NFM-P firewall and NAT rules
Overview
Firewall rules are applied to the incoming network interface traffic of the NFM-P stations. As a rule, firewall rules are not applied to the outgoing network interface traffic.
For NFM-P installations using RHEL as the Operating System, the RHEL supplied firewall can be used to filter network traffic using filter rules lists. Only experienced system administrators with extensive knowledge of the RHEL firewall should attempt to implement the filter rules lists provided with each NFM-P component. All others should disable the RHEL firewall.
The installation of each NFM-P component will include the filter rules lists to be applied for successful communication between different NFM-P components, XML API clients, and network elements. The table below defines the location
Table 6-19: Sample firewalld filter rules lists file locations
Component |
Protocol |
File location |
---|---|---|
NFM-P server |
IPv4/IPv6 |
/opt/nsp/nfmp/server/nms/sample/firewall/ |
NFM-P database |
IPv4/IPv6 |
/opt/nsp/nfmp/db/install/sample/firewall/ |
NFM-P Statistics auxiliary |
IPv4/IPv6 |
/opt/nsp/nfmp/auxserver/nms/sample/firewall/ |
NSP Flow Collector Controller |
IPv4/IPv6 |
/opt/nsp/flow/fcc/sample/firewalld/ |
NSP Flow Collector |
IPv4/IPv6 |
/opt/nsp/flow/fc/sample/firewalld/ |
NFM-P auxiliary database |
IPv4 |
/opt/nsp/nfmp/auxdb/install/config/sample/firewall/ |
NFM-P client |
IPv4/IPv6 |
<base client install dir>/nms/sample/firewall/ |
NFM-P client delegate server |
IPv4/IPv6 |
<base client install dir>/nms/sample/firewall/ |
It is imperative that all rules are considered completely for the NFM-P systems to inter-operate correctly. The following tables will define the connection details. Within the section there will be a number of conditions that indicate whether or not that particular table or connection needs to be applied.
See NFM-P Network Address Translation for supported NAT configurations.
NFM-P server firewall and NAT rules
When there is a firewall at the NFM-P server, the following initiating connection details must be considered. Network Interface number is in reference to Figure 7-3, Distributed NFM-P server/database deployment with multiple network interfaces
Table 6-20: Firewall rules for traffic connecting to the NFM-P server
Source |
Source port |
Destination port |
Protocol |
Network Interface |
Notes |
---|---|---|---|---|---|
NFM-P server (public address) |
Any |
21 |
TCP |
3 |
Connection to NFM-P server private address (if NAT in use) |
XML API client |
Any |
21 |
TCP |
3 |
If FTP is required |
NSP flow collector controller |
Any |
21 |
TCP |
1 |
If FTP is used |
NFM-P server |
Any |
22 |
TCP |
1 |
From the redundant NFM-P server |
XML API client |
Any |
22 |
TCP |
3 |
If SCP / SFTP is required |
NSP flow collector controller |
Any |
22 |
TCP |
1 |
If SCP / SFTP is used |
9500 MPR / Wavence |
Any |
22 |
TCP |
2 / 4 |
NE backups |
NFM-P server |
Any |
443 |
TCP |
1 |
From the redundant NFM-P server, without NSP integration |
NFM-P GUI client |
Any |
443 |
TCP |
3 |
HTTPS |
Managed Network |
Any |
162 |
UDP |
2 / 4 |
SNMP trap initiated from the NE |
Managed Network |
Any |
-- |
ICMP |
2 / 4 |
Ping policy |
1830 SMS HSM Server |
5552 |
758 |
TCP |
2 / 4 |
nlogin |
NFM-P server (public address) |
>1023 |
>1023 |
TCP |
3 |
