Avaya Port Matrix Avaya Video Conferencing XT Series 9.2.4 - Avaya Support

Page created by Anita Waters
 
CONTINUE READING
Avaya Port Matrix Avaya Video Conferencing XT Series 9.2.4 - Avaya Support
Avaya Port Matrix

  Avaya Video Conferencing
  XT Series 9.2.4

                               Issue 0.16
                          March 10, 2021
              Avaya Equinox Solution 9.1.x
Avaya Port Matrix Avaya Video Conferencing XT Series 9.2.4 - Avaya Support
ALL INFORMATION IS BELIEVED TO BE CORRECT AT THE TIME OF PUBLICATION AND IS PROVIDED "AS IS".
AVAYA INC. DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE AND FURTHERMORE, AVAYA INC. MAKES NO
REPRESENTATIONS OR WARRANTIES THAT THE INFORMATION PROVIDED HEREIN WILL ELIMINATE SECURITY
THREATS TO CUSTOMERS’ SYSTEMS. AVAYA INC., ITS RELATED COMPANIES, DIRECTORS, EMPLOYEES,
REPRESENTATIVES, SUPPLIERS OR AGENTS MAY NOT, UNDER ANY CIRCUMSTANCES BE HELD LIABLE FOR ANY
DIRECT, INDIRECT, SPECIAL, PUNITIVE, EXEMPLARY, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT
OF THE USE OF THE INFORMATION PROVIDED HEREIN. THIS I3NCLUDES, BUT IS NOT LIMITED TO, THE LOSS OF
DATA OR LOSS OF PROFIT, EVEN IF AVAYA WAS ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. YOUR USE OF
THIS INFORMATION CONSTITUTES ACCEPTANCE OF THESE TERMS.

© 2021 Avaya Inc. All Rights Reserved. All trademarks identified by the ® or ™ are registered trademarks or
trademarks, respectively, of Avaya Inc. All other trademarks are the property of their respective owners.

                                  Avaya – Proprietary
          Use pursuant to the terms of your signed agreement or Avaya policy.

       March 2021              Avaya Port Matrix: Avaya Video Conferencing XT Series 9.2                2
                                      Comments? Infodev@avaya.com
Avaya Port Matrix Avaya Video Conferencing XT Series 9.2.4 - Avaya Support
1. Avaya Video Conferencing XT Series

The Avaya Video Conferencing XT Series provides video technology for room conferencing, including support for
dual stream 1080p video, high quality data sharing, high quality full band audio and a high-capacity embedded
MCU (selected models).

To enable an external XT Series endpoint to communicate with other Avaya Equinox Solution components within
the organization's network, you need to open firewall ports between the external XT Series endpoint and the
organization.

This section details the ports used for the Avaya XT Series and the relevant configuration procedures.

One Ethernet port (GLAN1, 10/100/1000) is always available for Ethernet connectivity on an XT Series Endpoint;
an additional GLAN2 port can be available as option.

2. Opening Ports for the XT Series

You can deploy Avaya XT Series endpoints either inside or outside the enterprise network.

When Avaya Equinox Solution components are located inside the network, and one or more XT Series endpoints
are outside the network, you must open ports in the firewall to enable the endpoint's functionality.

Since the location of the XT Series is not fixed, the ports' source and destination differ depending on your XT
Series topology. There are two main deployment topologies for the XT Series, each with optional additional
components:

• XT Series as an endpoint (standard topology)
• XT Series with Avaya XT Desktop Server (Avaya XT Series SMB Edition)
Typically, XT Series endpoints connect to a conference managed by Avaya Equinox Management, and hosted on
the Avaya Equinox Media Server/MCU.

                                        Figure 1 - Standard topology for Avaya XT Series

In contrast, in the Avaya XT Series SMB Edition topology, Avaya Desktop Clients join the conference via Avaya XT
Desktop Server (XTD), located in the DMZ. The Desktop Server then connects to an XT Series endpoint with built-
in MCU located inside the enterprise. External and internal XT Series endpoints connect directly to the XT Series
endpoint with built-in MCU.
Avaya Port Matrix Avaya Video Conferencing XT Series 9.2.4 - Avaya Support
Figure 2 - Avaya XT Series SMB Edition topology

In addition, when using Avaya PathFinder or Avaya SBCE, it provides a complete solution for H.323 and SIP
deployments, enabling secure connectivity between enterprise networks and remote sites.

