NFM-P port information

Default ports

The following table describes the listening ports on the various NFM-P applications.

Table 6-18: NFM-P port information

Default port

Type

Encryption

Description

NFM-P server and NFM-P auxiliary (statistics)

N/A

ICMP

N/A

ICMP Ping

The active NFM-P server will periodically ping the NFM-P delegate server to ensure reachability.

21

Ports from 1023 - 65536

TCP

None

See SCP and SFTP as secure alternatives.

FTP (Passive)

This port is used to enable ftp communication from a XML API client to either the NFM-P server or auxiliary. Ftp is used by the XML API client to retrieve logToFile statistics or findToFile results. (See FTP)

22

TCP

Dynamic Encryption

Cipher Suite and strength as per RFC 4253.

SSH/SCP/SFTP

This port is used for remote access, rsync between NFM-P servers, rsync between the NFM-P databases, and scp/sftp to NFM-P XML API clients.

69

UDP

None

See SFTP for a secure alternative.

80

TCP

None

See port 443 for secure communications.

HTTP

This port redirects to port 443.

162

UDP

Static Encryption

When SNMPv3 is configured. Cipher and strength is NE dependant.

SNMP traps

By default, this port on the NFM-P server receives SNMP traps from the network elements. This item is specified during the installation of the server and can be changed.

(Not required by the NFM-P auxiliary)

443

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

HTTPS

This port provides an HTTPS interface for the Web Applications through the Launchpad.

758

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

nlogin

Secure port used for connection to and from the 1830 SMS HSM server

1095

TCP

None

Internal system communications protocol (JBoss messaging)

These ports are used by commands on the NFM-P auxiliary station to adjust the NFM-P auxiliary behavior. (Example: adjusting log levels, shutting down the auxiliary server, etc)

1097

TCP

None

Internal system communications protocol (JMS naming/messaging service)

Used by the NFM-P client (GUI and XML API) and NFM-P server and NFM-P auxiliary applications to register for JMS notifications and messages. This is used to ensure that the client, server, and auxiliary are aware of system events (for example: database changes or alarm notifications, etc)

1099

TCP

None

Internal system communications protocol (JBoss Naming Service -JNDI)

This port is required to ensure the NFM-P GUI, XML API clients, auxiliaries and standby NFM-P server properly initialize with the active NFM-P server.

When initially logging into the NFM-P server, NFM-P GUI and XML API clients use this port to find the various services that are available. This port is also used by the NFM-P GUI and XML API clients to register with the NFM-P server to receive notification of network changes.

2181

TCP

None

See port 2281 for secure communications.

Java ZooKeeper client connections

2281

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

Java ZooKeeper client connections

2390

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

nspdctl

4447

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

JBoss messaging port for JMS

5007

TCP

None

Neo4j cluster control

6007

TCP

None

Neo4j cluster data

6362

TCP

None

Used by the Web Server

This is a local port to the host.

6363

TCP

None

Neo4j database backup port

This is a local port to the host.

6432

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

postgresql communications port

6633

TCP

None

OpenFlow

Used to exchange openflow protocol messages with 7x50 NEs.

7473

TCP

Dynamic Encryption (if TLS is configured)

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

Neo4j https web server

7474

TCP

None

Neo4j web server

This is a local port to the host. NFM-P server only

7687

TCP

None

Neo4j bolt connector

7879

TCP

Dynamic Encryption (if TLS is configured)

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

RPC Layer

Used for FM correlation engine to NFM-P server communications.

Used for CPROTO communication with the NSP Flow Collector

7889

TCP

None

telemetry monitor connection for kpi-engine

This is a local port to the host..

8080

TCP

None

See port 8443 for secure communications

HTTP

This port provides an HTTP interface for XML API clients to access the NFM-P server.

8085

TCP

None

See port 8444 for secure communications.

HTTP

This port provides an HTTP interface for NFM-P client. The NFM-P client uses this port to verify the existence of the server.

8087

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

HTTPS

Servlet connector used for communication between tomcat and NFM-P server to handle requests with a normal processing time.

8088

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

HTTPS

Webapp services such as correlation.

8089

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

HTTPS

Servlet connector used for communication between tomcat and NFM-P server to handle requests with a long processing time.

8097

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

REST port used for internal communication for DR features (DR alignment, dashboard)

Shared-mode only

8195

TCP

None

Tomcat shutdown port

This is a local port to the host.

