Firewall Rules
Proper firewall configuration is essential for UTMStack v11 security and functionality. This guide details all required ports and provides security recommendations for different deployment scenarios.Core System Ports
These ports are required for basic UTMStack operation:Administrative Access
Port 22/TCP - SSH (Secure Shell)
Port 22/TCP - SSH (Secure Shell)
Purpose: Remote server administration and managementRequired for:
- System administration
- Installation and updates
- Troubleshooting
Port 80/TCP - HTTP Redirector
Port 80/TCP - HTTP Redirector
Purpose: Redirects HTTP traffic to HTTPSRequired for:
- Automatic HTTPS redirect
- Let’s Encrypt certificate validation (temporarily)
This port can be blocked after SSL certificate setup if not using auto-renewal.
Port 443/TCP - HTTPS
Port 443/TCP - HTTPS
Purpose: UTMStack web-based graphical user interface (primary access)Required for:
- Web interface access
- API connections
- User authentication
This is the primary access point. Always use HTTPS, never HTTP.
Port 9090/TCP - Cockpit
Port 9090/TCP - Cockpit
Purpose: Web-based server management interfaceRequired for:
- System monitoring
- Container management
- Resource utilization viewing
Agent Communication Ports
These ports are required for communication between UTMStack agents and the server:Port 9000/TCP
Agent-to-Manager CommunicationRequired for UTMStack agents to communicate with the manager server. This port handles agent registration and heartbeat traffic.
Port 9001/TCP
Agent Data TransferUsed for transferring log data and telemetry from agents to the manager server.
Port 50051/TCP
gRPC Agent CommunicationHigh-performance gRPC protocol for agent communication, including file transfers and advanced features.
New in v11: Agent communication has been optimized for better performance and security with enhanced TLS encryption.
Integration and Data Collection Ports
Additional ports are required based on your configured integrations:Syslog Receivers
Syslog Ports Configuration
Syslog Ports Configuration
Port 514/UDP: Standard SyslogPort 514/TCP: Syslog over TCPPort 6514/TCP: Syslog over TLS (Recommended)
NetFlow/IPFIX
Flow Data Collection
Flow Data Collection
Port 2055/UDP: NetFlow v5/v9Port 4739/UDP: IPFIX
Cloud Integrations
Cloud integrations (AWS, Azure, GCP, Office 365) typically use outbound HTTPS (443) connections only. No inbound ports required.
Multi-Node Deployment Ports
For deployments with multiple nodes (manager + workers):Manager-to-Worker Communication
Elasticsearch Cluster (if distributed)
Federated Deployment Ports
For MSP deployments with central federation server:UFW Configuration Examples
Basic Single-Node Deployment
Multi-Node Deployment
Cloud Provider Specific Configurations
AWS Security Groups
Azure Network Security Groups
Security Best Practices
Principle of Least Privilege
- Only open required ports
- Restrict source IPs when possible
- Use network segmentation
- Regular security audits
Network Segmentation
- Separate management network
- Isolated agent network
- DMZ for log collectors
- Internal-only cluster communication
Monitor Access
- Log all connection attempts
- Alert on unauthorized access
- Regular review of firewall logs
- Use intrusion detection
Keep Updated
- Apply security patches
- Update firewall rules
- Review access requirements
- Document changes
Testing Connectivity
Test Open Ports
Verify Agent Connectivity
Troubleshooting
Cannot access web interface
Cannot access web interface
Check:
Agents cannot connect
Agents cannot connect
Check:
No logs from syslog sources
No logs from syslog sources
Check:
Integration-Specific Port Requirements
Additional ports may be required for specific integrations. Refer to each integration’s documentation for detailed port requirements and security recommendations.
- Windows agents: 9000-9001/TCP, 50051/TCP
- Linux agents: 9000-9001/TCP, 50051/TCP
- Network devices: 514/UDP (Syslog), 2055/UDP (NetFlow)
- Firewalls: 514/TCP (Syslog-TLS recommended)
- Custom collectors: Varies by integration
Next Steps
SSL Certificate Setup
Secure your installation
Agent Installation
Integrations