14.02.2014 Views

CommandCenter Secure Gateway - Admin Guide - Version ... - Raritan

CommandCenter Secure Gateway - Admin Guide - Version ... - Raritan

CommandCenter Secure Gateway - Admin Guide - Version ... - Raritan

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Appendix B CC-SG and Network Configuration<br />

This appendix contains network requirements, including addresses,<br />

protocols, and ports, of a typical CC-SG deployment. It includes<br />

information about how to configure your network for both external access<br />

and internal security and routing policy enforcement. Details are provided<br />

for the benefit of a TCP/IP network administrator. The TCP/IP<br />

administrator's role and responsibilities may extend beyond that of a<br />

CC-SG administrator. This appendix will assist the administrator in<br />

incorporating CC-SG and its components into a site's security access and<br />

routing policies.<br />

The tables contain the protocols and ports that are needed by CC-SG and<br />

its associated components.<br />

In This Chapter<br />

Required Open Ports for CC-SG Networks: Executive Summary.........279<br />

CC-SG Communication Channels.........................................................280<br />

Required Open Ports for CC-SG Networks: Executive Summary<br />

The following ports should be opened:<br />

Port Number Protocol Purpose Details<br />

80 TCP HTTP Access to CC-SG Not encrypted.<br />

443 TCP HTTPS (SSL) Access to CC-SG SSL/AES-128/AES-256 encrypted.<br />

8080 TCP CC-SG to PC Client SSL/AES-128/AES-256 encrypted<br />

if configured.<br />

2400 TCP Node Access (Proxy Mode) Not encrypted.<br />

5000 TCP Node Access (Direct Mode) These ports need to be opened per<br />

<strong>Raritan</strong> device that will be externally<br />

accessed. The other ports in the<br />

table need to be opened only for<br />

accessing CC-SG.<br />

AES-128/AES-256 encrypted if<br />

configured.<br />

80 and 443 for Control<br />

System nodes<br />

80, 443, 902, and 903 for<br />

Virtual Host and Virtual<br />

Machine Nodes<br />

TCP Virtual Node Access N/A<br />

279

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!