Configuring firewall rules

Correct operation of the application and its components requires configuring firewall rules on the network equipment that links computers with the installed application components. These rules can be configured using the iptables utility. The ports are described in iptables terms.

Operating systems of component are delivered with pre-configured firewall rules. We strongly recommend against changing these rules.

In this section

Ports used on computers with Kaspersky Anti Targeted Attack Platform components

Ports used by Kaspersky Anti Targeted Attack Platform services in a cluster configuration

Ports used by services of a Central Node deployed as a server

Ports used by services in a configuration with the Sensor component installed on a standalone server

Ports for communication between network traffic analysis services

Page top