Understanding Firewall Ports for the ArcSight Platform
This section lists the ports that must be open for the elements that make up the ArcSight Platform:
Firewall Ports for CDF Infrastructure Components
The following tables list the ports that must be open for the CDF infrastructure components:
In most cases, the firewalls for these components are host-based. These components are not likely to have network-based firewalls between them.
In most cases, you do not need to take action to configure the firewalls for these ports.
Ports (TCP) | Node | Description |
---|---|---|
8200 | Master |
Used by the All cluster nodes should be able to access this port for the client connection. |
8201 | Master |
Used by the Web clients must be able to access this port for peer member connections. |
Ports (TCP) | Node | Description |
---|---|---|
3000 | Master |
Used only for accessing the CDF Management Portal during CDF installation from a web browser Web clients must be able to access this port during the installation of CDF. After installation, web clients use port 5443 to access the CDF Management Portal. |
5443 | Master |
Used for accessing the CDF Management Portal post CDF deployment from a web browser Web clients must be able to access this port for administration and management of CDF. |
5444 | Master |
Used for accessing the CDF Management Portal post CDF deployment from a web browser, when using two-way (mutual) SSL authentication Web clients must be able to access this port for administration and management of CDF, when using two-way (mutual) SSL authentication. |
Ports (TCP) | Node | Description |
---|---|---|
2380 | Master |
Used by the All the master nodes should be able to access this port for the |
4001 | Master |
Used by the All cluster nodes should be able to access this port for the client connection. |
5000 | Master |
Used by the All cluster nodes should be able to access this port to communicate with the local container registry. |
7443 | Master |
(Conditional) Used by the Kubernetes API server when you perform one of the following methods of installation:
All cluster nodes should be able to access this port for internal communication. |
8443 | Master |
(Conditional) Used by the Kubernetes API server when you manually install and the installation is not on the same node as ESM All cluster nodes should be able to access this port for internal communication. |
8472 | All nodes |
Uses UDP protocol Used by the Flannel service component, which manages the internal cluster networking All cluster nodes should be able to access this port for internal communication. |
10250 | All nodes |
Used by the Kubelet service, which functions as a local node agent that watches pod specifications through the Kubernetes API server All cluster nodes should be able to access this port for internal communications and worker node Kubelet API for exec and logs. |
10251 | All nodes |
Used by the All cluster nodes should be able to access this port for internal communication. |
10252 | All nodes |
Used by the All cluster nodes should be able to access this port for internal communication. |
10256 | All nodes |
Used by the All cluster nodes should be able to access this port for internal communication. |
Ports (TCP) | Node | Description |
---|---|---|
111 | NFS server |
Used by the All cluster nodes should be able to access this port. |
2049 | NFS server |
Used by the All cluster nodes should be able to access this port. Note: This port must be open even during a single-node deployment.
|
20048 | NFS server |
Used by the All cluster nodes should be able to access this port. |
Firewall Ports for Deployed Capabilities
The following tables list the ports that must be available when you deploy the associated capability into the CDF infrastructure:
In most cases, you do not need to take action to configure the firewalls for these ports.
Ports | Direction | Description |
---|---|---|
32080, 9000 | Inbound | Used for Transformation Hub and ArcMC communication |
Ports | Node | Direction | Description |
---|---|---|---|
TCP 30820 | Worker (HDFS Namenode) | Inbound | Used for the database to connect to HDFS during Analytics processing |
TCP 30070 | Worker (HDFS Namenode) | Inbound | Used for the Hadoop Monitoring Dashboard (optional) |
TCP 30010 | Worker (HDFS Datanodes) | Inbound | Used for communication between the HDFS Namenode and the HDFS Datanodes |
TCP 30210 | Worker (HDFS Datanodes) | Inbound | Used by the database to establish secure communication with HDFS during Analytics processing |
TCP 30110 | Worker (HDFS Datanodes and Namenode) | Inbound | Used for communication between the ArcSight Database and HDFS worker nodes |
TCP 30071 | Worker (HDFS Namenode) | Inbound | Used for Secure Data Transfer with the HDFS cluster |
The SOAR cluster listens on the following ports on all Kubernetes master and worker nodes, but Micro Focus recommends that you only use the ports on the master virtual IP.
Port | Description |
---|---|
32200 | Data from ESM |
32201 | Data from QRadar |
32202 | Data from McAfee |
Ports (TCP) | Direction | Description |
---|---|---|
2181 | Inbound | Used by ZooKeeper as an inbound port |
9092 | Inbound | Used by Kafka during non-SSL communication |
9093 | Inbound | Used by Kafka when TLS is enabled |
32080 | Outbound | Used by Transformation Hub to send data to ArcMC |
32081 | Outbound | Used by Schema Registry to send data to Avro consumers. |
443 | Inbound | Used by ArcMC |
9000 | Inbound | Used by ArcMC |
9999, 10000 | Inbound | Used by the Transformation Hub Kafka Manager to monitor Kafka |
39001, 39050 | Outbound | Used by ArcMC to communicate with Connectors in Transformation Hub |
Firewall Ports for Supporting Components
The following tables list the ports that must be available for supporting components:
The database requires several ports to be open on the local network. Micro Focus does not recommend placing a firewall between nodes (all nodes should be behind a firewall), but if you must use a firewall between nodes, ensure that the following ports are available:
Ports | Description |
---|---|
TCP 22 | Required for the Administration Tools and Management Console Cluster installation wizard |
TCP 5433 | Used by database clients, such as vsql, ODBC, JDBC, and so on |
TCP 5434 | Used for Intra-cluster and inter-cluster communication |
UDP 5433 | Used for database spread monitoring |
TCP 5438 | Used as Management Console-to-node and node-to-node (agent) communication port |
TCP 5450 | Used to connect to Management Console from a web browser and allows communication from nodes to the Management Console application/web server |
TCP 4803 | Used for client connections |
UDP 4803 | Used for daemon to daemon connections |
UDP 4804 | Used for daemon to daemon connections |
UDP 6543 | Used to monitor daemon connections |
If you have SmartConnectors that are deployed logically far away in the network with firewalls in between, those intermediate firewalls will need to permit traffic on port 9092 (for non-SSL traffic) and 9093 (for SSL traffic).
Port | Direction | Description |
---|---|---|
|
Inbound | Used by SmartConnector to receive events |
|
Outbound | Used by SmartConnector to send data to Transformation Hub |