Deployment Firewall Settings

Deployment Firewall Settings

This section describes what you need to consider about firewalls, firewall openings and ports in a typical setup.

Note that your setup might differ - this just describes a common setup using default ports and values.



Separate Ceptor Servers and Gateways (recommended)

In this setup, which is the recommended setup, gateways are deployed together with a load balancer in a DMZ zone, and the Ceptor server is behind the inner firewall.

This has the disadvantage that 4 machines are used, but the advantage in security that if someone manages to breach the security on the machine hosting the gateway, they have a 2nd firewall to bypass before they get access to sensitive information such as private keys or passwords in the configuration.

In this setup, the following traffic flows between components, so you need to open the relevant ports in the firewalls

Port

From

To

Purpose

Notes

Port

From

To

Purpose

Notes

80/443

Internet

Loadbalancer

HTTP and HTTPS traffic from clients



80/443

Loadbalancer

Gateway1/2

HTTP and HTTPS traffic from load balancer to gateway



8080 or 443

Gateway 1/2

Application servers

HTTP or HTTPS traffic from gateway to application servers

Depends on configured destinations what ports and protocols are used.

21233

Gateway 1/2

Ceptor Server 1/2

Connection from gateway to configuration server



21236

Gateway 1/2

Ceptor Server 1/2

Connection from gateway to log server



21342

Gateway 1/2

Ceptor Server 1/2

Restricted Connection from gateway to session controller

Connection is restricted, meaning not all proprties are sent to gateway, only "safe" properties from the session are sent to limit information available in the DMZ zone.

21344

Ceptor Server 1

Ceptor Server 2

Connection for mirroring data between session controllers in a cluster



21233

Ceptor Server 2

Ceptor Server 1

Connection between configuration servers to synchronize changes to the configuration.



21112

Ceptor Server 1

Ceptor Server 2

Connection from statistics server to configuration servers to read statistics retrieved from connected servers and agents.



Connections used for management and administration

4242/4243

Workstation

Ceptor Server 1/2

HTTP/HTTPS Connection to Ceptor Console from a browser used to monitor and manage Ceptor.



4343/4344

Workstation

Ceptor Server 1/2

HTTP/HTTPS Connection to Useradmin Application from a browser used to manage users in the useradmin database.

Only used in setups where useradmin database / API is used.

Potential connections from applications servers running Application Server Plugins or Agents

21233

Application Servers

Ceptor Server 1/2

Connection from agents to configuration server



21236

Application Servers

Ceptor Server 1/2

Connection from agents to log server



21343

Application Servers

Ceptor Server 1/2

Connection from agents to session controller



15000

Application Servers

Ceptor Server 1/2

Connection to Useradmin server from useradmin client and useradmin access APIs

Only used in setups where useradmin database / API is used.

Ceptor Server and Gateway Deployed on Same Machine

Note that although it is possible to run a setup like this, we never recommend doing it for production environments.

The best security is archived if you separate gateway and server and deploy the server inside a 2nd firewall layer.

A better alternative, depending on the capabilities of the load balancer might be something like this. If your load balancer is just a dumb TCP forwarder, this is security-wise not any better than the one above, but if your load balancer also has Application Firewall capability you will be more secure this way.



In both cases, the number of port openings in the firewall will be limited compared to the setup with separate servers.



© Ceptor ApS. All Rights Reserved.