Ensure that your network environment meets the PlateSpin Transformation Manager requirements for access, discovery, and migration.
For information about the network access requirements for PlateSpin Migrate, see Access and Communication Requirements across Your Migration Network
in the PlateSpin Migrate 2018.11 User Guide.
PlateSpin Transformation Manager must be able to communicate across the public Internet with the Micro Focus License Server, using the following URL:
https://www.novell.com/center/nodeactivationservice/1_0/subscriptions/getPTMLicenseCount
Internet access is required to activate your License Key on the Configuration > Licenses page in the PlateSpin Transformation Manager Web Interface. As you begin to configure workloads, Transformation Manager communicates with the License Server to verify license availability as you edit workloads individually or with bulk actions. It also synchronizes license information daily. See Managing Licenses
in the PTM 2 Administrator Guide.
To provide Internet access through a proxy server, you must configure the PTM Appliance as a proxy client for your proxy server. See Configure Proxy Client Settings.
PlateSpin Transformation Manager Appliance communications use the following ports. Ports are opened by default for the PTM Appliance, as noted. Ensure that you open the following ports in all firewalls in your network between the PTM Appliance and the computers you use to access the appliance and software.
Table 1-6 Communications Ports for Appliance Management
Component |
Port |
Description |
---|---|---|
Appliance Management Console |
|
Use this port to securely manage the PTM Appliance. |
Transformation Manager Database (PostgreSQL) |
5432 |
If you configure a remote PostgreSQL database for the PTM Appliance, this port is used by PTM to access to your remote database. PostgreSQL allows TCP traffic, incoming and outgoing. Secure traffic by enabling SSL in the postgresql.conffile on your remote PostgreSQL server. This port is closed by default if the PostgreSQL is installed on the PTM Appliance. |
SSH |
22 |
You can use SSH to remotely access the PTM Appliance to start, stop, or restart it without using a VMware client. SSH is disabled by default. See Section 8.4.1, Starting, Stopping, or Restarting System Services. |
Ganglia |
8649 (secure, default) 9080 (non-secure) |
The Ganglia gmond daemon uses UDP port 8649 for communications. The gmetad daemon uses TCP port 8649 for metrics data. You can enable port 9080 to allow anonymous access to the Ganglia monitoring information. See Section 8.7.3, View Ganglia Metrics Directly Using Port 9080 (Not Secure). |
PlateSpin Transformation Manager uses the following ports for PTM Server. Ensure that you open the following ports in all firewalls in your network between the PTM Appliance and the computers you use to access the appliance and the PTM-related services running on it.
Table 1-7 Communications Ports for the Transformation Manager Web Interface
Component |
Port |
Description |
---|---|---|
Web Interface |
|
Port 8183 is enabled by default. NOTE:Micro Focus recommends that you use the secure port and SSL options for accessing the Web Interface. For security reasons, port 8182 is disabled by default. |
Table 1-8 shows the protocol and port required for event messaging between the PTM Server and the PlateSpin Migrate Connector instances registered with PTM Server. Each Migrate Connector instance also handles event messages for its assigned PlateSpin Migrate servers.
NOTE:The messages reflect events and state changes and do not contain sensitive information.
Table 1-8 Event Messaging Requirements for Network Protocols and Ports
Traffic |
Network Protocol and Port |
Other Requirements |
---|---|---|
Event Messaging |
61613 (Stomp, allow TCP, incoming) (not secure) |
This port is open by default on the PTM Appliance VM. Open this port on all other Connector host servers, the PlateSpin Migrate servers configured for the project, and the firewalls between them. |