GigaVUE V Series in Azure

Network Firewall Requirements for Azure

Following is the Network Firewall Requirements for V Series 2 node deployment.

Direction

Type

Protocol

Port

CIDR

Purpose

GigaVUE‑FM

Inbound

HTTPS
SSH

TCP

443
22

Administrator Subnet

Management connection to GigaVUE‑FM

Outbound

Custom TCP Rule

TCP(6)

9900

GigaVUE‑FM IP

Allows G-vTAP Controller to communicate with GigaVUE‑FM

Outbound (optional)

Custom TCP Rule

TCP

8890

V Series Proxy IP

Allows GigaVUE‑FM to communicate with V Series Proxy

Outbound

(configuration without V Series Proxy)

Custom TCP Rule

TCP

8889

V Series 2 Node IP

Allows GigaVUE‑FM to communicate with V Series node

G-vTAP Controller

Inbound

Custom TCP Rule

TCP(6)

9900

GigaVUE‑FM IP

Allows G-vTAP Controller to communicate with GigaVUE‑FM

Outbound

Custom TCP Rule

TCP(6)

9901

G-vTAP Controller IP

Allows G-vTAP Controller to communicate with G-vTAP Agents

G-vTAP Agent

Inbound

Custom TCP Rule

TCP(6)

9901

G-vTAP Controller IP

Allows G-vTAP Agents to communicate with G-vTAP Controller

Outbound

UDP
IP
UDP (VXLAN)
IP Protocol (L2GRE)

VXLAN (default 4789)

G-vTAP Agent or Subnet IP

Allows G-vTAP Agents to (VXLAN/L2GRE) tunnel traffic to V Series nodes

V Series Proxy (optional)

Inbound

Custom TCP Rule

TCP

8890

GigaVUE‑FM IP

Allows GigaVUE‑FM  to communicate with V Series Proxy

Outbound

Custom TCP Rule

TCP

8889

V Series 2 node IP

Allows V Series Proxy to communicate with V Series node

V Series 2 node

Inbound

Custom TCP Rule

TCP

8889

GigaVUE-FM IP
V Series Proxy IP

Allows V Series Proxy or GigaVUE-FM to communicate with V Series node

Inbound

UDP
IP
UDP (VXLAN)
IP Protocol (L2GRE)
VXLAN (default 4789)
L2GRE

G-vTAP Agent or Subnet IP

Allows G-vTAP Agents to (VXLAN/L2GRE) tunnel traffic to V Series nodes

Inbound

UDP

UDPGRE

4754

Ingress Tunnel

Allows to UDPGRE Tunnel to communicate and tunnel traffic to V Series nodes

Outbound

Custom UDP Rule

UDP (VXLAN)
IP Protocol (L2GRE)

VXLAN (default 4789)

Tool IP

Allows V Series node to communicate and tunnel traffic to the Tool

Outbound (optional)

ICMP

ICMP

echo request
echo reply

Tool IP

Allows V Series node to health check tunnel destination traffic

The following is the Network Firewall Requirements for V Series 1 node deployment.

Direction

 

Protocol

Port Range

Source and

CIDR, IP, or Security Group

Purpose

GigaVUE-FM Inside Azure

Inbound

HTTPS

TCP(6)

443

Anywhere

Any IP

Allows G-vTAP Controllers, GigaVUE V Series Controllers, and GigaVUE-FM administrators to communicate with GigaVUE-FM

G-vTAP Controller

Inbound

Custom TCP Rule

TCP

9900

Custom

GigaVUE-FM IP

Allows GigaVUE-FM to communicate with G-vTAP Controllers

 

 

 

G-vTAP Agent

Inbound

Custom TCP Rule

TCP

9901

Custom

G-vTAP Controller IP

Allows G-vTAP Controllers to communicate with G-vTAP Agents

GigaVUE V Series Controller

Inbound

Custom TCP Rule

TCP

9902

Custom

GigaVUE-FM IP

Allows GigaVUE-FM  to communicate with GigaVUE V Series Controllers

GigaVUE V Series 1 node

Inbound

Custom TCP Rule

TCP

9903

Custom

GigaVUE V Series Controller IP

Allows GigaVUE V Series Controllers to communicate with GigaVUE V Series nodes

VXLAN Traffic

Inbound

Custom UDP Rule

VXLAN

4789

 

Allows mirrored traffic from G-vTAP Agents to be sent to GigaVUE V Series nodes using VXLAN tunnel

Allows monitored traffic to be sent from GigaVUE V Series nodes to the tools using VXLAN tunnel