports open between the hosts in your cluster
7777

7878
To avoid opening these ports to the world, you instead open them only for hosts in the same security group. Take note of the security group ID, in the example it's **sg-c4fb1eba**. Then select **Edit**.
7979

80-
Next, add four rules to the security group for service dependencies, and then three more for Service Fabric itself. The first rule is to allow ICMP traffic, for basic connectivity checks. The others rules open the required ports to enable SMB and Remote Registry.
80+
Next, add four rules to the security group for service dependencies, and then three more for Service Fabric itself. The first rule is to allow ICMP traffic, for basic connectivity checks. The others rules open the required ports to enable Remote Registry.
8181

8282
For the first rule select **Add Rule**, then from the dropdown menu selects **All ICMP - IPv4**. Select the entry box next to custom and enter your security group ID from above.
8383

@@ -113,30 +113,18 @@ To validate that basic connectivity works, use the ping command.
113113
ping 172.31.20.163
114114
```
115115

116-
If your output looks like `Reply from 172.31.20.163: bytes=32 time<1ms TTL=128` repeated four times then your connection between the instances is working. Now validate that your SMB sharing works with the following command:
117-
118-
```
119-
net use * \\172.31.20.163\c$
120-
```
121-
122-
It should return `Drive Z: is now connected to \\172.31.20.163\c$.` as the output.
116+
If your output looks like `Reply from 172.31.20.163: bytes=32 time<1ms TTL=128` repeated four times then your connection between the instances is working.
123117

124118
## Prep instances for Service Fabric
125119

126-
If you were creating this from scratch, you'd need to take a couple extra steps. Namely, you'd need to validate that remote registry was running, enable SMB, and open the requisite ports for SMB and remote registry.
120+
If you were creating this from scratch, you'd need to take a couple extra steps. Namely, you'd need to validate that remote registry was running and open the requisite ports.
127121

128122
To make it easier you embedded all of this work when you bootstrapped the instances with your user data script.
129123

130-
To enable SMB, this is the PowerShell command you used:
131-
132-
```powershell
133-
netsh advfirewall firewall set rule group="File and Printer Sharing" new enable=Yes
134-
```
135-
136124
To open the ports in the firewall here is the PowerShell command:
137125

138126
```powershell
139-
New-NetFirewallRule -DisplayName "Service Fabric Ports" -Direction Inbound -Action Allow -RemoteAddress LocalSubnet -Protocol TCP -LocalPort 135, 137-139, 445
127+
New-NetFirewallRule -DisplayName "Service Fabric Ports" -Direction Inbound -Action Allow -RemoteAddress LocalSubnet -Protocol TCP -LocalPort 135, 137-139
140128
```
141129

142130
## Next steps

0 commit comments

Comments
 (0)