Connection to NFM-P server private address (if NAT in use) |
NFM-P GUI client / XML API client |
Any |
1097 |
TCP |
3 |
JMS |
NFM-P auxiliary server |
Any |
1097 |
TCP |
1 |
JMS |
NFM-P server |
Any |
1099 |
TCP |
1 |
From the redundant NFM-P server |
NFM-P GUI client / XML API client |
Any |
1099 |
TCP |
3 |
JNDI |
NFM-P auxiliary server |
Any |
1099 |
TCP |
1 |
JNDI |
NSP flow collector controller |
Any |
1099 |
TCP |
1 |
JNDI |
NFM-P server |
Any |
2181 |
TCP |
1 |
(nspOS) zookeeper non-secure. From the redundant NFM-P server, without NSP integration. |
NFM-P auxiliary server |
Any |
2181 |
TCP |
1 |
(nspOS) zookeeper non-secure |
NSP flow collector controller |
Any |
2181 |
TCP |
1 |
(nspOS) zookeeper non-secure |
NFM-P server |
Any |
2281 |
TCP |
1 |
(nspOS) zookeeper secure. From the redundant NFM-P server, without NSP integration. |
NFM-P auxiliary server |
Any |
2281 |
TCP |
1 |
(nspOS) zookeeper secure |
NSP flow collector controller |
Any |
2281 |
TCP |
1 |
(nspOS) zookeeper secure |
NFM-P server |
Any |
2390 |
TCP |
1 |
From the redundant NFM-P server, without NSP integration. |
NFM-P GUI client / XML API client |
Any |
4447 |
TCP |
3 |
JMS |
NFM-P auxiliary server |
Any |
4447 |
TCP |
1 |
JMS |
NFM-P server |
Any |
5007 |
TCP |
1 |
From the redundant NFM-P server, without NSP integration. |
NFM-P server |
Any |
6007 |
TCP |
1 |
From the redundant NFM-P server, without NSP integration. |
NFM-P server |
Any |
6432 |
TCP |
1 |
From the redundant NFM-P server |
NFM-P server |
Any |
6432 |
TCP |
1 |
From the redundant NFM-P server, without NSP integration. |
NFM-P server |
Any |
7473 |
TCP |
1 |
From the redundant NFM-P server, without NSP integration. |
NFM-P server |
Any |
7687 |
TCP |
1 |
From the redundant NFM-P server, without NSP integration. |
NFM-P server |
Any |
7879 |
TCP |
1 |
From the redundant NFM-P server |
NSP flow collector controller |
Any |
7879 |
TCP |
1 |
CPROTO |
XML API client |
Any |
8080 |
TCP |
3 |
HTTP |
NSP flow collector controller |
Any |
8080 |
TCP |
1 |
HTTP |
NFM-P GUI client |
Any |
8085 |
TCP |
3 |
HTTP |
NFM-P server |
Any |
8087 |
TCP |
1 |
From the redundant NFM-P server |
NFM-P server |
Any |
8087 |
TCP |
1 |
From the redundant NFM-P server, without NSP integration |
NFM-P GUI client |
Any |
8087 |
TCP |
3 |
HTTP(S) |
NFM-P GUI client |
Any |
8088 |
TCP |
3 |
HTTP(S) |
NFM-P GUI client |
Any |
8089 |
TCP |
3 |
HTTP(S) |
NSP |
Any |
8097 |
TCP |
1 |
From NSP, shared-mode only. |
XML API client |
Any |
8443 |
TCP |
3 |
HTTPS |
NSP flow collector controller |
Any |
8443 |
TCP |
1 |
HTTPS |
NFM-P GUI client |
Any |
8444 |
TCP |
3 |
HTTPS |
NFM-P server |
Any |
8543 |
TCP |
1 |
From the redundant NFM-P server |
NFM-P GUI client / Web client |
Any |
8543 |
TCP |
3 |
HTTPS |
NFM-P GUI client / Web client |
Any |
8544 |
TCP |
3 |
HTTPS |
RESTCONF client |
Any |
8545 |
TCP |
3 |
HTTPS |
NFM-P server |
Any |
8617 |
TCP |
1 |
From redundant NFM-P server, without NSP integration. |
NFM-P server |
Any |
9010 |
TCP |
1 |
From the redundant NFM-P server |
NFM-P server |
Any |
9092 |
TCP |
1 |
From redundant NFM-P server, without NSP integration. |
NSP Cluster |
Any |
9100 |
TCP |
1 |
Node-exporter |
NFM-P server |
Any |
9192 |
TCP |
1 |
From redundant NFM-P server, without NSP integration. |
NFM-P server |
Any |
9192 |
TCP |
1 |
From redundant NFM-P server, without NSP integration. |