In each of the topologies described above, the XT Series endpoints can be located either inside or outside the
enterprise. You need to open different ports depending on the topology, and the location of the endpoints.

The source for a port is the sender of data packets, and the destination is the receiver.

There are two types of ports which require firewall rules for opening.

• Ports which require bidirectional rules: they allow the XT Series to send and receive data packets on the same
port. The initiator of the traffic is the source.

• Ports which require unidirectional rules: they allow the XT Series to either initiate communication or receive
data packets. The initiator of the traffic is the source.

For each port, you must designate it as inbound or outbound relatively to the firewall. A port is inbound if its
source is sending to a destination protected by the firewall. A port is outbound if its source is protected by the
firewall. If the same port is both outbound and inbound for XT, it will require a bidirectional opening rule on the
firewall.

Figure 3 - Inbound and outbound ports for the XT Series

                                    Avaya – Proprietary
            Use pursuant to the terms of your signed agreement or Avaya policy.

        March 2021                   Avaya Port Matrix: Avaya Video Conferencing XT Series 9.2             4
                                            Comments? Infodev@avaya.com
Important:

On stateful firewalls, ports are left open to response data for an allocated period of time after the initial request.
For unidirectional ports, this response is the only data allowed through in the opposite direction. On
bidirectional ports, data can be initiated and sent through in both directions.

3. Opening Ports for Spaces Connectivity

The XT series devices need to connect to Spaces Meetings through SIP (TCP/TLS), in addition to standard
connection to Spaces Meetings backend in HTTPS/WSS.

Outgoing ports to Spaces Backend, SIP and Media Server must be open in the local NAT/FW if they are blocked.
TLS traffic is used for both HTTPS and WSS, any TLS-inspection should support these protocols or have an
exception for Spaces’ hosts.

Check that a device inside the company can connect to

        spaces.avayacloud.com (HTTPS + WSS, 443)
        spaces.sip.mpaas.avayacloud.com (TCP/TLS 5061) (CU 360 App)
And to UDP 3000-4999 for these addresses:
        35.227.0.176/29
        35.243.1.0/29
        35.192.193.192/27
        34.90.202.88/29
        34.90.54.64/27
        35.240.211.240/29
        34.87.164.64/27
        34.93.186.64/27
        34.89.118.64/27
See also https://spaces.avayacloud.com/developers/docs/guides/network_requirements.
4. Port Usage Tables

    4.1 Port Usage Table Heading Definitions
XT series endpoints need to use a series of UDP/TCP ports to communicate over a network with other audio-
video endpoints in SIP/H323 calls, or with other network elements, companion applications or entities in the
Avaya Solution Deployment.

For the purpose of this document, we will use the following terms.

Firewall: Network entity blocking TCP/UDP traffic to a specific port. If the traffic is directed to a destination
protected by the firewall, the port is inbound (X). Firewall could also block traffic to outbound ports (Y), when
connection is initiated by a source that is protected by the firewall.

If the XT endpoint or the element with which XT should communicate is protected by a firewall, to allow
incoming UDP/TCP traffic to the protected element, rules in the firewall must be applied. A rule establishes that
a port must be open in the firewall to allow traffic directed towards that port.

If the XT endpoint or the element with which XT should communicate is protected by a firewall, to allow
incoming UDP/TCP traffic to the protected element, rules in the firewall must be applied. A rule establishes that
a port must be open in the firewall to allow traffic directed towards that port.

Source: Entity sending UDP packets to destination port range or connecting to a TCP port as client.

Port Range: Specifies the TCP/IP/UDP port/port range.

Protocol: Specifies the protocol used by the port/port range.

Destination: Specifies the recipient of the traffic.

Functionality: Specifies the function of the port/port range.

Result of Blocking Port: Specifies the system limitations that occur when this port/port range is blocked by a
firewall.

Required: Specifies whether opening this port/port range is mandatory, recommended, or optional, relative to

the standard usage of the product. To obtain the functionality described for a particular port/port range, it is
mandatory to open the particular port/port range.

