Communication Ports

Imprivata uses a variety of TCP and UDP ports in its communications. The following describes the use of these ports to enable firewall administrators to configure rules that will allow these communications to take place.

Diagrammatic Summary

The following image represents the Imprivata communication port summary.

For additional information on outbound communication ports, including detailed information on Imprivata cloud services, see About Outbound Communications.

Appliance and Agent Operations

The following ports are used for the administration of Imprivata appliances, communication between two or more Imprivata appliances, or communication between an Imprivata appliance and an Imprivata agent.

Port Protocol Direction Description

443

TCP Inbound

This port is used:

  • To access the Imprivata Admin Console.
  • By Imprivata appliances for inter-appliance communication.
  • By Imprivata agents to communicate with the Imprivata appliance.
81 TCP Inbound This port is used for Imprivata Appliance Console access. In addition this port must be open from a new appliance to the authorizing appliance when running the installation wizard on a new appliance.
22 TCP Two-way Secured via SSH and normally only open to the specific appliance IP addresses of other appliances in the enterprise.
1521 TCP Two-way Secured using Oracle encryption and only open to the specific appliance IP addresses of other appliances in the enterprise. It is used outgoing only for physical access systems.

The ICMP (Internet Control Message Protocol) control message types in the next table are used to support ping tests between appliances. Note that these are not TCP or UDP ports.

ICMP Control Message Type Protocol Description Use by Imprivata Appliances

ICMP Type 0

ICMP

Echo Reply

These allow ping tests to occur between appliances to test for the presence of a remote appliance.
ICMP Type 8 ICMP Echo Request
ICMP Type 42 ICMP Extended Echo Request
ICMP Type 43 ICMP Extended Echo Reply
NOTE:

Cisco Adaptive Security Appliances with Application Layer Protocol Inspection: SQLnet inspection impedes communication between the Imprivata server and the database when the Imprivata server connects to a database on a remote appliance. This can occur during a database restore operation, an upgrade operation, and during a synchronize enterprise database operation. According to the Cisco Security Appliance Command Reference, version 8.0: Disable SQL*Net inspection when SQL data transfer occurs on the same port as the SQL control TCP port 1521. The security appliance acts as a proxy and reduces the client window size from 65,000 to about 16,000, causing data transfer issues.

Also, from the Oracle Support site: It is not just Cisco firewalls that can suffer from these problems. A common cause is the firewall's "Advanced SQL features" with various wording (depending on the vendor): SQLNet fixup (protocol), Deep Packet Inspection or DPI, SQLNet packet inspection, or SQL ALG (Juniper firewalls). Therefore, regardless of firewall vendor, you should disable the “Advanced SQL features” when present on your firewall(s).

G4 Database Appliance Communications

For Imprivata G4 (fourth generation) database appliances (but not for G4 service appliances), in addition to the ports listed in the previous section, the following ports are used:

Ports Protocol Direction Description

7809

TCP Two-way This port is used only for communication between database appliances and is secured using encryption.
7819 through 7899 TCP Two-way These ports are used only for communication between database appliances and are secured using encryption.

LDAP Server Ports

These ports must be open on the LDAP server:

Port Protocol Direction Description

389

TCP Outbound This port is used for non-encrypted communication with the LDAP server
636 TCP Outbound This port is used for SSL communication with the LDAP server.

Network Integration

These ports must be open on the DNS and NTP servers.

Port Protocol Direction Description

53

TCP or UDP Outbound To the DNS server for lookups of addresses that need to be resolved.
123 TCP or UDP Outbound To an NTP server.

Backups and Upgrades

An Imprivata appliance can be configured to communicate with a file server for the purposes of backing up the appliance to a secure location, or the storage of upgrade media for upload to the appliance at a convenient time. The file server can be an FTP server, a Microsoft Share or an SCP server.

Port Protocol Direction Description

FTP

TCP Outbound

Allows FTP operations in both Active and Passive mode:

  • Appliance Operations: FTP action performed by the appliance (configured in the Imprivata Appliance Console) is performed in Active (Non-Passive) Mode.

  • OneSign and Confirm ID Operations: FTP action performed by Imprivata OneSign and Imprivata Confirm ID (configured in the Imprivata Admin Console) is performed in Passive Mode.

MS Share TCP Outbound Consult Microsoft documentation for a summary of the port numbers required.
SCP TCP Outbound Secure Copy uses SSH (port 22) to communicate with the Secure Server.

Logging and Alerts

The Imprivata server can send SMTP alerts via a designated mail server, and can also integrate with a Syslog server.

Port Protocol Direction Description
25 TCP Outbound To the mail server using the SMTP protocol.
514 UDP Outbound Used for communication to syslog server.

RADIUS Server Integration

The following ports are utilized when integrating with RADIUS.

Port Protocol Direction Description
1812 UDP Inbound If you are using RADIUS host or Proxy feature, these ports are open on the appliance inbound. The ports only accept RADIUS connections in this case.
1813 UDP Inbound
1812 or 1645 UDP Outbound Connections to an external RADIUS server such as an RSA RADIUS server. The request is outbound to the RSA Server that is listening on port 1812 or port 1645.

Microsoft Remote PC RDP Automation

The following ports are utilized with Remote PC RDP automation.

Port Protocol Direction
135 TCP Two-way
49666 TCP Two-way