kafka client |
Any |
9192 |
TCP |
3 |
(nspOS) kafka secure |
Web client |
Any |
9443 |
TCP |
3 |
Swagger interface for HSM |
NFM-P server |
Any |
10290 |
TCP |
1 |
From the redundant NFM-P server, without NSP integration. |
NFM-P server |
Any |
11800 |
TCP |
1 |
From the redundant NFM-P server |
NFM-P server |
Any |
12010 |
TCP |
1 |
From the redundant NFM-P server |
NFM-P server |
Any |
12300-12307 |
TCP |
1 |
From the redundant NFM-P server |
NFM-P auxiliary server |
Any |
12300-12307 |
TCP |
1 |
-- |
NFM-P auxiliary server |
Any |
12800 |
TCP |
1 |
-- |
Note: Due to the size of SNMP packets, IP fragmentation may occur in the network. Ensure the firewall will allow fragmented packets to reach the server(s).
NFM-P database firewall
When there is a firewall at the NFM-P database, the following initiating connection details must be considered. Network Interface number is in reference to Figure 7-3, Distributed NFM-P server/database deployment with multiple network interfaces)/
Table 6-21: Firewall rules for traffic connecting to the NFM-P database
Source |
Source port |
Destination port |
Protocol |
Network Interface |
Notes |
---|---|---|---|---|---|
NFM-P database |
Any |
22 |
TCP |
1 |
|
NFM-P server |
Any |
1523 |
TCP |
1 |
|
NFM-P database |
Any |
1523 |
TCP |
1 |
From the redundant NFM-P database |
NFM-P auxiliary server |
Any |
1523 |
TCP |
1 |
|
NSP analytics server |
Any |
1523 |
TCP |
1 |
|
NFM-P server |
Any |
9002 |
TCP |
1 |
|
NFM-P database |
9002 |
9002 |
TCP |
1 |
From the redundant NFM-P database |
NFM-P auxiliary server |
Any |
9002 |
TCP |
1 |
|
NFM-P server |
Any |
9003 |
TCP |
1 |
|
NFM-P database |
9003 |
9003 |
TCP |
1 |
From redundant NFM-P database |
NFM-P auxiliary server |
Any |
9003 |
TCP |
1 |
NFM-P auxiliary server firewall and NAT rules
When there is a firewall at the NFM-P auxiliary server, the following initiating connection details must be considered. Network Interface number is in reference to Figure 7-3, Distributed NFM-P server/database deployment with multiple network interfaces.
Table 6-22: Firewall rules for traffic connecting to the NFM-P auxiliary server
Source |
Source port |
Destination port |
Protocol |
Network Interface |
Notes |
---|---|---|---|---|---|
NFM-P auxiliary server public address |
Any |
21 |
TCP |
3 |
Connect to NFM-P auxiliaryserver private address (for NAT) If FTP is required |
XML-API Client |
Any |
21 |
TCP |
3 |
If FTP is required |
XML-API Client |
Any |
22 |
TCP |
3 |
If SFTP is required |
NFM-P auxiliary server |
Any |
22 |
TCP |
1 |
From redundant NFM-P auxiliary server |
NFM-P auxiliary server public address |
>1023 |
>1023 |
TCP |
3 |
Connect to NFM-P auxiliary server private address (for NAT) If FTP is required |
NFM-P auxiliary server |
Any |
1095 |
TCP |
1 |
From redundant NFM-P auxiliary server |
NSP Cluster |
Any |
9100 |
TCP |
1 |
Node-exporter |
NFM-P server |
Any |
12300 - 12307 |
TCP |
1 |
-- |
NFM-P auxiliary server |
Any |
12300 - 12307 |
TCP |
1 |
From redundant NFM-P auxiliary server |
NFM-P server |
Any |
12800 |
TCP |
1 |
-- |
NFM-P auxiliary server |
Any |
12800 |
TCP |
1 |
From redundant NFM-P auxiliary server |
Note: Due to the size of SNMP packets, IP fragmentation may occur in the network. Ensure the firewall will allow fragmented packets to reach the server(s).
