Security Internet Access and Communication Ports
Security Internet Access and Communication Ports
Ports
The following topics provide information on system security, internet access, and communication ports:
• Security Requirements, on page 1
• Cisco Clouds, on page 1
• Internet Access Requirements, on page 2
• Communication Port Requirements, on page 4
Security Requirements
To safeguard the Firepower Management Center, you should install it on a protected internal network. Although
the FMC is configured to have only the necessary services and ports available, you must make sure that attacks
cannot reach it (or any managed devices) from outside the firewall.
If the FMC and its managed devices reside on the same network, you can connect the management interfaces
on the devices to the same protected internal network as the FMC. This allows you to securely control the
devices from the FMC. You can also configure multiple management interfaces to allow the FMC to manage
and isolate traffic from devices on other networks.
Regardless of how you deploy your appliances, inter-appliance communication is encrypted. However, you
must still take steps to ensure that communications between appliances cannot be interrupted, blocked, or
tampered with; for example, with a distributed denial of service (DDoS) or man-in-the-middle attack.
Cisco Clouds
The Firepower System uses Cisco’s Collective Security Intelligence (CSI) cloud to obtain the threat intelligence
data it uses to assess risk for files and to obtain URL category and reputation. With the correct licenses, you
can specify communications options for the AMP for Networks and URL Filtering features.
Additional information:
• Advanced Malware Protection
The public cloud is configured by default; to make changes, see Change AMP Options.
• URL filtering
Tip If you are using AMP for Networks or AMP for Endpoints, your location can determine which AMP cloud
resources the FMC accesses. The Required Server Addresses for Proper AMP Operations Troubleshooting
TechNote lists the internet resources (including static IP addresses) required not only by Firepower appliances,
but also by Cisco AMP components like connectors and private cloud appliances.
cloud-sa-589592150.us-east-1.
elb.amazonaws.com
Cisco Smart Licensing Communicate with the Cisco Smart Software tools.cisco.com
Manager.
RSS feeds Display the Cisco Threat Research Blog on the blogs.cisco.com/talos
dashboard.
cloud.google.com
Whois Request whois information for an external host. The whois client tries to guess the right server to
query. If it cannot guess, it uses:
Not supported with a proxy server.
• NIC handles: whois.networksolutions.com
• IPv4 addresses and network names:
whois.arin.net
161/udp SNMP FMC Inbound Allow access to MIBs via SNMP polling.
Any device
162/udp SNMP FMC Outbound Send SNMP alerts to a remote trap server.
Any device
443/tcp HTTPS FMC Outbound Send and receive data from the internet. For
details, see Internet Access Requirements, on
Any device
page 2.
443 HTTPS FMC Outbound Communicate with the AMP cloud (public or
private)
See also information for port 32137.
443 HTTPS FMC Inbound and Integrate with AMP for Endpoints
Outbound
514/udp Syslog (alerts) FMC Outbound Send alerts to a remote syslog server.
Any device
885/tcp Captive portal Any device Inbound Communicate with a captive portal identity
source.
1500/tcp Database access FMC Inbound Allow read-only access to the event database
by a third-party client.
2000/tcp
8307/tcp Host input client FMC Inbound Communicate with a host input client.
32137/tcp AMP for Networks FMC Outbound Communicate with the Cisco AMP cloud.
This is a legacy configuration. We recommend
you use the default (443).
Related Topics
Identifying the LDAP Authentication Server
Configuring RADIUS Connection Settings