Proper firewall configuration is essential for UTMStack v11 security and functionality. This guide details all required ports and provides security recommendations for different deployment scenarios.
Security First: Always follow the principle of least privilege. Only open ports that are necessary and restrict access to trusted networks or IP addresses.
These ports are required for communication between UTMStack agents and the server:
Port 9000/TCP
Agent-to-Manager CommunicationRequired for UTMStack agents to communicate with the manager server. This port handles agent registration and heartbeat traffic.
Copy
Ask AI
# Allow from agent networkssudo ufw allow from AGENT_NETWORK to any port 9000 proto tcp
Port 9001/TCP
Agent Data TransferUsed for transferring log data and telemetry from agents to the manager server.
Copy
Ask AI
# Allow from agent networkssudo ufw allow from AGENT_NETWORK to any port 9001 proto tcp
Port 50051/TCP
gRPC Agent CommunicationHigh-performance gRPC protocol for agent communication, including file transfers and advanced features.
Copy
Ask AI
# Allow from agent networkssudo ufw allow from AGENT_NETWORK to any port 50051 proto tcp
New in v11: Agent communication has been optimized for better performance and security with enhanced TLS encryption.
# On all nodes, allow from other cluster nodessudo ufw allow from CLUSTER_NODE_IP to any port 2377 proto tcpsudo ufw allow from CLUSTER_NODE_IP to any port 7946sudo ufw allow from CLUSTER_NODE_IP to any port 4789 proto udp
Port 9200/TCP: Elasticsearch HTTP APIPort 9300/TCP: Elasticsearch transport
Copy
Ask AI
# Between cluster nodes onlysudo ufw allow from CLUSTER_NODE_IP to any port 9200 proto tcpsudo ufw allow from CLUSTER_NODE_IP to any port 9300 proto tcp
#!/bin/bash# Basic UTMStack v11 firewall configuration# Reset UFWsudo ufw --force reset# Default policiessudo ufw default deny incomingsudo ufw default allow outgoing# SSH (from admin IP only)sudo ufw allow from 192.168.1.100 to any port 22 proto tcp# Web interface (from SOC network)sudo ufw allow from 192.168.1.0/24 to any port 443 proto tcpsudo ufw allow from 192.168.1.0/24 to any port 80 proto tcp# Cockpit (admin only)sudo ufw allow from 192.168.1.100 to any port 9090 proto tcp# Agent communication (from agent network)sudo ufw allow from 10.0.0.0/8 to any port 9000 proto tcpsudo ufw allow from 10.0.0.0/8 to any port 9001 proto tcpsudo ufw allow from 10.0.0.0/8 to any port 50051 proto tcp# Syslog (from network devices)sudo ufw allow from 10.0.0.0/8 to any port 514 proto udpsudo ufw allow from 10.0.0.0/8 to any port 6514 proto tcp# Enable firewallsudo ufw enablesudo ufw status verbose
#!/bin/bash# Multi-node UTMStack v11 firewall configuration# Include basic rules above, then add:# Cluster communication (between all nodes)CLUSTER_NODES=("10.10.10.11" "10.10.10.12" "10.10.10.13")for NODE in "${CLUSTER_NODES[@]}"; do sudo ufw allow from $NODE to any port 2377 proto tcp sudo ufw allow from $NODE to any port 7946 sudo ufw allow from $NODE to any port 4789 proto udp sudo ufw allow from $NODE to any port 9200 proto tcp sudo ufw allow from $NODE to any port 9300 proto tcpdonesudo ufw enable
Additional ports may be required for specific integrations. Refer to each integration’s documentation for detailed port requirements and security recommendations.