NSP flow collector controller firewall rules
When there is a firewall at the NSP flow collector controller, the following initiating connection details must be considered. Network Interface number is in reference to Figure 7-3, Distributed NFM-P server/database deployment with multiple network interfaces.
Table 6-23: Firewall rules for traffic connecting to the NSP flow collector controller
Source |
Source port |
Destination port |
Protocol |
Network Interface |
Notes |
---|---|---|---|---|---|
NFM-P server / Dedicated file server |
Any |
21 |
TCP |
1 |
If FTP is required |
NFM-P server / Dedicated file server |
Any |
22 |
TCP |
1 |
If SFTP is required |
NSP flow collector controller |
Any |
1090 |
TCP |
1 |
Inter-process communication |
NSP flow collector controller |
Any |
1098 |
TCP |
1 |
Inter-process communication |
NSP flow collector controller |
Any |
1099 |
TCP |
1 |
Inter-process communication |
NSP flow collector controller |
Any |
4444 |
TCP |
1 |
Inter-process communication |
NSP flow collector controller |
Any |
4445 |
TCP |
1 |
Inter-process communication |
NSP flow collector controller |
Any |
4446 |
TCP |
1 |
Inter-process communication |
NSP flow collector controller |
Any |
4457 |
TCP |
1 |
Inter-process communication |
NFM-P server |
Any |
7879 |
TCP |
1 |
CPROTO |
NSP |
Any |
7879 |
TCP |
1 |
CPROTO |
Web Client |
Any |
8080 |
TCP |
3 |
Admin WebUI (non-secure) |
NSP flow collector controller |
Any |
8083 |
TCP |
1 |
Inter-process communication |
Web Client |
Any |
8443 |
TCP |
1 |
Admin WebUI (secure) |
NSP flow collector controller |
Any |
9443 |
TCP |
1 |
Inter-process communication |
NSP flow collector |
Any |
22222 |
TCP |
1 |
SFTP |
NSP flow collector controller |
Any |
44444 |
TCP |
1 |
Inter-process communication |
NSP flow collector firewall rules
When there is a firewall at the NSP flow collectorr, the following initiating connection details must be considered. Network Interface number is in reference to Figure 7-3, Distributed NFM-P server/database deployment with multiple network interfaces.
Table 6-24: Firewall rules for traffic connecting to the NSP flow collector
Source |
Source port |
Destination port |
Protocol |
Network Interface |
Notes |
---|---|---|---|---|---|
NFM-P server / Dedicated file server |
Any |
21 |
TCP |
1 |
If FTP is required |
NFM-P server / Dedicated file server |
Any |
22 |
TCP |
1 |
If SFTP is required |
Managed Network |
Any |
2205 |
UDP |
2 / 4 |
CGNAT / IPFIX records |
Managed Network |
Any |
4739 |
UDP |
2 / 4 |
AA cflowd records |
NFM-P server |
Any |
7879 |
TCP |
1 |
CPROTO |
NSP |
Any |
7879 |
TCP |
1 |
CPROTO |
Web Client |
Any |
8080 |
TCP |
3 |
Admin WebUI (non-secure) |
NSP flow collector |
Any |
8083 |
TCP |
1 |
Inter-process communication |
Web Client |
Any |
8443 |
TCP |
1 |
Admin WebUI (secure) |
NSP flow collector controller |
Any |
44444 |
TCP |
1 |
Inter-process communication |
NFM-P auxiliary database firewall rules
When there is a firewall at the NFM-P auxiliary database, the following initiating connection details must be considered. Network Interface number is in reference to Figure 7-3, Distributed NFM-P server/database deployment with multiple network interfaces.