    4.2 Port Table
Below is the table with the port usage for this product. It details ports used by the destinations to receive
UDP/TCP data sent by the source.

Response data, if any, are sent to the port specified by the source in the request, or in the same port used to
receive (this is common for UDP). Response traffic over TCP socket is never blocked. Stateful firewalls are
                                   Avaya – Proprietary
           Use pursuant to the terms of your signed agreement or Avaya policy.

       March 2021                Avaya Port Matrix: Avaya Video Conferencing XT Series 9.2                 6
                                        Comments? Infodev@avaya.com
usually able to allow response TCP and UDP traffic flow back for a limited amount of time (usually hours for TCP,
minutes or less for UDP).

Unless a source (client) explicitly requests a specific port number for a TCP or UPD socket connection, the source port
number used is an ephemeral port number.
Ephemeral ports are temporary ports assigned by the client machine's IP stack, and are assigned from a designated range of
ports for this purpose. When the connection terminates, the ephemeral port is available for reuse, although most IP stacks
won't reuse that port number until the entire pool of ephemeral ports have been used. So, if the client program
reconnects, it will be assigned a different ephemeral port number for its side of the new connection.
Similarly, for UDP/IP, when a datagram is sent by a client from an unbound port number, an ephemeral port number is
assigned automatically so the receiving end can reply to the sender.
XT uses ephemeral source ports in the range 32768-61000.

