Common Requirements: All devices
All Replibit devices must be able to communicate with the following destinations and ports:
Replibit License Portal
|
|
Cloud Key Management Services
|
|
Telemetry Services The Replibit telemetry service utilizes a highly-dispersed cloud data provider with a large list of volatile IP addresses. A list of the current IP addresses in use can be found here |
|
Update Manager
|
|
Update Repository
|
|
Ubuntu Package Mirror
|
Additional requirements:
Management Portal requirements
Most partners use an Axcient-hosted management portal, in which case all network security is fully managed by the Axcient cloud engineering team.
If you are self-hosting your management portal, please refer to the following when configuring your firewall rules:
Inbound trafficThe Replibit Management Portal must have a public IP address, preferably with a fully qualified DNS domain name ‘A’ record in place to make referencing it more user friendly. The following inbound ports must be accessible from the Internet at large to the Management Portal:
|
Outbound trafficThe Management Portal makes no unique outbound connections. (Please take note of the common requirements of all devices described at the beginning of this article.) |
Appliance requirements
The Replibit appliance is typically deployed on the same LAN as the protected systems it is servicing. This means NO inbound firewall rules are generally required. (The appliance has its own internal firewall restricting inbound traffic at the device level.)
However, if you have deployed a firewall between your protected systems and your appliance, the following ports need to be accessible:
Inbound traffic
|
Outbound trafficIn addition to the common network ports listed at the top of this article, the Replibit appliance requires the following ports and destinations to be accessible: Management PortalAppliances must be able to communicate with the management portal on the following ports:
VaultAppliances must be able to communicate with all Vaults configured for Replication
Scale-Out CloudAppliances must be able to communicate with all available Scale-Out Cloud storage nodes within the configured data center. The URLs and IP addresses of the Scale-Out Cloud are dynamic and subject to change as nodes are added over time.
|
Vault requirements
Most partners use Axcient-hosted cloud vaults, in which case all network security is fully managed by the Axcient cloud engineering team.
However, if you are self-hosting some or all of your vaults, refer to the following when configuring your firewall rules:
Inbound traffic
|
Outbound trafficIn addition to the common network ports listed at the beginning of this article, the vault requires the following ports and destinations to be accessible: Management PortalVaults must be able to communicate with the Management Portal on the following ports:
|
Comments
0 comments
Article is closed for comments.