Since the inter-node communication should traverse a private LAN, it is not recommended to implement a firewall on this interface.
Table 6-25: Firewall rules for traffic connecting to the NFM-P auxiliary database
Source |
Source port |
Destination port |
Protocol |
Network Interface |
Notes |
---|---|---|---|---|---|
NFM-P auxiliary database |
Any |
22 |
TCP |
1 |
SFTP between clusters |
NSP flow collector |
Any |
5433 |
TCP |
1 |
JDBC |
NFM-P server |
Any |
5433 |
TCP |
1 |
JDBC |
NFM-P statistics auxiliary |
Any |
5433 |
TCP |
1 |
JDBC |
NSP analytics server |
Any |
5433 |
TCP |
1 |
JDBC |
NFM-P server |
Any |
7299 |
TCP |
1 |
RMI secure = true |
NFM-P server |
Any |
7299 - 7309 |
TCP |
1 |
RMI secure - false |
NFM-P auxiliary database |
Any |
50000 |
TCP |
1 |
Rsync between clusters |
NSP analytics server firewall rules
When there is a firewall at the NSP analytics server, the following initiating connection details must be considered. Network Interface number is in reference to Figure 7-3, Distributed NFM-P server/database deployment with multiple network interfaces.
Table 6-26: Firewall rules for traffic connecting to the NSP analytics server
Source |
Source port |
Destination port |
Protocol |
Network Interface |
Notes |
---|---|---|---|---|---|
NFM-P server |
Any |
8080 |
TCP |
1 |
HTTP |
NFM-P client |
Any |
8080 |
TCP |
1 |
HTTP |
NFM-P server |
Any |
8443 |
TCP |
1 |
HTTPS |
Web client |
Any |
8443 |
TCP |
1 |
HTTPS |
NFM-P client and client delegate firewall rules
When there is a firewall at the client or client delegate, the following initiating connection details must be considered. Network Interface number is in reference to Figure 7-3, Distributed NFM-P server/database deployment with multiple network interfaces.
Table 6-27: Firewall rules for traffic connecting to the NFM-P client and client delegate
Source |
Source port |
Destination port |
Protocol |
Network Interface |
Notes |
---|---|---|---|---|---|
NFM-P server |
-- |
-- |
ICMP |
3 |
Ping Client delegate only |
Managed Network |
Any |
20 |
TCP |
2 / 4 |
Active FTP 9500 MPR / Wavence (NEtO) |
Managed Network |
Any |
21 |
TCP |
2 / 4 |
9500 MPR / Wavence (NEtO) |
Managed Network |
Any |
22 |
TCP |
2 / 4 |
9500 MPR / Wavence (NEtO) |
Managed Network |
Any |
162 |
UDP |
2 / 4 |
9500 MPR / Wavence (NEtO) |
Managed Network |
>1023 |
>1023 |
TCP |
2 / 4 |
Passive FTP 9500 MPR / Wavence (NEtO) |
Managed Network |
5010 |
5010 |
UDP |
2 / 4 |
9500 MPR / Wavence (NEtO) |
Managed network firewall rules
When there is a firewall at the managed network, the following initiating connection details must be considered. Network Interface number is in reference to Figure 7-3, Distributed NFM-P server/database deployment with multiple network interfaces.
