Network and Communication Security

HPE recommends that you add the iptables rules listed below to the following below tables.

Important Apart from the listed ports, all other ports should be blocked at the localhost level.

Required ports Service Add rules on Server Direction Short description
111 NFS NFS server Nodes ->NFS Server NFS server port access by all nodes
2049 NFS NFS server Nodes ->NFS Server NFS server port access by all nodes
2380 Etcd Master Node Master<-> Master Etcd service port for etcd cluster communication
4001 Etcd Master Node Nodes -> Master Etcd service port for connection from client
4194 Kubernetes All Nodes in Cluster Localhost only cAdvisor for local kubelet
5000 Private Registry All Nodes in Cluster Localhost only Registry port for local host
5443 MngPortal Ingress Node All -> Ingress Node The port exposed on ingress node. all clients could access this port
8200 Vault Master Node Nodes->Master Vault port for client connection
8443 kubernetes Master Node Nodes->Master API server port for client connection
10250 Kubernetes All Nodes in Cluster Nodes->Nodes Kubernetes port for internal communication
10251 Kubernetes Nodes->Nodes Kubernetes port for internal communication
10252 Kubernetes Nodes->Nodes Kubernetes port for internal communication
10255 Kubernetes Nodes->Nodes Kubernetes port for internal communication
20048 NFS NFS server Nodes ->NFS Server NFS server port access by all nodes

Example:

The cluster is installed on 10.10.10.10, 10.10.10.11, 10.10.10.12. The Master Node on: 10.10.10.10

To add an iptable rules to port 8443 on the master node do the following:

iptables -I INPUT 1 -p tcp -m tcp -s 0.0.0.0/0 --dport 8443 -j DROP

iptables -I INPUT 1 -p tcp -s 127.0.0.1 --dport 8443 -j ACCEPT

iptables -I INPUT 1 -p tcp -s 10.10.10.10 --dport 8443 -j ACCEPT

iptables -I INPUT 1 -p tcp -s 10.10.10.11 --dport 8443 -j ACCEPT

iptables -I INPUT 1 -p tcp -s 10.10.10.12 --dport 8443 -j ACCEPT