ArcSight Ports & Protocols Guide
ArcSight Ports & Protocols Guide
2
Overview
This document describes the most commonly used ports and protocols used by ESM, ESM Express, Express,
Investigate, User Behavior Analytics, Logger, Event Broker, Management Center, SmartConnectors, Model
Import Connectors, SmartConnector Load Balancer, Connector Appliance, DNA Malware Analytics, Network
Synergy Platform, and Integrated Lights-Out (iLO).
ESM Manager TCP 1976, 28001, 2812, TCP ports used internally
3306, 5555, 6005, 6009, for inter-component
7777, 7778, 7779, 7780, communication and data
8005, 8009, 8080, 8088, exchange between the
8089, 8666, 8766, 8808, threads comprising the
8880, 8888, 8889, 9095, ESM Manager. They do
9090, 9123, 9124, 9999, not required external
45450 access, won't be used
for any cross-device
communication, and can
be blocked by an
external firewall.
3
ESM Manager ESM Manager 1645/UDP Inbound/Outbound
RADIUS, if applicable
4
resolution of ESM/ESM
Express Manager during
Console login.
5
without SSL; TCP 636
with SSL.
Web Service Client ESM/ESM Express TCP 9090 The ESM/ESM Express
Manager Service Layer is available
and exposes
6
functionalities as Web
Services. By consuming
the exposed Web
Services, you can
integrate ESM/ESM
Express functionality in
your own applications.
ESM 6.8c Manager TCP 8443, 9443, 9000 These TCP ports are
used for external
incoming connections.
ESM 6.8c Manager TCP 1976, 28001, 2812, These TCP ports are
3306, 5555, 6005, 6009, used internally for inter-
6443, 7777, 7778, 7779, component
7780, 8005, 8009, 8080, communication by ESM
8088, 8089, 8666, 8766, 6.8c.
8808, 8880, 8888, 8889,
9000, 9001, 9002, 9003,
9004, 9005, 9006, 9007,
9008, 9095, 9090, 9123,
9124, 9999, 45450
7
Investigate (v2.0) and Event Broker (v2.10)
Source Device Destination Device Destination Port Notes
All Vertica nodes All Vertica nodes TCP 22 SSH is needed for
deployment of Vertica to
all Vertica nodes
All Event Broker nodes All Event Broker nodes TCP 22 SSH is needed for
deployment of Event
Broker using the
ArcSight Installer.
All Event Broker nodes, All Event Broker nodes, TCP 9092 Ports 9092 must be
consumers, and consumers, and TCP 9093 reachable by all Event
producers producers Broker nodes,
consumers, and
producers. If you are
using TLS, port 9093
must also be reachable.
Producers are
SmartConnectors.
Consumers are Vertica
with Investigate, Logger,
and ESM.
8
User Behavior Analytics (v5.0)
Source Device Destination Device Destination Port Notes
UBA Server MSFT SMTP Gateway TCP 25 & 465 SMTP notifications
(email alerts from the
application)
UDP 67 DHCP/bootstrap
protocol server is not
needed when static IP
addressing is used
9
Logger (v6.X)
Source Device Destination Device Destination Port Notes
Logger TCP 1976 2812 3306 5555 TCP ports used internally
7777 7778 7779 7780 for inter-component
8005 8009 8080 8088 communication and data
8089 8666 8808 8880 exchange between the
8888 8889 9123 9124 threads comprising
9999 45450 Logger. They do not
required external access,
won't be used for any
cross-device
communication, and can
be blocked by an
external firewall.
10
Logger DNS Server(s) UDP/TCP 53 Logger to DNS server
communication.
Logger SCP, SFTP, FTP Server(s) TCP 22 (SCP, SFTP) Allows Logger File
Transfer Receiver to
11
TCP 20 & 21 (FTP) read remote log files
using SCP, SFTP or FTP
protocols.
Syslog Event Sources Logger UDP 514 or 8514 The UDP receiver is on
port 514/udp for Logger
Appliances. If you are
installing Software
Logger as root, the UDP
receiver is on port
514/udp. For non-root
installs, it is on port
8514/udp. If this port is
already occupied, the
initialization process
selects the next higher
unoccupied port.
Syslog Event Sources Logger TCP 515 or 8515 The TCP receiver is on
port 515/tcp for Logger
Appliances. If you are
installing Software
Logger as root, the TCP
receiver is on port
515/tcp. For non-root
installs, it is on port
8515/tcp. If this port is
already occupied, the
initialization process
selects the next higher
unoccupied port.
12
Logger ESM/ESM Express TCP 8443 (ESM/ESM Used to send all events,
Manager and/or Syslog Express Manager), or events which match a
Server(s) UDP/TCP 514 particular filter, on to a
particular host.
13
TCP 9000 (when installed
as non-root user)
ArcMC ArcMC local syslog UDP/TCP 514 Used for audit forwarding
SmartConnector from ArcMC to the
ArcMC local syslog
SmartConnector.
ArcMC local syslog ESM/ESM Express TCP 8443 Used for audit forwarding
SmartConnector Manager from the ArcMC local
syslog SmartConnector to
ESM/ESM Express
Manager secure and
encrypted event channel.
