HP Vulnerability and Patch Manager 6.0 software Installation and Configuration Guide HP Part Number: 579548-001 Published: January 2010, First Edition
Proceed with the Vulnerability and Patch Manger installation. If necessary, the installation account credentials
can be changed back after the installation completes. Repeat steps 2 through 6 after the password has been
changed, and then to update the Vulnerability and Patch Manger password.
Vulnerability and Patch Manger installation fails
• Be sure the Vulnerability and Patch Manger server can effectively communicate with other networking
components, such as the database and Systems Insight Manager server (if separate).
• If the Vulnerability and Patch Manger server has multiple IP addresses, be sure Name Resolution is used
for all IP addresses
• If IPv6 is enabled, uninstall from the network interface card being utilized for Vulnerability and Patch
Manger communication.
• If the Vulnerability and Patch Manger installation was attempted multiple times, reboot before attempting
the installation again.
Cannot modify Vulnerability and Patch Manger acquisition settings to
acquire updates from a local repository
A patch acquisition must have already been run using the VPM Acquisition Utility and saved to the designated
directory before Vulnerability and Patch Manger acquisition settings can be modified to acquire updates
from a local repository.
Required open ports
IMPORTANT: If a proxy server is used, it must be configured to allow both HTTP and FTP traffic.
NOTE: These ports are opened automatically when VPM is installed on a Windows XP SP2 system. By
default, Internet Connection Firewall closes some of these ports. Be sure that the ports listed are open.
The following ports must be open on target systems to allow successful scanning with Vulnerability and Patch
Manger:
• TCP 22—SSH
• TCP 135, 137, 138, 139, 443, and 445—NetBIOS and SSL, used by the Vulnerability and Patch
Manger scanning components
• TCP 2301 and 49400—HP Management Agents
• TCP 3463, 3464, 3466, and 3465—Used by VPM patching components
• The following ports must be open on the Vulnerability and Patch Manger server:
• TCP 80—HTTP Web server, if an HTTP connection is used between the Vulnerability and Patch Manger
and Systems Insight Manager servers (TCP 443 must be open if an HTTPS connection is used)
• TCP 445—MSDE named pipes communications
• UDP 1433, 1434—MSDE Shared Instance Support
• TCP (variable)—MSDE TCP/IP communications. This port, assigned at random by MSDE during
installation, can be identified by selecting Start>Run, entering svrnetcn.exe, and clicking OK.
From the Server Instances menu, select Computername. In the Enabled Protocols list, select
TCP/IP→Properties. The port number appears. The port number can be changed at this time, if
necessary.
The following ports are used by Systems Insight Manager and must be open:
• TCP 22—SSH
• UDP 161—SNMP
• UDP 162—SNMP trap
• TCP 280—HTTP
18 Troubleshooting