Network Planning

HySecure can be deployed in a cluster with either 1 node or multiple nodes. In both the cases, the network configuration of each node should be planned beforehand.

As part of the network configuration planning, the following needs to be decided for all NICs:

  1. Interface IP Address - static or DHCP

  2. Hostname through which the node can be accessed

  3. DNS configuration using which the node will resolve domain names

  4. IP address for cluster nodes. Ensure that all the IP addresses belong to the same subnet. One IP address needs to be reserved to be configured as a virtual IP to access the cluster.

  5. If access to HySecure is to be allowed over the Internet, then port 443 should be NAT'ed to the HySecure virtual IP address.

  6. Firewall configuration changes:

# Traffic Direction To Be Allowed Port Number HySecure Deployed in
1 Inbound Traffic from (WAN or LAN) to DMZ 443 DMZ
2 Outbound Traffic from HySecure Node(s) to App Servers (LAN or WAN) Application Ports DMZ
3 Outbound Traffic from HySecure Node(s) to Authentication Servers - 389 for User Authentication
- 636 for User Password Change or Secure Authentication
- UDP 1812 for integrating a RADIUS Server
DMZ
  1. Following ports should be kept open between cluster nodes if HySecure nodes are segregated but are in same subnet and firewall is between them.
# Functionality TCP or UDP Port Number
1 User Traffic TCP 443
2 Monitoring TCP 80
3 Log Sync UDP 4002
4 Monitoring UDP 539
5 Database Access TCP 3306
6 Configuration Sync TCP 5536
7 Real Time Status TCP 939