Table 1. - Ports for XT Series Management on Ethernet Interfaces (GLAN1, GLAN2)
Source              Dest. Port Protocol (Type) Destination Functionality                    Result of Blocking Port on Firewall    Required               Notes
                    Range
XT SDK Client       22         XT AT Commands XT           Uses XT SDK API over SSH for     SDK Client cannot manage XT over      Mandatory if using      8.3.2.5xx
(Creston/Extron)               using SSH(TCP)              Remote Management                SSH.                                  an SSH SDK client to
                                                                                                                                  manage the XT
Web client (HTTP) 80          HTTP (TCP)        XT          Remotely performs               A web client cannot access the XT web Recommended to
                                                            management tasks via the XT     server using HTTP                     access XT via a Web
                                                            Web user interface                                                    Browser using HTTP
Avaya Desktop       80        HTTP              XT          Manual activation of            Screen/Mobile Link cannot be          Recommended             8.3.2.2xx
Client                                                      Screen/Mobile Link              activated manually by an Avaya
                                                                                            Desktop Client
Scopia              161       SNMP (UDP)        XT          Checks                          A management entity cannot check      Mandatory if using      No longer
Management                                                  the system status               the status of the XT via SNMP         Scopia Management       needed
8.3.x/                                                                                                                            8.3.x to manage the     swith
SNMP Manager                                                                                                                      XT.                     Mgmt 9.0
Station                                                                                                                           No longer needed        in Cloud
                                                                                                                                  with Avaya Equinox      Mode
                                                                                                                                  Management 9.0.
Web client(HTTPS) 443         HTTPS (TCP)       XT          Remotely performs               A web client cannot access the XT web Recommended to
                                                            management tasks via the XT     server using HTTPS                    access XT via a Web
                                                            Web user interface                                                    Browser using HTTPS
Avaya Desktop       443       HTTPS             XT          Manual activation of            Screen/Mobile Link cannot be          Recommended             8.3.2.2xx
Client                                                      Screen/Mobile Link              activated manually by Avaya Desktop
                                                                                            Client
RTSP Client         554       RTSP              XT          RSTP streaming                  XT cannot act as a RTSP server        Mandatory if using      9.2.3
                                                                                                                                  XT as a RTSP server
XT Scopia Desktop   3336      XTD XML API (TCP) XT          Sends requests and receives     XTD clients cannot connect to XT      Mandatory if using
Server (XTD)        3337                                    information about XT status                                           XTD
Avaya               3338      XT XML API (TCP) XT           Sends GET/SET/ACTIONS           The control app cannot connect to XT Mandatory if using a
Collaboration                                               request to XT                                                         mobile control app
Control App
(iOS/Android)
Avaya               3339      XT HINTS (TCP)    XT          Receives indications of system The control app cannot align its status Mandatory if using a
Collaboration                                               status changes                 to reflect XT status.                   mobile control app
Control App
(iOS/Android)
Equinox             3341      SM XML API (TCP) XT           Sends notifications of changes XT cannot                               Recommended for        No longer
Management                                                  in Roster/Calendar             update the list of                      Calendar/Roster        needed
(iView)                                                                                    meetings scheduled for                  functionalities        with 9.0
                                                                                           that day or the list of                                        in Cloud
                                                                                           participants for                                               Mode
                                                                                           meetings, or any meeting updates.
XT                  5222      XMPP(TCP)         Avaya Aura, XMPP Presence                  XT Presence status cannot be            Recommended            9.0
                                                Avaya One-X                                communicated to the XMPP server.
                                                portal for                                 XT cannot see the presence status for
                                                IPO,                                       other entities
                                                XMPP
                                                Server
XT Signed Software 55090   XT Signed Software XT          Upgrades the XT Software with XT software cannot be upgraded with    Mandatory to
Upgrade App                Upgrade (TCP)                  signed packages (only 9.0 or  a signed package by Equinox            upgrade XT software
                                                          higher)                       Management (local mode) or a           remotely with SM
                                                                                        standalone XT Sw upgrade application   mode=local or with
                                                                                                                               standalone app
Equinox          55099     XT Software        XT          Upgrades the XT Software        XT software cannot be upgraded with Mandatory to
Management                 Upgrade (TCP)                                                  an unsigned package by Equinox       upgrade XT software
(iView)/                                                                                  Management (local mode ) or a        remotely with SM
XT Unsigned                                                                               standalone XT Sw upgrade application mode=local or with
Software Upgrade                                                                                                               standalone app
App
Equinox          55003     XT AT Commands XT              Uses XT SDK API for Remote      Equinox Management/Client cannot      Mandatory if using
Management                 (TCP)                          Management                      manage XT.                            Equinox
(iView)/XT SDK                                                                                                                  Management to
Client                                                                                                                          manage the XT in
(Creston/Extron)                                                                                                                mode=local;
                                                                                                                                Mandatory if using a
                                                                                                                                Third Party device to
                                                                                                                                control XT
XT PC Control     55000    TCP                XT          Control XT by PC/Mac            XT PC Control app cannot manage       Mandatory if using
(PC/Mac App for                                                                           XTE240                                XT PC Control
XTE)                                                                                                                            application to
                                                                                                                                control XT using
                                                                                                                                mouse/kbd
XT PC Control     55001    UDP                XT          Control XT by PC/Mac            XT PC Control app cannot manage       Mandatory if using
(PC/Mac App for                                                                           XTE240                                XT PC Control
XTE)                                                                                                                            application to
                                                                                                                                control XT using
                                                                                                                                mouse/kbd
Telnet Client     60123    XT CLI (TCP)       XT          Accesses XT console (CLI)       XT proprietary console application    Optional
                                                                                          (CLI) cannot be accessed via Telnet
XT                21       FTP, SFTP(TCP)    FTP, SFTP Sends files to a file server       XT cannot send/receive files to/from a Optional for sending   9.0.0
                                             Server       (passivemode). Additional ports file transfer server.                  files to a server      9.2.2(OTA
                                                          on the FTP server must be                                              Mandatory for OTA      )
                                                          opened.                                                                updates
                                                          Receives update sw bundle
                                                          from OTA server.
XT                53       DNS(UDP)          DNS Server Resolve a DNS address             XT cannot resolve a DNS address        Mandatory
XT                80       HTTP (TCP)        Web Servers Performs NAT auto discovery XT cannot perform NAT Auto-                 Recommended
                                             on the       and geo-localization            discovery and geo-localization
                                             Internet
XT                80       HTTP (TCP)        SBCE         Mobile Link                     Mobile Link cannot be activated by     Recommended            8.3.2.5xx
                                                                                          Desktop Client
XT                80/443   HTTP(s) (TCP)     Web Collab Web Collaboration                 XT cannot join web collab session      Mandatory to           9.0.0
                                             Server                                                                              support Web Collab
XT                80/443   HTTP(s) (TCP)     EWS          Exchange Web Server             XT cannot retrieve calendar items      Mandatory to           9.2.0
                                                                                                                                 support EWS
XT                443      HTTPS (wss) (TCP) Spaces       Spaces Server                   XT cannot connect to Spaces            Mandatory to           9.2.2
                                             Backend                                                                             support Spaces
XT                443      HTTPS (wss) (TCP) Conf.Mgmt Cloud connection and               Mgmt in cloud mode cannot control Mandatory to                New in
                                             9.0          provisioning (SXMP)             XT                                     support Mgmt with      9.0
                                                                                                                                 cloud mode
XT                443      HTTPS (wss) (TCP) Provisioning Autoprovisioning                XT cannot connect to Avaya or other Mandatory to              9.1
                                             Servers      OTA Updates                     supported Auto-provisioning servers. support auto-            9.2.2
                                             OTA server                                   XT cannot retrieve info about OTA fw provisioning servers.    (OTA)
                                                                                          updates                                Mandatory for OTA
                                                                                                                                 updates
XT                123      SNTP (UDP)        SNTP Server Gets the Internet UTC time       XT cannot get the Internet UTC time Recommended
                                                                                          from a server
XT                162      SNMP (UDP)        Scopia       Sends SNTP Trap Events          XT cannot send SNMP traps to a         Mandatory if using
                                             Manager/                                     Management entity                      Equinox
                                             SNMP                                                                                Management to
                                             Managemen                                                                           manage the XT

