Which firewall ports are used in Security Center 5.9?
Answer: There are many ports used Security Center. Because Security Center is a unified platform that integrates all of Genetec™ products, the list of ports is quite extensive. As a result, it is recommended to familiarize yourself with the ports used by the various core systems and modules of Security Center.
Firewall ports used by core applications in Security Center
For Security Center to work properly, you need to create firewall rules to allow proper communication between the various services.
The following table lists the default network ports used by core applications in Security Center, and their associated executable files. To view the network diagram, click here.
Application | Inbound | Outbound | Port usage | Executable |
---|---|---|---|---|
Directory | TCP 5500 | TCP 5500 | Client and server connections | GenetecServer.exe |
Client applications (Security Desk, Config Tool, SDK) | TCP 5500 | Genetec™ Server/Directory communication | SecurityDesk.exe ConfigTool.exe |
|
TCP 8012 | Map download requests to Map Manager (HTTPS) | GenetecMapManager.exe | ||
Client applications (Config Tool) | TCP 443 | Communication with GTAP for Genetec™ Advantage validation and feedback (HTTPS) | ConfigTool.exe | |
Client applications (Security Desk, Config Tool) | TCP 443 | Authentication role communication/Secured communication with the portal of the mobile credential provider (HTTPS) | SecurityDesk.exe ConfigTool.exe |
|
Wearable Camera Manager role | TCP 48830 | Configurable in the UI | GenetecBwcManagerRole.exe | |
TCP 48831, 48832, 48833 | Configurable in a config file | GenetecBwcAgentService.exe | ||
All roles (new installation) | TCP 5500 | TCP 5500 | Genetec™ Server/Directory communication | GenetecServer.exe |
TCP 80 | TCP 80 | REST/Server Admin communication (HTTP)1 | ||
TCP 443 | TCP 443 | Secured REST/Server Admin/Authentication role communication (HTTPS)1 | ||
TCP 14332 | Outgoing connections to the SQL Database Engine hosted on another server. | |||
All roles (upgraded from 5.3 or earlier) | TCP 4502 | TCP 4502 | Genetec™
Server/Directory communication If 4502 was the server port before an upgrade, then 4502 remains the server port after the upgrade. |
GenetecServer.exe |
Map Manager | TCP 8012 | Requests for map download from client applications (HTTPS)1 | GenetecMapManager.exe | |
Mobile Server | TCP 443 | Communication from mobile clients. | GenetecMobileRole.exe GenetecMobileAgent.exe |
|
TCP 9000-10000 | Adding mobile devices to an Archiver for video streaming and storage. | |||
Genetec™ Update Service (GUS) | TCP 4595 | TCP 4595 | Communication with other GUS servers1 | GenetecUpdateService.exe |
TCP 443 | TCP 443 | Communication with Azure and Genetec Inc. (HTTPS)1 | ||
SQL Server | 1433 | Incoming connections to the SQL Database Engine from roles on other servers. | sqlservr.exe | |
System Availability Monitor Agent (SAMA) | TCP 4592 | Legacy port for communication with Security Center servers1 | Genetec.HealthMonitor. Agent.exe | |
TCP 443 | Communication with Security Center servers1 | |||
TCP 443 | Connection to the Health Service in the Cloud (HTTPS)1 | |||
Unit Assistant | TCP 5500 | TCP 5500 | Communication with Archiver roles | GenetecUnitAssistant Role.exe |
1 These ports use Windows System components to handle HTTP requests. Microsoft components using http.sys require the following rule: dir="in" protocol="6" lport="<SPECIFY PORT USED HERE: CAN BE 80, 443, or CUSTOM>" binary="System".
2 Applies to roles that must connect to a database on another server. This port is unnecessary if SQL Server is running on the same machine or the role does not have a database.
Firewall ports used by AutoVu™ applications in Security Center
When AutoVu™ is enabled in your system, you need to create additional firewall rules to allow proper communication between Security Center and external AutoVu™ components.
The following table lists the default network ports used by AutoVu™ applications in Security Center. To view the network diagram, click here.
