Non-Secure Environment

Firewall Ports

Figure D-2 shows the connection points between the physical components in an Operations Sentinel enterprise environment. It shows the communication paths and the contact port assignments for Operations Sentinel Console applications. If you place a firewall between any of the components, it must be configured to allow communication for the contact port assignments shown in the communication path.

Figure D.2. Overview of Operations Sentinel Ports in Non-Secure Environment

Overview of Operations Sentinel Ports in Non-Secure Environment

The firewall must allow access to the following ports. All ports listed are TCP unless noted otherwise.

Definition of Ports

The following illustrations and accompanying definitions describe the individual contact port assignments and how they are used by Operations Sentinel services and applications.

spo_pcam 5002/tcp

The port (see Figure D-3) where the PCAM service listens for connections from Operations Sentinel Console clients. The clients are the components of the Operations Sentinel services that execute on the Operations Sentinel server.

Figure D.3. Port spo_pcam 5002/tcp

Port spo_pcam 5002/tcp

spo_log 5003/tcp

The port (see Figure D-4) where the SPLOG service listens for connections from various Operations Sentinel components used by Operations Sentinel Logging to receive control information about Operations Sentinel logs.

spo_vbc 5003/udp

A UDP port (see Figure D-4) that receives status from the OS 2200 console and from the VMUX service on the hosting Operations Sentinel server. The firewall must allow the broadcast from the hosting Operations Sentinel server to the managing server.

Figure D.4. Ports spo_log 5003/tcp and spo_vbc 5003/udp

Ports spo_log 5003/tcp and spo_vbc 5003/udp

spo_amux 5004/tcp

The listening port (see Figure D-5) for the AMUX service where it receives connections from the UCI processes that are launched to handle UNIX, Linux, and MCP connections. Similar to spo_pc, the Windows operating system on which Operations Sentinel server software is running selects the other end of these connections from the user pool of ports. This port is strictly internal to the managing Operations Sentinel server. The firewall does not need to open it.

Figure D.5. Port spo_amux 5004/tcp

Port spo_amux 5004/tcp

spo_alert 5005/tcp

The listening port (see Figure D-6) on the Operations Sentinel server for the SPALS service that receives alerts from the Operations Sentinel server components. These include alerts that Operations Sentinel itself raises and alerts raised by event reports a customer built using the Event Services API. In contrast, the Windows Resource Monitor does not use it.

The firewall must allow the workstation to connect to the managing Operations Sentinel server using this TCP port. It also must allow any API clients sending AL event reports and any systems using the UNIX/Linux Resource Monitor to connect to the managing Operations Sentinel server using this TCP port.

Figure D.6. Port spo_alert 5005/tcp

Port spo_alert 5005/tcp

spo_log2 5006/tcp

The listening port (see Figure D-7) that receives information, through LG event reports, that is recorded in Operations Sentinel logs. The firewall must allow the workstation and the Operations Server to connect to the managing Operations Sentinel server using this TCP port.

Figure D.7. Port spo_log2 5006/tcp

Port spo_log2 5006/tcp

spo_universal 5007/tcp

The listening port (see Figure D-8) on the Operations Sentinel server used by the universal event server, SPUES, for the receipt of events from Operations Sentinel components. Operations Sentinel supplies agents for managed systems, and customers can write agents using the Event Services API library. The firewall must allow the connection to the managing Operations Sentinel server from any network entity that can send Operations Sentinel events. This includes all managed systems and any other nodes running a user-written Operations Sentinel API client.

spo_vci 5009/tcp

The port (see Figure D-9) where the VCI component running on the Operations Server of a ClearPath Dorado Enterprise System listens for connections from the OS 2200 Console interface VMUX service. This is similar to the spo_pc and spo_mcp defined server (listen) ports on other physical machines where Operations Sentinel components connect. The firewall must allow the connection from the managing Operations Sentinel server and each workstation to the Operations Server.

