Demystifying Satellite Capsule Server Ports for Optimal Network Communication

For Red Hat Satellite to effectively manage and communicate with all components within your infrastructure, ensuring the correct network ports are open and correctly configured is paramount. This is especially crucial for Satellite Capsule Servers, which act as regional hubs distributing content and services to managed hosts. This article delves into the essential network ports required for Satellite Capsule Servers to function optimally, providing a comprehensive guide for system administrators.

Understanding and properly configuring these ports is not just about connectivity; it’s about ensuring the smooth operation of your entire Red Hat Satellite environment. Whether you are using hardware firewalls or cloud-based network security groups, meticulous port management is key. Some cloud environments, by default, isolate machines, necessitating specific configurations to enable communication, much like traditional firewalls. Furthermore, if you employ application-based firewalls, you must configure them to allow the applications detailed below, or ideally, permit open port communication based on protocol for streamlined operations.

Integrated Capsule Considerations

Red Hat Satellite Server inherently includes an integrated Capsule. Any host directly connected to the Satellite Server is considered a client of this integrated Capsule. This definition includes the base operating system on which the Satellite Server itself is running. Effectively, the Satellite Server manages itself through its integrated Capsule.

Clients Beyond the Integrated Capsule

Hosts that are clients of Capsules, separate from Satellite’s integrated Capsule, do not require direct access to the Satellite Server. Their communication is routed through the Capsule Server. For a deeper understanding of network topologies involving Capsules, refer to the Red Hat Satellite documentation on Capsule Networking. Remember that required ports can fluctuate based on your specific Satellite configuration and the services you utilize.

For a detailed and dynamically updated list of ports, the Red Hat Knowledgebase solution Red Hat Satellite List of Network Ports is an invaluable resource.

The following tables outline the necessary destination ports and the direction of network traffic for various Satellite Capsule Server operations.

Table 1.2 Ports for Satellite to Red Hat CDN Communication

Port Protocol Service Required For
443 TCP HTTPS Subscription Management Services (access.redhat.com) and connecting to the Red Hat CDN (cdn.redhat.com).

Satellite Server requires unrestricted access to the Red Hat CDN (Content Delivery Network). For an exhaustive list of IP addresses used by cdn.redhat.com, consult the Red Hat Customer Portal Knowledgebase article Public CIDR Lists for Red Hat. This is essential for configuring firewall rules to permit outbound traffic to the CDN.

Table 1.3 Ports for Browser-based User Interface Access to Satellite

Port Protocol Service Required For
443 TCP HTTPS Browser-based UI access to Satellite
80 TCP HTTP Redirection to HTTPS for web UI access to Satellite (Optional)

These ports are crucial for administrators to access the Red Hat Satellite web interface. Port 80 is optional but recommended for automatically redirecting HTTP requests to the more secure HTTPS on port 443.

Table 1.4 Ports for Client to Satellite Communication

Port Protocol Service Required For
80 TCP HTTP Anaconda, yum, for obtaining Katello certificates, templates, and for downloading iPXE firmware
443 TCP HTTPS Subscription Management Services, yum, Telemetry Services, and for connection to the Katello Agent
5646 TCP AMQP The Capsule Qpid dispatch router to the Qpid dispatch router in Satellite
5647 TCP AMQP Katello Agent to communicate with Satellite’s Qpid dispatch router
8000 TCP HTTP Anaconda to download kickstart templates to hosts, and for downloading iPXE firmware
8140 TCP HTTPS Puppet agent to Puppet master connections
9090 TCP HTTPS Sending SCAP reports to the integrated Capsule, for the discovery image during provisioning, and for communicating with Satellite Server to copy the SSH keys for Remote Execution (Rex) configuration
7 TCP and UDP ICMP External DHCP on a Client to Satellite network, ICMP ECHO to verify IP address is free (Optional)
53 TCP and UDP DNS Client DNS queries to a Satellite’s integrated Capsule DNS service (Optional)
67 UDP DHCP Client to Satellite’s integrated Capsule broadcasts, DHCP broadcasts for Client provisioning from a Satellite’s integrated Capsule (Optional)
69 UDP TFTP Clients downloading PXE boot image files from a Satellites’ integrated Capsule for provisioning (Optional)
5000 TCP HTTPS Connection to Katello for the Docker registry (Optional)

Any managed host directly connected to the Satellite Server functions as a client of the integrated Capsule, emphasizing the importance of these ports for core management functionalities.

Table 1.5 Ports for Satellite to Capsule Communication

Port Protocol Service Required for
443 TCP HTTPS Connections to the Pulp server in the Capsule
9090 TCP HTTPS Connections to the proxy in the Capsule
80 TCP HTTP Downloading a bootdisk (Optional)

These ports facilitate communication between the Satellite Server and external Capsule Servers, enabling content synchronization and delegated management tasks.

Table 1.6 Optional Network Ports

Port Protocol Service Required For
22 TCP SSH Satellite and Capsule originated communications, for Remote Execution (Rex) and Ansible.
443 TCP HTTPS Satellite originated communications, for vCenter compute resource.
5000 TCP HTTP Satellite originated communications, for compute resources in OpenStack or for running containers.
22, 16514 TCP SSH, SSL/TLS Satellite originated communications, for compute resources in libvirt.
389, 636 TCP LDAP, LDAPS Satellite originated communications, for LDAP and secured LDAP authentication sources.
5900 to 5930 TCP SSL/TLS Satellite originated communications, for NoVNC console in web UI to hypervisors.

These optional ports expand the capabilities of your Satellite infrastructure, enabling features like remote execution, integration with virtualization platforms, and external authentication sources. Carefully consider your environment’s needs when deciding to enable these ports.

Conclusion

Correctly configuring “Satellite Capsule Server Ports” is a foundational step in deploying and maintaining a robust Red Hat Satellite infrastructure. By ensuring these ports are open and properly routed, you pave the way for seamless communication between all components, from the Satellite Server and Capsules to client systems and the Red Hat CDN. Regularly review your firewall configurations and consult the Red Hat Knowledgebase for the most up-to-date port requirements to guarantee the continued health and efficiency of your Satellite environment.

Comments

No comments yet. Why don’t you start the discussion?

Leave a Reply

Your email address will not be published. Required fields are marked *