The following tables list the ports that need to be opened when a firewall separates one component from another. Some combinations appear in more than one table, but this allows you to discover the required ports whether you are thinking that a firewall is separating an Access Gateway from the Administration Console or that a firewall is separating an Administration Console from the Access Gateway.
With these tables, you should be able to place the Access Manager components of your system anywhere within your existing firewalls and know which ports need to be opened in the firewall.
Table 5-1, When a Firewall Separates an Access Manager Component from a Global Service
Table 5-2, When a Firewall Separates the Administration Console from a Component
Table 5-3, When a Firewall Separates the Identity Server from a Component
Table 5-4, When a Firewall Separates the Access Gateway from a Component
Table 5-5, When a Firewall Separates the SSL VPN from a Component
Table 5-6, When a Firewall Separates the J2EE Agent from a Component
Table 5-1 When a Firewall Separates an Access Manager Component from a Global Service
Table 5-2 When a Firewall Separates the Administration Console from a Component
Table 5-3 When a Firewall Separates the Identity Server from a Component
Component |
Port |
Description |
---|---|---|
Access Gateway |
TCP 8080 or 8443 |
For authentication communication from the Access Gateway to the Identity Server and from the Identity Server to the Access Gateway. TCP 8080 and 8443 are the default ports. They are configurable. You need to open the port of the Base URL of the Identity Server. |
SSL VPN |
N/A. The SSL VPN never communicates directly with the Identity Server. |
|
J2EE Agent |
TCP 8080 or 8443 |
For authentication communication from the J2EE Agent to the Identity Server. TCP 8080 and 8443 are the default ports. They are configurable. You need to open the port of the Base URL of the Identity Server. See |
Administration Console |
TCP 1443 |
For communication from the Administration Console to the devices. This is configurable. |
TCP 8444 |
For communication from the Identity Server to the Administration Console. |
|
TCP 289 |
For communication from the Identity Server to the Novell Audit server on the Administration Console. |
|
TCP 524 |
For NCP certificate management with NPKI from the Identity Server to the Administration Console. |
|
TCP 636 |
For secure LDAP communication from the Identity Server to the Administration Console. |
|
Identity Server |
TCP 8443 or 443 |
For HTTPS communication. You can use iptable to configure this for TCP 443. See |
|
TCP 7801 range |
For back-channel communication with cluster members. You need to open two ports for each member of the cluster plus one. Thus, for a two member cluster, 7801, 7802, 7803, 7804, and 7805 need to be open. The initial port (7801) is configurable. See |
LDAP User Stores |
TCP 636 |
For secure LDAP communication from the Identity Server to the LDAP user store. |
Service Providers |
TCP 8445 |
If you have enabled Identity Provider introductions, you need to open a port to allow HTTPS communication from the user’s browser to the service provider. |
TCP 8446 |
If you have enabled Identity Provider introductions, you need to open a port to allow HTTPS communication from the user’s browser to the service consumer. |
|
Browsers |
TCP 8080 |
For HTTP communication from the browser to the Identity Server. You can use iptable to configure this for TCP 80. See |
TCP 8443 |
For HTTPS communication from the browser to the Identity Server. You can use iptable to configure this for TCP 443. See |
Table 5-4 When a Firewall Separates the Access Gateway from a Component
Component |
Port |
Description |
---|---|---|
Identity Server |
TCP 8080 or 8443 |
For authentication communication from the Access Gateway to the Identity Server. TCP 8080 and 8443 are the default ports. They are configurable. You need to open the port of the Base URL of the Identity Server. See |
Administration Console |
TCP 1443 |
For communication from the Administration Console to the Access Gateway. This is configurable. |
|
TCP 8444 |
For communication from the Access Gateway to the Administration Console. |
|
TCP 289 |
For communication from the Access Gateway to the Novell Audit server on the Administration Console. |
|
TCP 524 |
For NCP certificate management with NPKI from the Access Gateway to the Administration Console. |