                                        Avaya – Proprietary
                Use pursuant to the terms of your signed agreement or Avaya policy.

          March 2021                      Avaya Port Matrix: Avaya Video Conferencing XT Series 9.2                                     8
                                                 Comments? Infodev@avaya.com
t Station
XT                389       LDAP(TCP)         Equinox        Retrieves contacts from LDAP     XT cannot retrieve contacts from        Mandatory if using
                                              Manager/       database                         remote directory ( Equinox              remote directory
                                              LDAP                                            Management or XT)
                                              Directory
XT                443       HTTPS             SBCE           Mobile Link                      Mobile Link cannot be activated by a    Recommended            8.3.2.5xx
                                                                                              Desktop Client
XT                443       HTTPS(wss)        Web Collab     Web Collaboration                XT cannot join web collab session       Mandatory to       9.0.0
                                              Server                                                                                  support Web Collab
XT                1718      H.225.0/RAS (UDP) Multicast IP   “H.323 Gatekeeper Automatic      XT cannot automatically discover a      Optional
                                              address        Discovery” procedure             gatekeeper to which register (only
                                              224.0.0.41                                      manual configuration available).
                                              (“all GK”)
XT               1719       H.225.0/RAS (UDP) H323 GK        H.323 call signaling to a GK     XT cannot use the services of a         Recommended
                 (source &                                                                    gatekeeper.
                 dest)
XT/H323 Endpoint 1720      H.225.0/Q.931      XT/H323 EP H.323 call signaling (Q.931)         XT cannot establish H.323 calls         Mandatory to
                                                                                                                                      support H.323 calls
XT                3336      SM XML API (TCP) Equinox         XT requires to SM the list of    XT cannot                               Recommended for        No longer
                                             Manager         scheduled meetings or the list   receive the list of                     Calendar/Roster        needed
                                                             of participants in current       meetings scheduled for                  functionalities        with 9.0
                                                             meeting                          that day or the list of                                        in Cloud
                                                                                              participants for the current meeting.                          Mode

