Skip to main content

Packet filtering

Open ports are an exploitable means of system entry. Limiting the number of open ports effectively reduces the number of potential entry points into the server. A server can be port scanned to identify available services.

Use packet filtering to block all inbound connections other than the following default ports required by Bravura Security Fabric:

Default TCP port

Service

443/TCP

IIS / HTTPS web service.

5555/TCP

Bravura Security Fabric database service default port number (iddb).

2380/TCP

Bravura Security Fabric file replication service default port (idfilerep).

3334/TCP

Password manager service (idpm ).

2340/TCP

Session monitoring package generation service (idsmpg).

2540/TCP

Discovery service (iddiscover).

6190/TCP

Privileged access service (idarch).

2240/TCP

Workflow Manager service (idwfm).

2234/TCP

Transaction monitor service (idtm).