14
ArcMC local syslog Logger TCP 443 Used for audit forwarding
SmartConnector from ArcMC local syslog
SmartConnector to
Logger SmartMessage
secure and encrypted
event channel.
SmartConnectors
Source Device Destination Device Destination Port Notes
15
Forwarding Connector ESM/ESM Express TCP 8443 Allows you to receive events
Manager from a source ESM/ESM
Express Manager installation
and send them to a
secondary destination.
Forwarding Connector Syslog Server(s) UDP/TCP 514 Allows you to receive events
from a source ESM/ESM
Express Manager installation
and send them to a
secondary destination.
Forwarding Connector McAfee ePolicy TCP 1433 Allows you to receive events
Orchestrator from a source ESM/ESM
Express Manager installation
and send them to a
secondary destination.
Syslog Event Sources SmartConnector UDP/TCP 514 All products that send events
via syslog.
SNMP Event Sources SmartConnector UDP 162 All products that send events
via SNMP.
Microsoft Windows Windows Servers and TCP 445 This SmartConnector can
Event Log – Unified Workstations connect to local or remote
machines, inside a single
domain or from multiple
domains, to retrieve events
from all types of event logs.
Windows Domain Windows Servers TCP 135, 139, 445 The Windows Domain
(Legacy) UDP 137,138 SmartConnector will use RPC
and Remote Registry to
connect to the server and
poll the Windows Event Log.
This SmartConnector requires
domain privileges and
domain membership.
16
Check Point Check Point Provider-1 TCP 18184 The Check Point
(configure for each SmartConnector will connect
CMA) to Provider-1 using Log
Export API (LEA) using SSLCA
and OPSEC will need to be
configured per CMA.
Microsoft SQL Server Microsoft SQL Server TCP 1433 The SmartConnector
TCP 139, 445 establishes connectivity to
the database and reads audit
UDP 135, 139, 445
trace logs simultaneously.
Trace files are not a
requirement with some
products reporting to
Microsoft SQL Server.
Blue Coat Server hosting Blue Coat TCP 20 Allows Blue Coat to send logs
SmartConnector and FTP TCP 21 to server hosting Blue Coat
server SmartConnector over FTP and
FTP-Data.
17
one WinC is installed on the
same server, the port
number should be modified
by
addingmq.server.listener.port
to agent.properties. By
default, this is set to 61616 in
agent.default.properties.
Copy the value to
agent.properties and change
the port number.
18
Model Import Connector tmc.tippingpoint.com TCP 443 A component of
for Reputation Security d.tippingpoint.com Reputation Security
Monitor 1.5 Monitor which retrieves
*.akamai.net reputation data from the
*.akamai.com threat intelligence
service (powered by
DVLabs), processes this
data, and forwards it to
ESM/ESM Express.
tmc.tippingpoint.com is
the application server
that provides the Web
Service. The Web Service
provides a URL to
d.tippingpoint.com to
the client from which
the actual data is
downloaded as files.
Since d.tippingpoint.com
is a cloud service
(Akamai based), the
underlying IP addresses
are subject to change all
the time and therefore
only domain based
filtering can be used
between the Model
Import Connector and
the Internet and not IP
based filtering.
Model Import Connector Active Directory TCP 389 or 636 The Model Import
for IdentityView Connector for Microsoft
Active Directory extracts
the user identity
information (or Actor
data) from the Active
Directory LDAP, and
then uses that data to
populate ESM/ESM
Express Manager with
resources.
Model Import Connector ESM/ESM Express TCP 8443 Model Import Connector
Manager to ESM/ESM Express
Manager secure and
encrypted channel.
19
SmartConnector Load Balancer
Source Device Destination Device Destination Port Notes
20
management and
service alerting.
21
Connector Appliance NFS Server(s) TCP 111 Allows SmartConnectors
UDP 111 to read logs from NFS
TCP 2049 servers.
UDP 2049
TCP 2219
UDP 2219
DNS capture module SAAS analytic engine – Web Sockets – RFC DNS Malware
portal.dnsmalwareanalytics.com 6455 Analytics is a scalable,
Encryption WSS – TLS cloud-based threat
1.2 minimum detector that monitors
DNS traffic and rapidly
WAMP – Web identifies an infected
Application Messaging system, enabling
Protocol 2.0 immediate
remediation in real
time.
22
Network Synergy Platform (v5.X)
Source Device Destination Device Destination Port Notes
NSP Managed devices TCP 22 (SSH, SCP, SFTP) Securely copy or transfer
files.
NSP SNMP Server(s) UDP 161 & 162 (SNMP) SNMP notifications (if
your appliance is
configured to send
them).
23
NSP Syslog Server(s) UDP 514 (syslog) Syslog messages (if your
appliance is configured
to send them).
The information that resides on your NSP appliance is well protected. Any port, except 443, is opened only for
the length of time it takes to perform the action related to that port. After the action has been performed, the
port is closed. The appliance opens no unnecessary ports or third-party software vulnerabilities that might
compromise the security of the information.
24
Company Details
Company name: Micro Focus International plc
Place of registration: England and Wales
Registered number: 5134647
Registered address: The Lawn, 22-30 Old Bath Road, Berkshire, RG14 1Q
25