XT/H323 Endpoint 3230-      H.225.0/Q.931 and XT/ H323 EP H.323 call control signaling        Cannot connect H.323 calls.             Mandatory to
                 3250*      H.245             (if XT same (Q.931) and media control                                                   support H323 calls
                 (source)    (TCP)            port range) signaling (H.245)                                                           on TCP
XT/SIP Endpoint  3230-      SIP               XT/ SIP EP SIP (TCP) call signaling and BFCP    Cannot connect SIP calls on TCP         Mandatory to
                 3250*      (TCP)             (if XT same signaling                           transport.                              support SIP calls on
                 (source)                     port range)                                                                             TCP
XT/SIP or H323   3230-      RTP and RTCP      XT/SIP or   H.323 and SIP media (audio,         No media exchanged in the H.323 or      Mandatory to
Endpoint         3313*      (UDP)             H323 EP     video, H.224/data RTP) and          SIP call.                               support H323 calls
                 (source)                     (if XT same media control (RTCP)                                                        and SIP calls
                                              port range)
XT/SIP            3000-     RTP and RTCP      Spaces      See Opening Ports for Spaces        No call to SIP Spaces Media servers     Mandatory to         9.2.2
                  4999      (UDP)             Server      Connectivity                                                                support Spaces calls
XT                3478-     STUN              STUN Server Contact the STUN Server             Cannot discover the presence of a       Optional
                  3479      (UDP)                                                             firewall or NAT (only manual
                                                                                              configuration available).
XT/SIP Endpoint   5060      SIP(TCP)          XT/SIP EP      SIP call signaling               Cannot connect SIP calls over TCP or
                                                                                                                               Mandatory to
                                                                                              TLS over TCP                     support SIP calls on
                                                                                                                               TCP/TLS over TCP
XT/SIP Endpoint   5060      SIP(UDP)          XT/SIP EP SIP call signaling               Cannot connect SIP calls over UDP.    Mandatory to
                  (source                                                                                                      support SIP calls on
                  and dest)                                                                                                    UDP
XT/SIP Endpoint   5061      SIP(TCP/TLS)      XT/SIP EP SIP call signaling for TLS       Cannot connect SIP calls over TCP for Mandatory to
                                              Spaces                                     TLS.                                  support SIP calls on
                                              Media                                      Cannot connect to Spaces              TCP for TLS or
                                              Server                                                                           connection to Spaces
XT/SIP Endpoint   5070-     BFCP(TCP)         XT/SIP EP SIP content (presentation) video No SIP content video available.       Mandatory to
                  5077*                       (if XT same signaling                                                            support content
                  (if XT                      range)                                                                           video in SIP calls
                  same
                  range)
XT                8554      RTSP(TCP)         Avaya          Screen Link                      XT cannot receive shared desktop        Recommended            8.3.2.5xx
                                              Desktop                                         content from Avaya Client
                                              Client
XT                1935      RTMP(TCP)         RTMP           RTMP streaming/livecast          XT cannot stream to RTMP servers        Mandatory to send 9.2.0
                                              Servers                                                                                 streaming content to
                                                                                                                                      RTMP Servers
XT                443       RTMPS             RTMP           RTMPs streaming/livecast         XT cannot stream to RTMPs servers       Mandatory to send 9.2.0
                                              Servers                                                                                 streaming content to
                                                                                                                                      RTMPs Servers
* The maximum port range is specified. The used port range could be lower than the specified one, depending on available
license and active settings. Please check on XT UI (Networks>Preferences>Dynamic ports> Manual mode) for the used
range.

                                    Avaya – Proprietary
            Use pursuant to the terms of your signed agreement or Avaya policy.

       March 2021                 Avaya Port Matrix: Avaya Video Conferencing XT Series 9.2                        10
                                          Comments? Infodev@avaya.com
4.3 Port Table Changes
9.2.0 - Added info for Avaya Collaboration Control (ports 3338,3339)

9.2.0 - Added info for EWS

9.2.2 - Added info for Spaces and RTMP/S

9.2.3 - Added info for RTSP

9.2.4 - Added info for OTA update
5. Port Usage Diagram

                               Avaya – Proprietary
       Use pursuant to the terms of your signed agreement or Avaya policy.