Application | Inbound | Outbound | Port usage | Executable |
---|---|---|---|---|
ALPR Manager | UDP 5000 | Fixed Sharp unit discovery | GenetecLicensePlate Manager.exe | |
TCP 8731 | Fixed Sharp units and Genetec Patroller™ installations | |||
TCP 8787 | Pay-by-Plate (plugin installed separately) | |||
TCP 10001 | LPM protocol listening port | |||
TCP 8001 | Sharp control port (used for Live connections, not LPM protocol connections). | |||
TCP 2323 | Sharp unit configuration (HTTP) | |||
Flexreader™ (Sharp unit) | TCP 80 | Video port (Security Center extension HTTP) | GenetecPlugin.exe | |
TCP 443 | Video port (Security Center extension HTTPS) | |||
TCP 2323 | Extension configuration service (HTTP) | |||
TCP 4502-4534 | Silverlight ports and image feed service (for Sharp models earlier than SharpV) | |||
TCP 4545 | Control port (Mobile installation) | |||
UDP 5000 | Discovery port | |||
TCP 8001 | Control port (Fixed installation) | |||
TCP 21 | FTP file upload | |||
Portal Server (Sharp unit) | TCP 80 | Communication port (HTTP) | GenetecPlugin.exe | |
TCP 443 | Secure communication port (HTTPS) | |||
Genetec Patroller™ (in-vehicle computer) | TCP 4546 | Communication with Time server | Patroller.exe | |
TCP 8001 | Communication with Simple Host | |||
UDP 5000 | Sharp camera discovery | Patroller.exe PatrollerConfigTool.exe |
||
TCP 8731 | ALPR Manager connection | Patroller.exe |
Firewall ports used by Omnicast™ applications in Security Center
When Omnicast™ is enabled in your system, you need to create additional firewall rules to allow proper communication between Security Center and external IP video devices.
The following table lists the default network ports used by Omnicast™ applications in Security Center. To view the network diagram, click here.
Application | Inbound | Outbound | Port usage | Executable |
---|---|---|---|---|
Archiver | TCP 554 | Communication between the Archiver and the Media Router to announce content. | GenetecArchiverAgent32.exe | |
TCP 5551 | Live and playback stream requests | |||
TCP 6051 | Edge playback stream requests | GenetecVideoUnit Control32.exe | ||
TCP 5500 | TCP 5500 | Communication between the primary Archiver and failover servers. | GenetecArchiver.exe GenetecArchiverAgent32.exe GenetecVideoUnit Control32.exe |
|
TCP 56021 | Telnet console connection requests | GenetecArchiverAgent32.exe | ||
UDP 6000-6500 | Audio from client applications | GenetecVideoUnit Control32.exe | ||
UDP 15000–199992 | Live unicast streaming from IP cameras | |||
UDP 47806, 47807 | UDP 47806, 47807 | Live video and audio multicast streaming | GenetecArchiverAgent32.exe GenetecVideoUnit Control32.exe |
|
TCP & UDP | TCP Common ports include:
|
Vendor-specific ports for cameras | GenetecVideoUnit Control32.exe | |
Redirector | TCP 560, 9603 | Live and playback stream requests | GenetecRedirector.exe | |
TCP 554 | Communication with Media Router (Security Center Federation™) | |||
TCP 555 | Communication with Archiver | |||
TCP 558 | Communication with Auxiliary Archiver | |||
TCP 560, 9603 | Stream requests to other redirectors | |||
UDP 6000-6500 | Media transmission to client applications | |||
UDP 8000–12000 | UDP 8000–12000 | Media transmission to other redirectors | ||
UDP 47806, 47807 | UDP 47806, 47807 | Live video and audio multicast streaming | ||
UDP 65246 | UDP 65246 | Live video multicast streaming (Security Center Federation™) | ||
Auxiliary Archiver | TCP 558 | Live and playback stream requests | GenetecAuxiliaryArchiver.exe | |
UDP 6000-6500 | Unicast media streams | |||
UDP 47806, 47807 | Live video and audio multicast streaming | |||
UDP 65246 | Live video multicast streaming (Security Center Federation™) | |||
TCP 554, 560, 9603 | Playback stream requests | |||
Media Router | TCP 554 | Live and playback stream requests, and announce requests | GenetecMediaRouter.exe | |
TCP 554 | Federated Media Router stream requests | |||
Media Gateway | TCP 654 | Live and playback stream requests from RTSP clients | Genetec.MediaGateway.exe | |
TCP 80, 443 | Incoming stream requests from mobile and web clients | |||
TCP 5500 | TCP 5500 | Communication between the Media Gateway agents and the Media Gateway role. | ||
UDP 6000-6500 | Live video unicast streams | Genetec.Media Component32.exe | ||
UDP 47806, 47807 | UDP 51914 | Live video and audio multicast streaming | ||
TCP 554, 560, 9603 | Live and playback video requests | |||
Omnicast™ Federation™ | TCP 5001-5002 | Connection to remote Omnicast™ 4.x systems. | GenetecOmnicast Federation32.exe | |
Security Center Federation™ | TCP 5500 | Connection to remote Security Center systems. | GenetecSecurityCenter Federation.exe | |
Client applications (Security Desk and Config Tool) | UDP 6000–6200 | Unicast media streams | SecurityDesk.exe ConfigTool.exe Genetec.Media Component32.exe |
|
UDP 47806, 47807 | Live video and audio multicast streaming | |||
UDP 65246 | Live video multicast streaming (Security Center Federation™) | |||
TCP 554, 560, 9603 | Live and playback video and audio requests | |||
Client application (Config Tool) | Vendor-specific TCP and UDP ports | Unit discovery with the Unit enrollment tool | ConfigTool.exe Genetec.Media Component32.exe |
1 Applies to servers hosting one Archiver role. If multiple Archiver roles are hosted on the same server, each additional role uses the next free port.
