Firewall ports

You might need to open the following ports on your DMZ firewall, depending on your network configuration:

Port Protocol Direction Required for
20 FTP In/Out Backup & Restore and Transaction Log Export if you are using an FTP server.
20 TCP Out FTP over HTTP
21 SFTP In/Out Backup & Restore and Transaction Log Export if you are using an SFTP server.
22 TCP In SSH access to Secure Web Gateway.
22 SFTP Out Backup & Restore, and, server containing lexical data for import
25 TCP Out Outbound SMTP. If your system uses an alternative port, open that instead.
53 UDP/TCP Out DNS requests, if using DNS servers. Only allow outbound requests to the specified DNS servers, and responses from those servers.
80 TCP Out

Access to the Service Availability List:

services1.clearswift.net

services2.clearswift.net

services3.clearswift.net

80 TCP Out

Access to the RSS Feed from:

www.clearswift.com

88 TCP/UDP Out User authentication using Kerberos
123 UDP In/Out

Access to NTP services, if configured. The following servers are configured by default:

2.rhel.pool.ntp.org

135 TCP Out User authentication using NTLM
137 UDP Out User authentication using NTLM
139 TCP Out User authentication using NTLM
162 UDP Out SNMP traps
389 TCP In/Out LDAP directory access (if you use LDAP servers)
443 TCP Out HTTPS access to Secure Web Gateway Online Help
443

TCP

In/Out HTTPS access to Clearswift Secure Web Gateway web interface and for communications between Peer Gateways
443 TCP Out General HTTPS web access
443 TCP Out HTTPS lexical data import
443 TCP Out Outbound HTTPS traffic
443 TCP Out

HTTPS access to certificateClosed A digital means of proving your identity. When you send a digitally-signed message, you are sending your certificate and public key. Certificates are issued by a certification authority and can expire or be revoked. revocation:

one-crl.clearswift.net

443 TCP Out

HTTPS access to the Clearswift Update Server for license management and handling Managed Lexical Expression Lists:

applianceupdate.clearswift.com

443 TCP Out

HTTPS access to Clearswift product and Operating System updates:

cs-products.fortra.com

cs-repos.fortra.com

443 TCP Out

HTTPS access to the Sophos or Avira Update Servers for fetching anti-virus updates and software upgrades.

Sophos update servers:

sav-update-1.clearswift.net

sav-update-2.clearswift.net

sav-update-3.clearswift.net

sav-update-4.clearswift.net

sav-update-5.clearswift.net

sav-update-6.clearswift.net

Avira update servers:

aav-update-1.clearswift.net

aav-update-2.clearswift.net

aav-update-3.clearswift.net

aav-update-4.clearswift.net

aav-update-5.clearswift.net

aav-update-6.clearswift.net

*.apc.avira.com

443 TCP Out

HTTPS access to URL Database Updates:

nsv10.netstar-inc.com

nsv20.netstar-inc.com

dss.netstar-inc.com

gcftelemetry.netstar-inc.com

incompass3.netstar-inc.com

nsv*.netstar-inc.com

445 TCP Out User authentication using NTLM
514 TCP Out Access to a syslog server (default port for log export)
636 TCP In Secure LDAP directory access
636 TCP Out LDAP and SSL connection to a non-global catalog port (if you are using LDAP servers)
990 FTPS In/Out Backup & Restore and Transaction Logging.Also used to connect Clearswift Secure Web Gateway with your server containing lexical data for import.
1270 TCP In/Out SCOM server access: the port used by a SCOM server when monitoring the Gateway
3268 TCP Out LDAP connection to an active directory global catalog port (if you are using LDAP servers)
3269 TCP In/Out LDAP and SSL connection to an active directory global catalog port (if you are using LDAP servers)
3269 TCP Out LDAP connection to an active directory global catalog port (if you are using LDAP)
8444 TCP In Local HTTPS server
9000 UDP In/Out Distribution of time-based policy information to Peer Gateways
9090 TCP In/Out Connection to Red Hat Cockpit