SteelCentral™ Enterprise NetProfiler Appliance Installation Guide
5
Cable connections
Preparing the Installation
Communication between SteelCentral products
If you lock down your network on a port-by-port basis, ensure that the following ports are open between SteelCentral
products:
TCP/22 – (ssh) Used by the NetProfiler to transfer upgrade packages to other SteelCentral devices that are
connected to it.
TCP/443 – Used for Packet Analyzer communicates with the web interface of the NetShark over this port.
TCP/8443 – Used for the exchange of encryption certificates between SteelCentral products.
TCP/41017 – Used for encrypted communication between NetProfiler and Flow Gateway, NetShark and
AppResponse appliances.
UDP/123 – (ntp) Used to synchronize time between a Flow Gateway and NetProfiler.
Access to and from network access services
TCP/22 – (ssh) Used for secure shell access to SteelCentral software components and for the appliance to obtain
information from servers via scripts.
UDP/161 – (snmp) Used by NetProfiler to obtain interface information from switches. Also, management
systems use this port to read the SteelCentral product MIB.
TCP/443 – (https) Used to secure web-based management interfaces.
TCP/5432 – (odbc) Enable this port if you plan to enable other applications access to the NetProfiler internal
database via ODBC.
42999 – Enable traffic on this port if you intend to use the NetProfiler user identification feature with a Microsoft
Active Directory domain controller.
Vulnerability scanner ports – If you plan to use the NetProfiler vulnerability scan feature, you must allow traffic
on the port that the SteelCentral product uses to access the vulnerability scanner server. Obtain the vulnerability
scanner server addresses and port numbers from the administrator of those systems. The default ports are:
Nessus: 1241
nCircle: 443
Rapid7: 3780
Qualys: Requires external https access to qualysapi.qualys.com (Note: This is separate from
qualysguard.qualys.com.)
Foundstone: 3800