Skip to content

Network Flows and Firewall Requirements

To MetalSoft in an enterprise production environment, there are a series of flows that need to be allowed through the internal firewalls. These depend on the use case, the equipment with which MetalSoft needs to interact with and other factors such as external systems or custom ports. MetalSoft does not need any external connection and can be deployed in a fully air-gapped environment.

The following is a typical deployment. In most cases some the flows will not be required. Refer to the table below for more details about the respective flows.

The following are flows connected to the MetalSoft application.

FlowDescriptionPortsDirectionRequired for Fabric ManagerRequired for Compute & Storage Manager
Users/CI/CD/Terraform/AnsibleUI and API access to the Global Controller from users, CI/CD pipelines etc.TCP 443 (HTTPS)Inbound to Global ControllerRequiredRequired
InternalInternal Communication between the Site Controller from every site and the Primary Global Controller. Note that if a DR Global Controller is used the flows towards that must also be ensured.TCP 443 (HTTPS), TCP 9091 (proprietary protocol, AES encryption)Inbound to Global ControllerRequiredRequired
Network device managementManagement traffic to network equipment OOB management interfaces.TCP 443 (HTTPS), 22 (SSH)Outbound from the Site ControllerRequiredNot required
Network device management NETCONFManagement traffic to network equipment OOB management interfaces. NETCONF-enabled devices such as Arista EOS and Juniper JunOS.TCP 830 (HTTPS)Outbound from the Site ControllerDepends on equipmentNot required
Network device ZTPTraffic used for “zero-touch” bring-up of network devicesUDP 67,68 (DHCP), TCP 80/443 (see note below)Inbound to the Site ControllerRequiredNot required
Server managementServer management traffic used to configure BMCs, mount ISOs etc.TCP 443 (HTTPS)Outbound from the Site ControllerNot requiredRequired
Server firmware binaries and ISOServer management traffic used to mount ISOs etc.TCP 443 (HTTPS)Inbound to the Site ControllerNot requiredRequired
Server console accessConsole access to servers’s management interfaces (for supported servers).TCP 5800, 5900 (VNC)Outbound from the Site ControllerNot requiredRecommended
Server ZTPTraffic used during the “zero touch” bring-up of servers.UDP 67,68 (DHCP), TCP 80/443 (HTTP) (see note below)Inbound to the Site ControllerNot requiredRecommended
Server legacy file accessUsed for (older) servers that do not support accessing files (ISOs, Firmware assets etc. ) via HTTPS.TCP 111, 2049, 32765, 32767 (NFS)Inbound to the Site ControllerNot requiredDepends on equipment
Server legacy managementUsed for (older) servers that do not support accessing network connection information via HTTPS from the BMC.UDP 623 (IPMI SOL)Outbound from the Site ControllerNot requiredDepends on equipment
Storage managementTraffic used to manage storage devicesTCP 443 (HTTPS)Outbound from the Site ControllerNot requiredRecommended
Cluster managementTraffic used to deploy and manage clusters such as VMWare VCF, RedHat OpenShift, Incus etc.TCP 443 (HTTPS),22 (SSH)Outbound from the Site Controller to the in-band network. Note that the DNS is also required if cluster management is used.Not requiredRecommended
Docker Registry accessThis is required for the kubernetes cluster to download MetalSoft docker images and other Docker images. In an enterprise environment this is towards an internal registry that mirrors the MetalSoft registry (registry.metalsoft.io). Not required for OVA setups.TCP 443 (HTTPS)Outbound from the Global ControllerRequiredRequired
Repository trafficThis is required for the Global Controller to be able to download assets such as Operating System ISO files and firmware binaries.TCP 443 (HTTPS)Outbound from the Global ControllerRequiredRequired
DNS service integrationIntegrations with an external DNS solution such as InfobloxTCP 53, UDP 53 (DNS)Outbound from the Site Controller. See note below.Not requiredRecommended
Identity services integrationIntegrations with various external solutions such as DCIM, DNS etc.TCP 636 (LADPS)Outbound from the Site ControllerRecommendedRecommended
Notifications integrationUsed to send notifications via email.TCP 587 (SMTP)Outbound from the Global ControllerRecommendedRecommended
Other integrationsIntegrations with various external solutions such as DCIM etc.TCP 443 (HTTPS)Outbound from the Site ControllerRecommendedRecommended
Kubernetes storageWhen deployed in kubernetes, this is the traffic between an external storage system and Kubernetes. Depends on storage system. Not required for OVA-based deployment.Depends on storage. Eg: NFS, ISCSI etc.Outbound from the Global ControllerNot requiredNot required