Internal corporate network rules

The following table outlines the firewall rules required for internal corporate network access for:

  • Core Appliance (physical or virtual) - All ports (except UDP) should be bi-directional to allow information / data exchange between systems.

  • Sentry Appliance (physical or virtual, ActiveSync / AppTunnel) - the Sentry must be able to resolve the Core hostname (via DNS lookup) or a hostfile entry must be added.

Core Appliance and the Sentry Appliance items communicate with each other.

Table 9.   Internal corporate network rules

Requirement

Description

Port

Traffic from Internal Corporate Network to Core

Core is in the DMZ

Core administrator access (System Manager)

Open HTTPS 8443 from the corporate network to the Core appliance

HTTPS 8443

Core administrator access Open HTTPS 443 and SSH 22 from the corporate network to the Core appliance HTTPS 443, SSH 22

Core Enterprise Connector (Optional LDAP Proxy)

Open HTTPS 443 from Enterprise Connector to Core HTTPS 443
Core Reporting Database (Optional) Ensure that HTTPS 7443 from the Reporting Database to Core is open. It is open by default. HTTPS 7443
Self-service user portal Open HTTPS 443 from the corporate network to the Core appliance HTTPS 443

Traffic from Core to Internal Corporate Network

Core is in the DMZ

LDAP / Active Directory LDAP User Lookup and Authentication TCP 636 (secure) -or- TCP 389
SMTP Relay for SMS and Email Notifications Open TCP 25 (if not in DMZ) and define the SMTP relay server TCP 25
DNS Lookup Open

Open UDP 53 (if not in DMZ) and define DNS server(s)

TCP is needed in case of large DNS Queries

UDP 53
NTP Time Synchronization Service Open UDP 123 (if not in DMZ) and define NTP server(s) UDP 123
Certificate / SCEP Server SCEP Proxy Configuration HTTP 443
Core access to Sentry Open HTTPS 9090 (primary access) and HTTPS 443 (view of Sentry certificate) to the Sentry appliance HTTPS 9090 and HTTPS 443
Sentry access to Core Open HTTPS 8443 to the Core appliance (HTTPS 8443 is the default, but HTTPS 443 is also supported.) HTTPS 8443

Traffic from Internal Corporate Network to Standalone Sentry

Standalone Sentry is in the DMZ

Core administrator access Open HTTPS 8443 from the corporate network to Sentry (System Manager access) HTTPS 8443
Core administrator access Open SSH 22 from the corporate network to Sentry SSH 22

Traffic from Standalone Sentry to Internal Corporate Network

Standalone Sentry is in the DMZ

CIFS-based Content Server Open TCP 445 if using Docs@Work with CIFS-based content servers TCP 445
Certificate / SCEP Server SCEP Server/CA Access (for CRL verification only) HTTP 80 or HTTPS 443
App Server for AppTunnel Open HTTP 80 or HTTPS 443 to the app/content server if configuring this Sentry for AppTunnel HTTP 80 or HTTPS 443 (typically)
Exchange ActiveSync Open HTTP 80 or HTTPS 443 to the ActiveSync server if configuring this Sentry for email service HTTP 80 or HTTPS 443
DNS Lookup Open UDP 53 (if not in DMZ) and define DNS server(s) UDP 53
NTP Time Synchronization Open UDP 123 (if not in DMZ) and define NTP server(s) UDP 123
LDAP / Active Directory Open TCP/UDP 389 Kerberos LDAP ping (optional for Kerberos-constrained delegation) TCP/UDP 389
SMTP Relay for Sentry Console Email Notifications Open TCP 25 (if not in DMZ) and define SMTP relay server TCP 25
Kerberos Server Open TCP 88 (for Kerberos-constrained delegation) TCP 88