Figure D.8. Port spo_universal 5007/tcp

Port spo_universal 5007/tcp

Figure D.9. Port spo_vci 5009/tcp

Port spo_vci 5009/tcp

spo_spud 5010/tcp

The listening port on the Operations Sentinel server that is used by the universal data server, SPUD. Communications on this port are within the Operations Sentinel server. Hence, this port does not affect communications outside the Operations Sentinel server.

spo_spurt 5011/tcp

The listening port on the Operations Sentinel server used by the universal runtime server, SPURT, for the receipt of events from the Operations Sentinel Console (OSC). Since the OSC runs on the workstation, the firewall allows the connection from the workstation to the managing Operations Sentinel server through this port.

spo_sporegistryservice-8733/tcp

The listening port on the Operations Sentinel server used by the SpoRegistryService is to read and write remote registry entries. The firewall must allow the connection from the managing Operations Sentinel server to the workstation and other components of Operations Sentinel through this port.

spo_mcp 10301/spo_msg

The TCP port (see Figure D-10) where a UCI instance connects on an MCP system that Operations Sentinel is monitoring. The firewall must allow the connection from the managing Operations Sentinel server to the MCP system.

spo_mcp2 10302/spo_msg

The TCP port (see Figure D-10) where a UCI instance connects to the second (test) instance of an Operations Sentinel Interface to ClearPath MCP on an MCP system. If the site uses this port, which is usually when there are three or four Operations Sentinel servers, the firewall must allow the connection from the managing Operations Sentinel server to the MCP system.

Figure D.10. Ports spo_mcp 10301/spo_msg and spo_mcp2 10302/spo_msg

Ports spo_mcp 10301/spo_msg and spo_mcp2 10302/spo_msg

spo_telnet 23/spo_telnet

This is the default port (see Figure D-11) where the Operations Sentinel universal control interface (UCI, used for UNIX and Linux monitoring) attaches on a managed system where that TELNET of the system server is listening. If you are using standard TELNET to monitor your UNIX and Linux or other TELNET-compliant system (DCP, VAX, and so forth), the firewall must allow the TCP connection from the managing Operations Sentinel server to the managed system.

Figure D.11. Port spo_telnet 23/spo_telnet

Port spo_telnet 23/spo_telnet

spo_ssh 22/spo_ssh, spo_ssh1 22/spo_ssh1, and spo_ssh2 22/spo_ssh2

The default port (see Figure D-12) where the Operations Sentinel universal control interface (UCI, used for UNIX and Linux monitoring) attaches on a managed system where that SSH service of the system is listening. If your site is using SSH to monitor an SSH-compliant system, the firewall must allow the TCP connection from the managing Operations Sentinel server to the managed system.

Figure D.12. Port spo_ssh 22/spo_ssh, spo_ssh1 22/spo_ssh1, and spo_ssh2 22/spo_ssh2

Port spo_ssh 22/spo_ssh, spo_ssh1 22/spo_ssh1, and spo_ssh2 22/spo_ssh2

445 and 139

Both the UDP and TCP versions of port 445 (see Figure D-13) are assigned to Microsoft with the name Microsoft-DS. Port 139 (see Figure D-13]) is the older version of port 445. OS 2200 Console View on an Operations Sentinel workstation initiates a connection to the Operations Server on port 445 to retrieve the logical console port value stored in a registry key. Port 139 is used if port 445 is not available.

The firewall must open one of these ports from the workstation to the Operations Server.

In addition, console macros and macro generators stored on the Operations Server are only available if port 445 or port 139 is open. The firewall must leave port 445 or port 139 open from the workstation to the managing Operations Sentinel server to allow it to read logs on the Operations Sentinel server. In a Dorado Series, console logs are kept on the Operations Server. If the Operations Sentinel workstation operator reads these logs, port 445 or port 139 must be open from the workstation to the Operations Server.

Figure D.13. Ports 445 and 139

Ports 445 and 139

ICMP

PING uses ICMP for IPv4 and ICMPv6 for IPv6 (see Figure D-14) rather than UDP or TCP. To use spo_ping for checking managed systems or for checking connectivity using Operations Sentinel Console, the firewall must allow the ICMP protocol to pass through the firewall from the Operations Sentinel workstation to the managed system and be permitted on the target system.

Figure D.14. Port ICMP

Port ICMP