Skip to main content
Version: 3.3.1

Networking

Network Ports

The table below details the ports that must be accessible for ASI to operate in both standalone and clustered modes. If you have a software firewall enabled on your systems, you will need to open the incoming ports using the iptable, nftables or firewall commands. You can configure different port numbers for your environment should you require to do so, instructions on how to do this is detailed in the configuration section.

Product Communication Rules

User facing access

SourceDestinationSource PortDestination PortDescription
UsersASI44352000Fronting load balancer running on 443

Communication required between ASI modules

SourceDestinationDestination PortDescription
ASI (legacy)ASI (legacy)5701ASI legacy cache intercommunication
ASI (all modules)Authenticator50443Authentication communication
ASI (all modules)ASI (management-service)58090Management-Service communication
ASI (management-service)Vault58091Vault
VaultVault58092Vault intercommunication
ASI (all modules)ASI (datagrid)47100Data grid intercommunication
ASI (all modules)ASI (datagrid)47500Data grid intercommunication
ASI (core)ASI (dashboards)52001ASI Dashboards Module

ASI/BES Communication

SourceDestinationDestination PortDescription
ASI (events module)ASI (management-service)58090Management-Service communication
ASI (legacy)ASI (legacy)50819BES webservices
ASI (core)ASI (events)52002ASI Events module
ASIDatabase5432PostgreSQL (database)
BES (nnBES)ASI (legacy)50050ASI Event Feed (nnBES)

DataHub/ASI Communication

SourceDestinationDestination PortDescription
ASI (datahub module)ASI (management-service)58090Management-Service communication
ASI (legacy)DataHub50005DataQuery Port
ASI (core)DataHub52003ASI DataHub Module

Load Balancers

Flow

Typically, your environment will use TLS certificates, and users will log in through the ASI load balancer via port 443. The load balancer will then direct traffic to port 52000. Other ports should pass through the load balancer on the port they were received on. The configuration below shows a typical setup for load balancers.

Health Rules

Perform health checks on each cluster member for the product's load balancer. For a three-node cluster, three health checks should be configured—one for each instance. Standalone environments typically don't require a load balancer, but if one is provisioned, configure it for the single instance.

Configuration

Load BalancerURL CheckResponse CodeModeSticky SessionsInbound TrafficOutbound Traffic
asihttps://asi-instance:52000/status200round-robinyes44352000
beshttps://bes-instance:50819/escapex/login.jsp200round-robinno50819
5432
50819
5432
datahubhttps://datahub-instance:50005/datahub/v3/health200round-robinno50000
50005
50000
50005

For any updates or clarifications, please contact the support team.