8196

TCP

None

Tomcat (app1-tomcat) shutdown port

This is a local port to the host.

8197

TCP

None

Tomcat (app2-tomcat) shutdown port

This is a local port to the host.

8400

TCP

None

HTTP

This port redirects to port 443.

8443

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

HTTPS

This port provides an HTTPS (secure HTTP) interface for XML API clients that wish to use this protocol to access the NFM-P server

8444

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

HTTPS

This port provides an HTTPS (secure HTTP) interface for the NFM-P client. This is a secure version of port 8085. Used only if the NFM-P client is connecting via TLS.

8483

TCP

None

JBoss RMI port for WebServices

This is a local port to the host.

8543

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

HTTPS

This port provides an HTTPS (secure HTTP) interface for the Launchpad, Web Applications, and online help.

8544

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

HTTPS

This port provides an HTTPS (secure HTTP) interface for Web Applications.

8545

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

HTTPS

This port provides an HTTPS (secure HTTP) interface for RESTCONF.

8617

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

auxdb-agent

Communication port from nspdctl

9000

TCP

None

gRPC server used by the ts-model-app in app1-tomcat.

This is a local port to the host.

9010

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

This port is used for file synchronization between redundant NFM-P servers

9092

TCP

None

See port 9192 for secure communication.

Kafka server

9100

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

HTTPS

HTTPS port for providing access to the node-exporter metrics.

9192

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

Kafka server

9400

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

HTTPS

This port redirects to port 443.

9443

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

HTTPS

HTTPS port for providing access to the HSM server through swagger web interface

9990

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

JBoss Management Console

Used to access the JBoss management console for the main server process.

9999

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

JMX

Used to access the JMX console for the main server process.

10090

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

JBoss Management Console

Used to access the JBoss management console for the JMS server process.

10099

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

JMX

Used to access the JMX console for the JMS server process.

10190

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

JBoss Management Console

Used to access the JBoss management console for the auxiliary server process.

10199

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

JMX

Used to access the JMX console for the auxiliary server process.

10290

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

HTTPs

HTTPs interface port between the NFM-P server process and HSM server process

11800

TCP

Static Encryption

Encryption provided by AES Cipher Algorithm with 128 bit Cipher Strength.

Internal system communications protocol (JBoss Clustering)

This port is required to ensure that redundant NFM-P servers can monitor each other.

12010

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

This port is used for Warm standby Cache Sync communication between redundant NFM-P servers

This port is not used on the NFM-P auxiliary.

12300 - 12307

TCP

None

These ports are used for detecting communication failures between NFM-P server clusters (primary / secondary / auxiliaries)

12800

TCP

Static Encryption

Encryption provided by AES Cipher Algorithm with 128 bit Cipher Strength.

Internal system communications protocol (JBoss clustering)

During run-time operations, the NFM-P auxiliary uses this port to send and receive information to and from the NFM-P server.

The number of required ports depends on the number of NFM-P auxiliary stations that are installed.

Note that NFM-P can be configured to use a different port for this purpose. The procedure is available from Nokia personnel.

47100 - 47199

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

Session-Manager ignite cache communication spi

Only required on the NFM-P server when hosting the nspOS components. Communication to external hosts is not required.

47500 - 47599

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

Session-Manager ignite cache discovery spi

Only required on the NFM-P server when hosting the nspOS components. Communication to external hosts is not required.

48500 - 48599

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

Session-Manager ignite cache communication spi

Only required on the NFM-P server when hosting the nspOS components. Communication to external hosts is not required.

48600 - 48699

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

Session-Manager ignite cache discovery spi

Only required on the NFM-P server when hosting the nspOS components. Communication to external hosts is not required.

NSP Flow Collector

21

Ports from 1023 - 65536

TCP

None

See SCP and SFTP as secure alternatives

FTP (Passive)

This port is used to enable ftp communication between the NSP Flow Collector and the NFM-P server or dedicated ftp server for retrieving IPDR files.

22

TCP

Dynamic Encryption

Cipher Suite and strength as per RFC 4253

SSH/SCP/SFTP

This port is used to enable SSH (SFTP/SCP) communication between the NSP Flow Collector and the NFM-P server or dedicated ftp server for retrieving IPDR files.

2205

UDP

None

CGNAT / IPFIX cflowd records from 7750 SR routers to NSP Flow Collector

4739

UDP

None

cflowd records from 7750 SR routers to NSP Flow Collector

7899

TCP

None

CPROTO

8080

TCP

None

See port 8443 for secure communications.

