Table 7-4
Telnet / FTP Firewall rules for traffic between the 5620 SAM Server(s)
and the managed network
(continued)
Protocol
From port
On
To port
On
Notes
TCP
Any
Server(s)
21
Managed Network
FTP requests (example:
STM, Accounting
Statistics, NE backups)
TCP
21
Managed Network
Any
Server(s)
FTP responses
TCP
> 1023
Managed Network
> 1023
Server(s)
Passive FTP ports for
data transfer
Table 7-5
SSH / SFTP / SCP Firewall rules for traffic between the 5620 SAM
Server(s) and the managed network
Protocol
From port
On
To port
On
Notes
TCP
Any
Server(s)
22
Managed Network
SAM SSH request
TCP
22
Managed Network
Any
Server(s)
SAM SSH response
TCP
Any
Managed Network
22
Server(s)
eNodeB and 1830 PSS
SFTP request
TCP
22
Server(s)
Any
Managed Network
eNodeB and 1830 PSS
SFTP response
TCP
> 32768
Server(s)
830
Managed Network
SSH request for eNodeB
TCP
830
Managed Network
> 32768
Server(s)
SSH response for
eNodeB
TCP
> 32768
Server(s)
830
Managed Network
SSHv2 request for
MME
TCP
830
Managed Network
> 32768
Server(s)
SSHv2 response for
MME
Table 7-6
1830 Firewall rules for traffic between the 5620 SAM Server(s) and
the managed network
Protocol
From port
On
To port
On
Notes
UDP
Any
1830
69
Server(s)
TFTP initiated by NE
UDP
Any
1830
Any
Server(s)
TFTP transfer
UDP
Any
1830
13528
Server(s)
CORBA Notification
1830 OCS only
Security
Firewall and NAT rules
....................................................................................................................................................................................................................................
....................................................................................................................................................................................................................................
7-18
5620 SAM
3HE-09809-AAAG-TQZZA 13.0 R7
Issue 1
December 2015