Skip to main content
Versa Networks

Firewall Requirements

Versa-logo-release-icon.pngFor supported software information, click here.

The functions of the Versa Networks solution are fully distributed among the headend devices—Director, Analytics, and Controller—and the Versa Operating SystemTM (VOSTM) hub and branch devices. The headend devices might be colocated within a single data center or they might be distributed among multiple data centers. If your network has firewall devices, you must ensure that the ports required for the Versa Networks solution to operate are open so that the necessary communication between and among the Versa components can occur. If you use security zoning for the headend components, you must design your security policies so that they do not interfere with these communication channels.

This article lists the firewall requirements for Director, Analytics, Controller, and VOS (branch) devices, and for Versa Concerto, which is a component of the Versa self-service portal based for secure SD-WAN and SASE users.

When discussing the firewall requirements for headend and VOS devices, the following terminology is used to describe the traffic direction:

  • Inbound—Traffic flows from the network into the Versa headend or VOS device using the specified protocol and through the specified port or ports.
  • Outbound—Traffic flows out from the Versa headend or VOS device to the network using the specified protocol and through the specified port or ports

When discussing the firewall requirements for headend devices, the following terminology is used to describe interfaces:

  • Northbound network—Interface connects to the management network. You can use this interface to integrate with external services such as third-party orchestrators, automation tools, and OSS/BSS applications. On Analytics and Director nodes, the northbound interface is eth0.
  • Southbound network—Interface connects to the network that is used to send control traffic for communication between the headend components and the VOS branch devices. On Analytics and Director nodes, the southbound interface is eth1.

The following topology shows an example of the northbound and southbound networks, illustrating how the interfaces on Versa Director, Analytics, and Controller nodes connect to these two networks. These interfaces are used for control traffic. The VOS branch devices and the Controller nodes connect to one or more transport networks, and these networks are used for data traffic.

northbound-southbound-network.png

Analytics Firewall Requirements

Analytics nodes use the following ports to communicate with other devices in the network. On an Analytics node, the northbound interface is eth0, which is the management interface, and the southbound interface is eth1.

Note that Versa Director and Versa Analytics nodes are management devices and thus send only control plane traffic. They do not route any data plane traffic. Only a VOS device can be configured as a router to route data traffic among its interfaces.

Purpose Traffic Direction Interface Protocol Port Numbers
Application port for REST access Inbound Northbound network TCP 443 (Releases 21.1 and later),
8080 (before Release 21.1.0),
8443
Communication with Director node Outbound Southbound network TCP, UDP 9182, 9183
DNS server, for reverse lookup Outbound Northbound or southbound, depending on location of DNS server UDP 53
Intercluster database and client communication Southbound network TCP 7000, 7001, 7199, 8983, 9042, 9160
Release 20.x Fusion-specific: 2181, 2888, 3888
Log collector health monitor Inbound Southbound network ICMP  
Log collector port where logs are received Inbound Southbound network TCP User configurable

Monitoring agent ports to retrieve health status and statistics about Analytics nodes

Inbound Northbound network TCP 8010, 8020
REST access port configuration and diagnostics of various services running on Analytics nodes Inbound Southbound network TCP 5000, 5010, 8008
SMTP mail server, for reporting Outbound Northbound network TCP User configurable
Standard NTP, for time synchronization Inbound Northbound or southbound, depending on location of NTP server UDP 123
Standard SSH Inbound Northbound network TCP 22
Troubleshooting and debugging of search engine using web portal Inbound Northbound network TCP 8983

Concerto Firewall Requirements

Concerto orchestrator uses the following ports to access and communicate with other devices in the network.

Purpose Traffic Direction Protocol Port Numbers
Docker control plane communication, for communication between nodes within the Concerto cluster Inbound TCP, UDP 7946

Docker swarm cluster

Inbound TCP 2377
Encapsulating Security Payload (ESP) for Docker overlay Inbound IP

GlusterFS cluster

Inbound TCP 24007

GlusterFS rpcbind

Inbound TCP 111
GlusterFS service port corresponding to brick Inbound TCP 49152

HTTP

Inbound TCP

80

HTTPS

Inbound TCP 443

Kafka brokers client for Concerto cluster

Inbound TCP 9092 - (9091 + i), where i is the number of Concerto nodes in the cluster
Overlay network traffic Inbound UDP 4789

SSH

Inbound TCP 22

Zookeeper client for Concerto cluster

Inbound TCP 2181

Director Firewall Requirements

To allow seamless connectivity among the devices across intermediary firewalls and routing elements, ensure that the ports listed in the following table are open on the Director node. On a Director node, the northbound interface is eth0, which is the management interface, and the southbound interface is eth1.

Note that Versa Director and Versa Analytics nodes are management devices and thus send only control plane traffic. They do not route any data plane traffic. Only a VOS device can be configured as a router to route data traffic among its interfaces.

