Red Hat Bugzilla – Bug 1315972
Network flow , ports for patching and provisioning activities on satellite 6
Last modified: 2016-06-17 10:12:14 EDT
*** Bug 1324157 has been marked as a duplicate of this bug. ***
This content is now live on the Customer Portal.
The tables have been updated and can be found in the "Ports and Firewalls Requirements" section. (There were some that were missing too, and for that we apologize).
Note that in the "Optional Network Ports" table we have made the wording more consistent and we hope it is now clear what ports are used for provisioning. If required, we could split the optional port table up into smaller tables.
TCP is bi-directional by design and UDP is not.
For TCP, if you have a stateful firewall, you just open in the outgoing direction. I you have a non-stateful firewall, you will have to enable the return path. We believe that as long as the direction is clear from the tables in the installation guide, then the firewall admin should be able to work this out. That is the purpose of the *per-direction* tables, to provide the info required to plan what network based firewall changes are required. We are preparing a diagram to show these paths.
The only UDP communications in the tables are those used by TFTP and DHCP during provisioning.
TFTP does send UDP packets in both directions, but the traffic is only initiated by the client, from a random port, and the destination port is 69 (server side).
The DHCP service uses broadcast UDP packets. Port 67 is source *and* destination for the server and the client sends *and* receives on 68. You can think of that as bi-directional I suppose as the ports are known on both sides (no random source port in this case). We hope this is now clear in the "Optional Network Ports" table.
Please let us know if the information is now more intelligible.