3 TCP port 960 applies to new installations of Security Center 5.8 and later. Note that in Security Center 5.6 and 5.7, TCP port 5004 was used instead of TCP port 960. Therefore, any system upgraded to 5.9 through 5.6 or 5.7 will continue to use TCP port 5004.
Firewall ports used by KiwiVision™ applications in Security Center
When KiwiVision™ modules are enabled in your system, you need to create additional firewall rules to allow proper communication between Security Center and external IP video devices.
The following table lists the default network ports used by KiwiVision™ modules in Security Center and their associated executable files. To view the network diagram, click here.
Application | Inbound | Outbound | Port usage | Executable |
---|---|---|---|---|
Ports for the KiwiVision™ Privacy Protector™ and KiwiVision™ Camera Integrity Monitor modules | ||||
Media processing applications (Privacy Protector™ and Camera Integrity Monitor) | TCP 754 | Live video requests | Genetec.MediaProcessor.exe | |
UDP 7000-7500 | Live video unicast streams | |||
UDP 47806 | Live video multicast streaming | |||
UDP 65246 | Live video multicast streaming (Security Center Federation™) | |||
TCP 554, 560, 9601 | Live and playback video requests | |||
Ports for the KiwiVision™ Security video analytics and KiwiVision™ People Counter modules | ||||
KiwiVision™ Manager | TCP 1433, 1434 | Communication with KiwiVision™ Manager database | GenetecPlugin.exe | |
KiwiVision™ Analyzer | UDP 6000–6500 | Live video unicast streams | GenetecPlugin.exe | |
UDP 47806 | Live video multicast streaming | |||
UDP 65246 | Live video multicast streaming (Security Center Federation™) | |||
TCP 554, 560, 9601 | Live and playback video requests | |||
TCP 1433, 1434 | Communication with KiwiVision™ Manager database |
1 TCP port 960 applies to new installations of Security Center 5.8 and later. Note that in Security Center 5.6 and 5.7, TCP port 5004 was used instead of TCP port 960. Therefore, any system upgraded to 5.9 through 5.6 or 5.7 will continue to use TCP port 5004.
Firewall ports used by Synergis™ applications in Security Center
When Synergis™ is enabled in your system, you need to create additional firewall rules to allow proper communication between Security Center and external IP access control devices.
The following table lists the default network ports used by Synergis™ applications in Security Center. To view the network diagram, click here.
Application | Inbound | Outbound | Port usage | Executable |
---|---|---|---|---|
Access Manager | UDP 2000 | Synergis™ extension - discovery | GenetecAccessManager.exe | |
TCP 443 | Secure communication with Synergis™ units and HID units (HTTPS) | |||
TCP 20 | TCP 21 | HID extension - FTP data and command1 | ||
TCP 22 | HID extension - SSH1 | |||
TCP 23 | HID extension - Telnet1 | |||
TCP 80 | HID extension - HTTP communication | |||
TCP 4050/44332 | HID extension - VertX OPIN protocol | |||
TCP/UDP 4070 | TCP/UDP 4070 | HID extension - VertX discovery3 | ||
TCP/UDP | Vendor-specific ports for events and discovery from IP access control device | |||
UDP 514 | Remote syslog server | |||
Global Cardholder Synchronizer | TCP 4502 | TCP 4502 | Genetec™ Server communication | GenetecGlobal CardholderManagement.exe |
TCP 80 | TCP 80 | REST Server communication | ||
TCP 5500 | Directory & federated Directory connection |
1 Not required if HID units are configured with Secure mode.
2 Legacy HID units or EVO units running a firmware version earlier than 3.7 use port 4050. HID EVO units running in secure mode with firmware 3.7 and later user port 4433.
3 The discovery port of an HID unit is fixed at 4070. After it is discovered, the unit is assigned to an Access Manager that uses the ports shown in the previous table to control it.
For more information about initial HID hardware setup, download the documentation from http://www.HIDglobal.com.