Purpose Traffic Direction Interface Protocol Port Numbers
Access between active and standby Director nodes, to share HA-related information from the NCS database—Open only between the active and standby Director nodes; block the ports to other systems. Inbound Northbound or southbound network, but preferably southbound TCP 4566, 4570
Access between active and standby Director nodes, to share HA-related information from the PostgreSQL database—Open only between the active and standby Director nodes; block the ports to other systems. Inbound Southbound network, especially if Northbound network is public-facing TCP

5432

Access between active and standby Director nodes, when secure mode is enabled in Director using Encapsulating Security Payload (ESP) Inbound Northbound or southbound network, but preferably southbound or, interface or IP address on which high availability is enabled IP (protocol 50)
Access between active and standby Director nodes, when secure mode is enabled in Director for IPsec IKE—Open only between the active and standby Director nodes; block the ports to other systems. Inbound Northbound or southbound network, but preferably southbound or, interface or IP address on which high availability is enabled UDP

500, 4500

HTTPS access to Director GUI from any host Inbound Northbound network TCP 443
HTTPS REST API—Access from Analytics node, Concerto nodes, VMS nodes, and peer Directors. Additionally, if the Director acts as a central authentication server, allow access from central-auth client. Inbound Northbound or southbound, depending on topology TCP 9182, 9183
If central authentication method is used, allow HTTPS REST API access to the central authentication server. Outbound Northbound or southbound, depending on the API access interface TCP 9182, 9183
Netconf communication with CPE devices over the overlay network Outbound Southbound network TCP 2022
Receive alarms from Analytics node Inbound Northbound or southbound, depending on topology TCP, UDP 20514
REST API communication with CPE devices over the overly network Outbound Southbound network TCP 8443
SSH access between the Analytics and Director nodes, and communication between HA-enabled Director nodes for replication; required for access from Director node to VOS branch, for ZTP Inbound Northbound or southbound, TCP 22
uCPE VM console access to Director GUI from any host—Open only if you need uCPE access; otherwise, block the port. Inbound Northbound network TCP

6080

uCPE VNF proxy access to Director GUI from any host—Open only if you need uCPE access; otherwise, block the port. Inbound Northbound network TCP

9090

VOS Device Firewall Requirements

VOS devices use the following WAN network ports to communicate with Director, Analytics, and Controller nodes, as well as with other devices in the network. Note that a Versa Controller device is simply a VOS instance.

Purpose Traffic Direction Protocol Port Numbers
Certificate access Inbound TCP 8080
Encapsulating Security Payload (ESP) Both IP (protocol 50)
High availability (HA) between HA-enabled VOS nodes Both TCP and UDP

TCP ports: 1024 through 1120, 3000 through 3003, 9878

UDP ports: 3002, 3003

IPsec IKE Both UDP 500, 4500

Management interface that has the public IP address, for CMS-based cloud deployment.

Note that after deploying the cloud VOS branch/hub-controller with the CMS connector, you must remove the public IP address of eth0 from the cloud instance portal. The Director node will manage the VOS branch/hub-controller using the SD-WAN overlay IP address, and will not use the eth0 public IP address. Additionally, you must change the default passwords for all cloud-hosted VOS nodes, for admin and versa accounts. 

Inbound
Both
Both
TCP
TCP
ICMP
2022
22
Netconf from Director node to VOS device Inbound TCP 2022
Resolve FQDN of staging Controller node Outbound TCP 53
REST port, for fetching operational information from VOS device Inbound TCP 8443
Speed test Both TCP 5201
SSH; required for access between VOS branch and Director node, for ZTP; optional on other ports, such as management, WAN, and LAN Both TCP 22
URL-based ZTP Both ICMP
VXLAN communication between VOS hub, VOS branch, and Controller device Both UDP 4790
VXLAN communication between VOS hub, VOS branch, and Controller devices for HA setups that have cross-connect links (failover pool created using CGNAT) Both UDP Default port range: 1024 through 32000

VMS Firewall Requirements

For Releases 21.2.1 and later.

Versa Messaging Service (VMS) uses the following control node and worker node ports to access and communicate with other devices in the network.

VMS Control Nodes

Purpose Traffic Direction Protocol Port Numbers Used By Interfaces

etcd server client API

Inbound

TCP

2379 through 2380

etcd, kube-apiserver

All

Kube controller manager

Inbound

TCP

10252

Self

All

Kube scheduler

Inbound

TCP

10251

Self

All

Kubelet API

Inbound

TCP

10250

Self, control plane

All

Kubernetes API server

Inbound

TCP

6443

All

Management

VMS Worker Nodes

Purpose Traffic Direction Protocol Port Numbers Used By Interfaces
Communication between Active Directory and WMI Inbound TCP 389 WMI All
Communication with Director node Outbound TCP, UDP 9182, 9183 VMS, for API calls to Director node All

In-memory database

Inbound

TCP

6379

VOS device

Internal only

Kubelet API

Inbound

TCP

10250

Self, control plane

All

Message server, HA

Inbound

TCP

3074, 3101, 3102

VOS device

All

Node port services

Inbound

TCP

30000 through 32767

All

Internal

 

Versa Director connector

Inbound

TCP

8080

VOS device

Internal only

Versa package service

Inbound

TCP

443

VOS device

All

Versa passive authentication application

Inbound

TCP

7000

VOS device

Internal only

Versa passive authentication collector, for port between WMI (client) and VMS (server)

Inbound

TCP

3092

WMI

All

Additional Security Hardening

For security reasons, Versa recommends that you allow inbound traffic from authorized IP addresses only. The following two examples illustrate types of inbound traffic to allow:

  • You should open port 22 (for TCP) only for the IP addresses of devices from which you connect to the Versa component for management purposes.
  • You should allow communication between headend components, such two Versa Directors in a high availability (HA) deployment, only from the IP addresses of the headend components. For example, if the southbound IP addresses are 10.0.0.1 for the active Director node and 20.0.0.1 for the standby Director node, the standby Director node should allow access to its ports 4566, 4570 and 5432 only from the IP address of the active Director node (10.0.0.1).

Supported Software Information

Releases 20.2 and later support all content described in this article, except:

  • Releases 21.2.1 and later support Versa Messaging Service (VMS).
  • Releases 22.1.4 and later allow inbound access to ports 9182 and 9183 between HA pair Directors.
  • Was this article helpful?