Table 6-28: Firewall rules for traffic connecting to the managed network
Source |
Source port |
Destination port |
Protocol |
Network Interface |
Notes |
---|---|---|---|---|---|
NFM-P server |
Any |
21 |
TCP |
2 / 4 |
FTP |
NFM-P auxiliary server |
Any |
21 |
TCP |
2 / 4 |
FTP NFM-P statistics auxiliary |
NFM-P client (NEtO) |
Any |
21 |
TCP |
2 / 4 |
FTP 9500 MPR / Wavence Management |
NFM-P server |
Any |
22 |
TCP |
2 / 4 |
SSH |
NFM-P auxiliary server |
Any |
22 |
TCP |
2 / 4 |
SSH NFM-P statistics auxiliary |
NFM-P client (NEtO) |
Any |
22 |
TCP |
2 / 4 |
SFTP 9500 MPR / Wavence Management (MSS-8/4/1) |
NFM-P server |
Any |
23 |
TCP |
2 / 4 |
Telnet |
NFM-P auxiliary server |
Any |
23 |
TCP |
2 / 4 |
Telnet NFM-P statistics auxiliary |
NFM-P client (NEtO) |
Any |
23 |
TCP |
2 / 4 |
Telnet 9500 MPR / Wavence Management |
NFM-P client |
Any |
80 |
TCP |
2 / 4 |
HTTP (GNE / Omni) |
NFM-P client (NEtO) |
Any |
80 |
TCP |
2 / 4 |
HTTP 9500 MPR / Wavence (MSS-8/4/1 and 9400 AWY) |
NFM-P server |
Any |
161 |
UDP |
2 / 4 |
SNMP |
NFM-P auxiliary server |
Any |
161 |
UDP |
2 / 4 |
SNMP NFM-P statistics auxiliary |
NFM-P client (NEtO) |
Any |
161 |
UDP |
2 / 4 |
SNMP 9500 MPR / Wavence Management |
NFM-P client |
Any |
443 |
TCP |
2 / 4 |
HTTPS (GNE / Omni) |
NFM-P server |
>1023 |
>1023 |
TCP |
2 / 4 |
Passive FTP transfer |
NFM-P auxiliary server |
>1023 |
>1023 |
TCP |
2 / 4 |
Passive FTP transfer NFM-P statistics auxiliary |
NFM-P client (NEtO) |
>1023 |
>1023 |
TCP |
2 / 4 |
Passive FTP transfer 9500 MPR / Wavence Management |
NFM-P server |
Any |
1491 |
TCP |
2 / 4 |
SNMP Streaming |
NFM-P server |
Any |
5001 |
TCP |
2 / 4 |
CPAA / vCPAA |
NFM-P client (NEtO) |
5010 |
5010 |
UDP |
2 / 4 |
SNMP 9500 MPR / Wavenece (MSS-8/4/1) |
NFM-P client (NEtO) |
Any |
11500 |
UDP |
2 / 4 |
Equipment View (GUI) 9500 MPR / Wavenece (MSS-1C / MPR-e) |
pki-server firewall rules
When there is a firewall at the pki-server, the following initiating connection details must be considered. Network Interface number is in reference to Figure 7-3, Distributed NFM-P server/database deployment with multiple network interfaces.
Table 6-29: Firewall rules for traffic connecting to the pki-server
Source |
Source port |
Destination port |
Protocol |
Network Interface |
Notes |
---|---|---|---|---|---|
NFM-P main server |
Any |
2391 |
TCP |
1 |
|
NFM-P database server |
Any |
2391 |
TCP |
1 |
|
NFM-P auxiliary server |
Any |
2391 |
TCP |
1 |
|
NFM-P auxiliary database server |
Any |
2391 |
TCP |
1 |
|
NSP analytics server |
Any |
2391 |
TCP |
1 |
|
NSP flow collector |
Any |
2391 |
TCP |
1 |
Remote authentication server firewall rules
When there is a firewall at the remote authentication servers, the following initiating connection details must be considered. Network Interface number is in reference to Figure 7-3, Distributed NFM-P server/database deployment with multiple network interfaces.
Table 6-30: Firewall rules for traffic connecting to remote authentication servers
Source |
Source port |
Destination port |
Protocol |
Notes | |
---|---|---|---|---|---|
NFM-P server |
Any |
49 |
TCP / UDP |
TACACS | |
NFM-P server |
Any |
389 |
TCP / UDP |
LDAP | |
NFM-P server |
Any |
636 |
TCP / UDP |
LDAPS | |
NFM-P server |
Any |
1812 |
UDP |
RADIUS |