Kaspersky Anti Targeted Attack Platform

Ports used on computers with Kaspersky Anti Targeted Attack Platform components

The described rules apply to all types of hosts, regardless of configuration. The rules are applied via the kata-firewall systemd service, only for the INPUT and DOCKER-USER chains.

INPUT chain

This chain manages all connections to computers with Kaspersky Anti Targeted Attack Platform components.

Networking rules are listed in the table below.

Networking rules for the INPUT chain

Destination service or protocol

Port

Protocol

sport

dport

Access from external network

SSH

22

TCP

Inaccessible

Accessible

Accessible

SMTP

25

TCP

Inaccessible

Accessible

Accessible

DNS

53

TCP

Inaccessible

Accessible

Accessible

HTTP

80

TCP

Inaccessible

Accessible

Accessible

SNMPD

161

UDP

Inaccessible

Accessible

Accessible

HTTPS

443

TCP

Inaccessible

Accessible

Accessible

preprocessor_icap

1334

TCP

Inaccessible

Accessible

Accessible

docker swarm

2377

TCP

Accessible

Accessible

Inaccessible

etcd

2379

TCP

Inaccessible

Accessible

Accessible

etcd

2380

TCP

Inaccessible

Accessible

Accessible

ceph_mon

3300

TCP

Inaccessible

Accessible

Accessible

VXLAN

4789

TCP/UDP

Accessible

Accessible

Inaccessible

ceph_mon

6789

TCP

Inaccessible

Accessible

Accessible

сeph OSD

6800:6900

TCP

Inaccessible

Accessible

Accessible

docker swarm

7946

TCP/UDP

Accessible

Accessible

Inaccessible

ipsec_manager

8084

TCP

Accessible

Accessible

Inaccessible

pcap_manager

8085

TCP

Inaccessible

Accessible

Accessible

HTTPS

8443

TCP/UDP

Not available

Accessible

Accessible

HTTPS

8444

TCP/UDP

Not available

Accessible

Accessible

kafka_proxy

9080

TCP

Accessible

Accessible

Inaccessible

suricata_metrics_exporter

9103

TCP

Accessible

Accessible

Inaccessible

node_exporter

9141

TCP

Accessible

Accessible

Inaccessible

cadvisor

9142

TCP

Accessible

Accessible

Inaccessible

preprocessor_metrics_exporter

9191

TCP

Accessible

Accessible

Inaccessible

pcap_manager_metrics_exporter

9192

TCP

Accessible

Accessible

Inaccessible

ceph_mgr

9283

TCP

Inaccessible

Accessible

Accessible

ceph_rgw

9284

TCP

Inaccessible

Accessible

Accessible

NDR sensor

9443

TCP

Inaccessible

Accessible

Accessible

kafka bootstrap

11000:11006

TCP

Inaccessible

Accessible

Accessible

KICKS EKA

13520

TCP

Inaccessible

Accessible

Accessible

DOCKER-USER chain

This chain manages network connections for addressing of application components. Networking rules are listed in the table below.

Networking rules for the DOCKER-USER chain

Destination service or protocol

Port

Protocol

sport

dport

SMTP

25

TCP

Inaccessible

Accessible

DNS

53

TCP/UDP

Not available

Accessible

HTTP

80

TCP

Inaccessible

Accessible

HTTPS

443

TCP

Inaccessible

Accessible

preprocessor_icap

1344

UDP

Inaccessible

Accessible

NDR NATS (KICKS NAT)

7423

TCP

Inaccessible

Accessible

NDR public API

8070

TCP

Inaccessible

Accessible

deployment API

8080

TCP

Accessible

Accessible

deployment management API

8090

TCP

Accessible

Accessible

authorization service

8091

TCP

Accessible

Accessible

HTTPS

8443

TCP

Inaccessible

Accessible

apt collector ssl

9081

TCP

Inaccessible

Accessible

Sensor

9443

TCP

Inaccessible

Accessible

NDR EKA

13520

TCP

Inaccessible

Accessible