    March 2021        Avaya Port Matrix: Avaya Video Conferencing XT Series 9.2   12
                              Comments? Infodev@avaya.com
5.1 Port Usage Diagram Changes
   •   Added Mobile Link and Screen Link ports in 8.3.2
   •   Added AT commands over SSH in 8.3.2
   •   Added Presence port in 8.5/9.0
   •   Added Cloud mode for Avaya Equinox Management 9.0, tunneling several TCP connections to/from
       different ports in a single secure web socket connection for managed endpoints. All the ports marked as
       “No Longer needed with cloud mode” are referring to Avaya Equinox Management functionalities for a
       provisioned XT endpoint, added in 8.5/9.0.
   •   Added Signed Software upgrade TCP port 55090, optional, in 8.5/9.0.
   •   Added SFTP port for file transfer of recorded files in 8.5/9.0. Corrected port used for FTP (21, not 69)
   •   Added 80/443 port to connect to WCS server (standalone or as part of the Avaya Equinox Media Server)
       in 9.0 for Web Collaboration
   •   Added 443 port for cloud provisioning (default for Equinox Management, can be configured)
   •   Extended UDP BFCP port range and added note
   •   Added info about ephemeral source ports
   •   Clarified some port ranges
   •   Added icon for Avaya Collaboration Control (ports 3338,3339)
   •   Added EWS
   •   Added RTMP
   •   Added support for Spaces
   •   Added RTSP
Appendix A: Overview of TCP/IP Ports

What are ports and how are they used?
   TCP and UDP use ports (defined at http://www.iana.org/assignments/port-numbers) to route traffic arriving at
   a particular IP device to the correct upper layer application. These ports are logical descriptors (numbers) that
   help devices multiplex and de-multiplex information streams. For example, your PC may have multiple
   applications simultaneously receiving information: email using destination TCP port 25, a browser using
   destination TCP port 443 and a ssh session using destination TCP port 22. These logical ports allow the PC
   to de-multiplex a single incoming serial data packet stream into three mini-streams inside the PC. Each of the
   mini-streams is directed to the correct high-level application identified by the port numbers. Every IP device
   has incoming (Ingress) and outgoing (Egress) data streams.

   Ports are used in TCP and UDP to name the ends of logical connections which carry data flows. TCP and
   UDP streams have an IP address and port number for both source and destination IP devices. The pairing of
   an IP address and a port number is called a socket. Therefore, each data stream is uniquely identified with
   two sockets. Source and destination sockets must be known by the source before a data stream can be sent
   to the destination. Some destination ports are “open” to receive data streams and are called “listening” ports.
   Listening ports actively wait for a source (client) to make contact with the known protocol associated with the
   port number. HTTPS, as an example, is assigned port number 443. When a destination IP device is
   contacted by a source device using port 443, the destination uses the HTTPS protocol for that data stream
   conversation.

Port Types
   Port numbers are divided into three ranges: Well Known Ports, Registered Ports, and Dynamic Ports
   (sometimes called Private Ports). The Well Known and Registered ports are assigned by IANA (Internet
   Assigned Numbers Authority) and are found here: http://www.iana.org/assignments/port-numbers.

   Well Known Ports
     Well Known Ports are those numbered from 0 through 1023.
     For the purpose of providing services to unknown clients, a service listen port is defined. This port is used
     by the server process as its listen port. Common services often use listen ports in the well-known port
     range. A well-known port is normally active meaning that it is “listening” for any traffic destined for a
     specific application. For example, well known port 23 on a server is actively waiting for a data source to
     contact the server IP address using this port number to establish a Telnet session. Well known port 25 is
     waiting for an email session, etc. These ports are tied to a well understood application and range from 0 to
     1023.

     In UNIX and Linux operating systems, only root may open or close a well-known port. Well Known Ports
     are also commonly referred to as “privileged ports”.

   Registered Ports
     Registered Ports are those numbered from 1024 through 49151.
     Unlike well-known ports, these ports are not restricted to the root user. Less common services register
     ports in this range. Avaya uses ports in this range for call control. Some, but not all, ports used by Avaya in
     this range include: 1719/1720 for H.323, 5060/5061 for SIP, 2944 for H.248 and others. The registered port
     range is 1024 – 49151. Even though a port is registered with an application name, industry often uses
     these ports for different applications. Conflicts can occur in an enterprise when a port with one meaning is
     used by two servers with different meanings.

                                  Avaya – Proprietary
          Use pursuant to the terms of your signed agreement or Avaya policy.

     March 2021                Avaya Port Matrix: Avaya Video Conferencing XT Series 9.2                  14
                                       Comments? Infodev@avaya.com
Dynamic Ports
     Dynamic Ports are those numbered from 49152 through 65535.
     Dynamic ports, sometimes called “private ports”, are available to use for any general purpose. This means
     there are no meanings associated with these ports (similar to RFC 1918 IP Address Usage). These are the
     safest ports to use because no application types are linked to these ports. The dynamic port range is
     49152 – 65535.