|
TCP 636 |
For secure LDAP communication from the Access Gateway to the Administration Console. |
SSL VPN |
TCP 8080 |
For HTTP communication from the Access Gateway to the SSL VPN. |
TCP 8443 |
If SSL has been enabled between the Access Gateway and the SSL VPN, TCP 8443 needs to be opened for HTTPS communication from the Access Gateway to the SSL VPN. |
|
J2EE Agent |
Only required if the Access Gateway is configured to protect the J2EE server as a Web server. |
|
TCP 8080, 8443 |
For communication from the Access Gateway to the JBoss* server. These are the default ports. They are configurable. |
|
TCP 9080, 9443 |
For communication from the Access Gateway to the WebSphere* server. These are the default ports. They are configurable. |
|
TCP 7001, 7002 |
For communication from the Access Gateway to the WebLogic* server. These are the default ports. They are configurable. |
|
Access Gateway |
Not a supported configuration. All members of an Access Gateway group need to be on the same side of the firewall. |
|
Browsers/Clients |
TCP 80 |
For HTTP communication from the client to the Access Gateway. This is configurable. |
TCP 443 |
For HTTPS communication from the client to the Access Gateway. This is configurable. |
|
|
UDP 8880 |
For RDB communication from the client to the Access Gateway. Only required if you enable RDB on the NetWare® Access Gateway |
|
TCP 23 |
For Telnet communication from the client to the Access Gateway. Only required if you enable Telnet on the NetWare Access Gateway. |
|
TCP 21 |
For FTP communication from the client to the Access Gateway. Only required if you enable Mini FTP on the NetWare Access Gateway. |
|
TCP 524 |
For SFTP communication from the client to the Access Gateway. Only required if you load the ncpip.nlm for SFTP on the NetWare Access Gateway. |
Web Servers |
TCP 80 |
For HTTP communication from the Access Gateway to the Web servers. This is configurable. |
|
TCP 443 |
For HTTPS communication from the Access Gateway to the Web servers. This is configurable. |
Table 5-5 When a Firewall Separates the SSL VPN from a Component
NOTE:If you are running the SSL VPN on SLES 9 with a firewall, you cannot use YaST to configure the firewall for access to UDP ports and internal networks. You need to edit the /etc/sysconfig/SuSEfirewall2 file and add lines similar to the following:
FW_SERVICES_EXT_UDP=7777 FW_DEV_INT=tun0
On SLES 10, you can edit this file or use YaST to configure UDP ports and internal networks.
Table 5-6 When a Firewall Separates the J2EE Agent from a Component
Component |
Port |
Description |
---|---|---|
Administration Console |
TCP 1443 |
For communication from the Administration Console to the J2EE Agent. This is configurable. |
TCP 8444 |
For communication from the J2EE Agent to the Administration Console. |
|
TCP 289 |
For communication from the J2EE Agent to the Novell Audit server on the Administration Console. |
|
TCP 524 |
For NCP certificate management with NPKI from the J2EE Agent to the Administration Console. |
|
TCP 636 |
For secure LDAP communication from the J2EE Agent to the Administration Console. |
|
Identity Server |
TCP 8080 or 8443 |
For authentication communication from the J2EE Agent to the Identity Server and from the Identity Server to the J2EE Agent. TCP 8080 and 8443 are the default ports. They are configurable. You need to open the port of the Base URL of the Identity Server. See |
Access Gateway |
Only required if the Access Gateway is configured to protect the J2EE server as a Web server. |
|
TCP 8080, 8443 |
For communication from the Access Gateway to the JBoss server. These are the default ports. They are configurable. |
|
TCP 9080, 9443 |
For communication from the Access Gateway to the WebSphere server. These are the default ports. They are configurable. |
|
TCP 7001, 7002 |
For communication from the Access Gateway to the WebLogic server. These are the default ports. They are configurable. |
|
SSL VPN |
N/A. The J2EE Agent never communicates with the SSL VPN. |
|
Browsers |
TCP 8080, 8443 |
For communication from the browser to the JBoss server. These are the default ports. They are configurable. |
TCP 9080, 9443 |
For communication from the browser to the WebSphere server. These are the default ports. They are configurable. |
|
TCP 7001, 7002 |
For communication from the browser to the WebLogic server. These are the default ports. They are configurable. |