HTTP

This port provides an HTTP Web User interface for the NSP Flow Collector

8083

TCP

None

JBoss Socket for dynamic class and resource loading.

8443

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

HTTPS

This port provides an HTTP Web User interface for the NSP Flow Collector

This is a secure version of port 8080.

9443

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

HTTPS

This port provides an HTTPS (secure HTTP) NSP Flow Collector management interface. This is a secure version of port 9990. Used only if the NSP Flow Collector is TLS secured.

9990

TCP

None

See port 9443 for secure communications.

HTTP

This port provides an HTTP NSP Flow Collector management interface.

This is a local port to the host.

9999

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

JMX

Used to access the JMX console.

This is a local port to the host.

44444

TCP

None

RMI server port

NSP Flow Collector Controller

21

Ports from 1023 - 65536

TCP

None

See SCP and SFTP as secure alternatives

FTP (Passive)

This port is used to enable ftp communication between the NSP Flow Collector Controller and the NFM-P server or dedicated ftp server for retrieving IPDR files.

22

TCP

Dynamic Encryption

Cipher Suite and strength as per RFC 4253

SSH/SCP/SFTP

This port is used to enable SSH (SFTP/SCP) communication between the NSP Flow Collector Controller and the NFM-P server or dedicated ftp server for retrieving IPDR files.

1090

TCP

None

JBoss RMI/JRMP socket for connecting to the JMX MBeanServer.

Used for NFM-P server to NSP Flow Collector Controller communication.

1098

TCP

None

JBoss Socket Naming service used to receive RMI request from client proxies.

Used for NFM-P server to NSP Flow Collector Controller communication.

1099

TCP

None

JBoss The listening socket for the Naming service.

Used for Jboss communication between NFM-P and NSP Flow Collector Controller.

4444

TCP

None

JBoss Socket for the legacy RMI/JRMP invoker.

Used for Jboss communication between NFM-P to NSP Flow Collector Controller.

4445

TCP

None

JBoss Socket for the legacy Pooled invoker.

Used for Jboss communication between NFM-P to NSP Flow Collector Controller.

4446

TCP

None

JBoss Socket for the JBoss Remoting Connected used by Unified Invoker.

Used for Jboss communication between NFM-P to NSP Flow Collector Controller.

4447

TCP

None

JBoss Socket for JBoss Remoting Connections.

This is a local port to the host.

4457

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

JBoss Socket for JBoss Messaging 1.x

7879

TCP

None

CPROTO

8080

TCP

None

See port 8443 for secure communications.

HTTP

This port provides an HTTP Web User interface for the NSP Flow Collector Controller.

8083

TCP

None

JBoss Socket for dynamic class and resource loading.

8443

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

HTTPS

This port provides an HTTP Web User interface for the NSP Flow Collector Controller.

This is a secure version of port 8080.

9443

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

HTTPS

This port provides an HTTPS (secure HTTP) NSP Flow Collector Controller management interface. This is a secure version of port 9990. Used only if the NSP Flow Collector Controller is TLS secured.

9990

TCP

None

See port 9443 for secure communications.

HTTP

This port provides an HTTP NSP Flow Collector Controller management interface.

This is a local port to the host.

22222

TCP

Dynamic Encryption

Cipher Suite and strength as per RFC 4253

SFTP

SFTP connection from NSP Flow Collector.

44444

TCP

None

RMI server port

NSP analytics server

8443

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

HTTPS

This port provides a secure HTTP Web User interface for the NSP analytics server. In deployments of NFM-P alone, it's used by the NFM-P server and web-based clients for HTTPS requests. In deployments that include both NFM-P and NSP, it's used by the NSP kubernetes VM and web-based clients.

This is a secure version of port 8080.

10990

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

HTTPS

Used to access the JMX console for the analytics process.

NFM-P auxiliary database

22

TCP

Dynamic Encryption

Cipher Suite and strength as per RFC 4253

SSH / SFTP

Vertica Administration Tools.

Inter-node and inter-cluster communication

4803

TCP

None

Spread

Client connections

Inter-node communication only.

4803

UDP

None

Spread

Daemon to Daemon connections

Inter-node communication only.

4804

UDP

None

Spread

Daemon to Daemon connections

Inter-node communication only.

5433

TCP

Dynamic Encryption (if secure=true)

Encryption provided by TLS. Strong ciphers are supported using various AES ciphers provided by TLS.