Sockets
   A socket is the pairing of an IP address with a port number. An example would be 192.168.5.17:3009, where
   3009 is the socket number associated with the IP address. A data flow, or conversation, requires two sockets
   – one at the source device and one at the destination device. The data flow then has two sockets with a total
   of four logical elements. Each data flow must be unique. If one of the four elements is unique, the data flow
   is unique. The following three data flows are uniquely identified by socket number and/or IP address.

   Data Flow 1:           172.19.19.14:1234 - 10.1.2.3:2345
                          two different port numbers and IP addresses and is a valid and typical socket pair

   Data Flow 2:           172.19.19.14.1235 - 10.1.2.3:2345
                          same IP addresses and port numbers on the second IP address as data flow 1, but since
                          the port number on the first socket differs, the data flow is unique

   Data Flow 3:           172.19.19.14:1234 - 10.1.2.4:2345

   If one IP address octet changes, or one port number changes, the data flow is unique.

                                           Socket Example Diagram

             Client       HTTP-Get   Source 192.168.1.10:1369      Destination 10.10.10.47:80     Web Server

                             TCP-info   Destination 192.168.1.10:1369     Source 10.10.10.47:80

                      `

             Figure 1. Socket example showing ingress and egress data flows from a PC to a web server

   The client egress stream includes the client’s source IP and socket (1369) and the destination IP and socket
   (80). The ingress stream from the server has the source and destination information reversed.

Understanding Firewall Types and Policy Creation
   Firewall Types
     There are three basic firewall types:

       • Packet Filtering
       • Application Level Gateways (Proxy Servers)
       • Hybrid (Stateful Inspection)
Packet Filtering is the most basic form of the firewalls. Each packet that arrives or leaves the network has
      its header fields examined against criterion to either drop the packet or let it through. Routers configured
      with Access Control Lists (ACL) use packet filtering. An example of packet filtering is preventing any source
      device on the Engineering subnet to telnet into any device in the Accounting subnet.

      Application level gateways (ALG) act as a proxy, preventing a direct connection between the foreign device
      and the internal destination device. ALGs filter each individual packet rather than blindly copying bytes.
      ALGs can also send alerts via email, alarms or other methods and keep log files to track significant events.

      Hybrid firewalls are dynamic systems, tracking each connection traversing all interfaces of the firewall and
      making sure they are valid. In addition to looking at headers, the content of the packet, up through the
      application layer, is examined. A stateful inspection firewall also monitors the state of the connection and
      compiles the information in a state table. Stateful inspection firewalls close off ports until the connection to
      the specific port is requested. This is an enhancement to security against port scanning1.

    Firewall Policies
      The goals of firewall policies are to monitor, authorize and log data flows and events. They also restrict
      access using IP addresses, port numbers and application types and sub-types.

      This paper is focused with identifying the port numbers used by Avaya products so effective firewall policies
      can be created without disrupting business communications or opening unnecessary access into the
      network.

      Knowing that the source column in the following matrices is the socket initiator is key in building some types
      of firewall policies. Some firewalls can be configured to automatically create a return path through the
      firewall if the initiating source is allowed through. This option removes the need to enter two firewall rules,
      one for each stream direction, but can also raise security concerns.

      Another feature of some firewalls is to create an umbrella policy that allows access for many independent
      data flows using a common higher layer attribute. Finally, many firewall policies can be avoided by placing
      endpoints and the servers that serve those endpoints in the same firewall zone.

1
 The act of systematically scanning a computer's ports. Since a port is a place where information goes into and out of a
computer, port scanning identifies open doors to a computer. Port scanning has legitimate uses in managing networks, but
port scanning also can be malicious in nature if someone is looking for a weakened access point to break into your computer.

                                    Avaya – Proprietary
            Use pursuant to the terms of your signed agreement or Avaya policy.

       March 2021                 Avaya Port Matrix: Avaya Video Conferencing XT Series 9.2                       16
                                          Comments? Infodev@avaya.com
You can also read