Firewall Considerations
Firewall Considerations
Keyfactor Command needs to be able to communicate internally between the various Keyfactor Command components installed on different servers, if applicable, and to the SQL server, certificate authorities, centralized logging server (if applicable), and Active Directory. If there are any firewalls in the environment that control internal traffic, these may need to be updated to allow the appropriate level of communication. Table 762: Protocols Keyfactor Command Uses for Communication shows each Keyfactor Command component and the protocols they use to communicate. In addition, all Keyfactor Command components require a healthy Active Directory environment with the ability to use Kerberos, LDAP, and DNS The Domain Name System is a service that translates names into IP addresses..
Table 762: Protocols Keyfactor Command Uses for Communication
Keyfactor Command Component |
Protocols and Ports |
Target |
---|---|---|
Keyfactor Command Management Portal |
HTTP/HTTPS (TCP 80/443) |
Client browser (e.g. Microsoft Edge) |
Keyfactor Command Management Portal |
HTTP/HTTPS (TCP 80/443) |
Certificate revocation list A Certificate Revocation List (CRL) is a list of digital certificates that have been revoked by the issuing Certificate Authority (CA) before their scheduled expiration date and should no longer be trusted. (CRL A Certificate Revocation List (CRL) is a list of digital certificates that have been revoked by the issuing Certificate Authority (CA) before their scheduled expiration date and should no longer be trusted.) distribution points |
Keyfactor Command Management Portal |
HTTP/HTTPS (TCP 80/443) |
EJBCA Certificate Authorities |
Keyfactor Command Management Portal |
RPC Remote procedure call (RPC) allows one program to call a function from a program located on another computer on a network without specifying network details. In the context of Keyfactor Command, RPC errors often indicate Kerberos authentication or delegation issues./DCOM (TCP 135 plus random high ports typically in the range 49152 – 65535) |
Microsoft Certificate Authorities |
Keyfactor Command Management Portal |
RPC/DCOM (TCP 135 plus random high ports typically in the range 49152 – 65535) |
Keyfactor vendor gateways to cloud CAs (e.g. Entrust, Symantec) |
Keyfactor Command Management Portal |
MS SQL (default TCP 1433) |
SQL Server |
Keyfactor Command Management Portal |
Varies depending on the implemented solution (TCP 514 for rsyslog Rsyslog is an open-source software utility used on UNIX and Unix-like computer systems for forwarding log messages in an IP network., TCP 5000 for Logstash are some standard defaults) |
Centralized logging solution |
Keyfactor Command | Active Directory (TCP/UDP 389) | Microsoft Active Directory queries |
Keyfactor Command SSH The SSH (secure shell) protocol provides for secure connections between computers. It provides several options for authentication, including public key, and protects the communications with strong encryption. Management | Active Directory Web Services (TCP 9389) | Microsoft Active Directory for group membership enumeration |
All Orchestrators and Agents |
HTTP/HTTPS (TCP 80/443) |
Keyfactor Command Orchestrator Keyfactor orchestrators perform a variety of functions, including managing certificate stores and SSH key stores. API A set of functions to allow creation of applications. Keyfactor offers the Keyfactor API, which allows third-party software to integrate with the advanced certificate enrollment and management features of Keyfactor Command. endpoint An endpoint is a URL that enables the API to gain access to resources on a server. |
PowerShell Remoting (default TCP 5985 and 5986) |
IIS Servers to which PFX A PFX file (personal information exchange format), also known as a PKCS#12 archive, is a single, password-protected certificate archive that contains both the public and matching private key and, optionally, the certificate chain. It is a common format for Windows servers. files will be distributed |
|
PowerShell Remoting (default TCP 5985 and 5986) |
IIS Servers to which PFX files will be distributed |
|
Keyfactor Windows Orchestrator |
Any configured for scanning |
The SSL endpoint being scanned by the SSL discovery or monitoring job |
Keyfactor Universal Orchestrator
|
Any configured for scanning |
The SSL endpoint being scanned by the SSL discovery or monitoring job |
Keyfactor Windows Orchestrator |
HTTP/HTTPS (TCP 80/443) |
F5 or NetScaler Devices |
Keyfactor Windows Orchestrator |
RPC/DCOM (TCP 135 plus random high ports typically in the range 49152 – 65535) |
Microsoft Certificate Authorities |
Keyfactor Universal Orchestrator
|
RPC/DCOM (TCP 135 plus random high ports typically in the range 49152 – 65535) |
Microsoft Certificate Authorities |
Keyfactor Windows Orchestrator |
FTP (TCP 21) |
FTP Servers |
Keyfactor Universal Orchestrator |
FTP (TCP 21) |
FTP Servers |
Keyfactor Bash Orchestrator The Bash Orchestrator, one of Keyfactor's suite of orchestrators, is used to discover and manage SSH keys across an enterprise. | SSH (TCP 22 by default) | Remote control targets for SSH management |
Keyfactor Gateways to Cloud CAs |
HTTP/HTTPS (TCP 80/443) |
Cloud providers (e.g. Entrust, Symantec) |
Keyfactor Cloud Gateway | Active Directory Web Services (TCP 9389) | Microsoft Active Directory for group membership enumeration |