FlashArray Port Assignments
FlashArray Port Assignments
This article is to serve as a reference for which ports Pure Storage uses by service. Please keep in mind that firewall
rules apply to the management IPs of BOTH controllers as well as the Virtual IP and should be configured as such for
Pure1 Connectivity. This is because we phone home logs from both controllers individually. The virtual IP only is not
enough because it only redirects to the primary controller. Moreover the virtual IP changes through failovers, etc.
• Send Logs: Send array diagnostic, log, and performance data to Pure1 Cloud (via HTTPS).
• RemoteAssist: Enable Pure Storage Support, when given permission from the customer, to view and administer
the FlashArray via RemoteAssist sessions (via SSH over HTTPS).
• ActiveCluster Cloud Mediator: Allow use of the ActiveCluster Pure1 Cloud Mediator.
If the FlashArray fails to connect Pure1 Cloud via the new methods, by default, it will fall back to using the connection
methods of SSH and SSH over HTTPS used before Purity 4.9. These ports are summarized in the table below. In order
to connect to Pure1 Cloud even when the new connection methods fail, the FlashArray should enable these ports.
However, the following ports should be disabled if the FlashArray only wants HTTPS outgoing connections.
Pure1
4.9.0+ 443 TCP HTTPS Outbound
Cloud For IPv4, use both the following IP block
and hostnames:
◦ *.cloud-
Pure1 SSH over support.purestorage.com
4.9.0+ 443 TCP Outbound
Cloud HTTPS
For IPv6, we currently do not support
static IPs. Use the following hostnames:
• *.cloud-support.purestorage.com
[1]
This is an IP CIDR block. This refers
to 32 IPs (52.40.255.224 -
52.40.255.255). Most firewalls will
accept the whole block, so it can be
entered as one-line in most cases.
Pure1
4.8.x- 22 TCP SSH Outbound
Cloud Use with the following hostnames / IP
addresses:
• phlb1.purestorage.com
(50.112.109.24)
• phlb2.purestorage.com
(50.112.109.205)
• *.cloud-support.purestorage.com
(52.40.255.224/27) [1]
• Additional IP's used (Prior to 4.9.x
only)
◦ 50.112.109.24
◦ 50.112.109.205
Pure1 SSH over
4.8.x- 443 TCP Outbound ◦ 52.64.175.227
Cloud HTTPS
◦ 52.64.233.172
◦ 52.11.11.2
◦ 52.11.27.144
◦ 52.76.11.29
◦ 52.74.190.195
◦ 52.17.31.75
◦ 52.30.94.237
◦ 54.232.253.142
◦ 54.94.198.85
[1]
This is an IP CIDR block. This refers
to 32 IPs (52.40.255.224 -
52.40.255.255). Most firewalls will
accept the whole block, so it can be
entered as one-line in most cases.
For customers that cannot whitelist wildcards, you may try the following FQDN's:
rest.cloud-support.purestorage.com
restricted-rest.cloud-support.purestorage.com
ra.cloud-support.purestorage.com
restricted-ra.cloud-support.purestorage.com
Please note, if any of these services are being accessed over a WAN, you will need to open these ports to the Public
Network.
137,
UDP Inbound
138
CIFS Required for Purity RUN
139,
TCP Inbound
445
iSCSI
3260 Host Port TCP iSCSI Inbound
Service
Management
22 TCP SSH Inbound
Port
Management
80 TCP HTTP Inbound Redirects to HTTPS port 443
Port
Management
Service
Management Used by the SNMP MIB to
161 UDP SNMP -
Port collect array information.
2049,
NFS UDP, TCP Required for Purity RUN
4045
Required by replication to
communicate between two
arrays. Open port 443 on the
firewall.
Inbound
vSphere 443,
TCP +
Web Plugin 9443
Outbound
Other Ports
Please note that destination ports 44444 through 44507 (UDP) may be used by Purity for diagnostic purposes.