JDBC

Client communication port (NFM-P server, statistics auxiliary, Flow Collector, analytics server)

5433

UDP

None

Vertica

Vertica spread monitoring

Inter-node communication only.

5434

TCP

None

Vertica

Intra and inter cluster communication

Inter-node communication only.

6543

TCP

None

Spread

Monitor to Daemon connections

Inter-node communication only.

7299

TCP

Dynamic Encryption (if secure=true)

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

RMI

NFM-P auxiliary database proxy port.

7300–7309

TCP

None

RMI

NFM-P auxiliary database proxy ports. Not used if secure=true.

50000

TCP

None

Rsync

Inter-node and inter-cluster communication

32768-60999

TCP

None

Vertica - Zygote

Inter-node communication only

32768-60999

UDP

None

Vertica - Spread

Inter-node communication only

Managed devices

21

Ports from 1023 - 65536

TCP

None

FTP (Passive)

This port is used to enable ftp communication between the NFM-P server and the managed routers. Ftp occurs to transfer information from the routers to the NFM-P server such as accounting statistics. See FTP for a more detailed description of ftp requirements.

22

TCP

Dynamic Encryption

Cipher Suite and strength as per RFC 4253

SSH / SFTP

This port used by clients to request a SSH session to a managed router.

23

TCP

None

Telnet

This port used by clients to request a telnet session to a managed router.

80

TCP

None

HTTP

This port is required for the NFM-P client to communicate with the network element Web GUIs. See Network element specific requirements for the network elements that require this port.

161

UDP

Static Encryption

When SNMPv3 is configured. Cipher and strength is NE dependant.

SNMP

By default, NFM-P server sends SNMP messages, such as configuration requests and service deployments, to this port on the network elements.

1491

TCP

Static Encryption

When SNMPv3 is configured. Cipher and strength is NE dependant.

SNMP Streaming

Used for TCP Streaming during NE discovery and resync. Only applicable to 7950 XRS, 7750 SR, 7450 ESS, 11.0R5+.

5001

TCP

None

Proprietary Java socket connection

This port is used by CPAM to communicate with the 7701 CPAA to obtain control plane information.

5010

UDP

None

Trap

Trap port used by 9500 MPR / Wavence SM devices to send traps to NFM-P clients running the NetO manager.

11500

TCP

None

Equipment View

Used while managing 9500 MPR / Wavence SM(MSS-1C, MPR-e, MSS-8) NEs using the Equipment View function as part of NetO

N/A

ICMP

N/A

ICMP

Only used if the Ping Policy is enabled as part of network element mediation.

NFM-P database

22

TCP

Dynamic Encryption

Cipher Suite and strength as per RFC 4253

SSH

This port is used by NFM-P for an optional rsync feature between NFM-P databases

1523

TCP

Static Encryption

Encryption provided by RC4 Cipher Algorithm with 128 bit Cipher Strength.

Oracle SQL*Net Listener

This port is used by the NFM-P server to connect to and communicate with the NFM-P database. When there are redundant databases, this port is also used by Oracle DataGuard to keep the databases in sync. The data on this port is encrypted.

9002

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS.

NFM-P database Proxy

This port is used by the NFM-P server to monitor disk usage on a remote NFM-P database. When there are redundant databases, it is also allows the NFM-P server to initiate database switchovers and failovers.

9003

TCP

Dynamic Encryption

Encryption provided by TLS. Strong ciphers are supported using various CBC and AES ciphers provided by TLS

Database file transfer Port

This port is used by the NFM-P database stations in a redundant station configuration. This port allows database transfers between the primary and standby databases. For example: when the standby database is reinstantiated, or when the standby database is installed for the first time.

NFM-P client and client delegate server

20

TCP

None

FTP

Active FTP port for 9500 MPR / Wavence SM software download from NEtO.

21

Ports from 1023 - 65535

TCP

None

FTP

9500 MPR / Wavence SM software download from NEtO.

22

TCP

Dynamic Encryption

Cipher Suite and strength as per RFC 4253

sFTP

9500 MPR / Wavence SM software download from NEtO

162

UDP

None

Trap

Trap port used by 9500 MPR / Wavence SM (MPR-e, MSS-8) devices to send traps to NFM-P clients running the NetO manager.

5010

UDP

None

Trap

Trap port used by 9500 MPR / Wavence SM devices to send traps to NFM-P clients running the NetO manager.