Ports used by SEP Sesam
When using the standard configuration for SEP Sesam the following TCP ports must be open:
Server:
Client:
Standard Connection Process:
Custom Ports for firewalled/nat/wan/vpn clients:
Example rules for linux:
Firewalld based configuration:
The firewalld equivalent of second rule is (effectively a whitelist for all tcp ports):
firewall-cmd --permanent --add-rich-rule='rule family="ipv4" protocol value="tcp" source address="10.18.214.7/32" accept'
firewall-cmd --reload
firewall-cmd --list-all
public (default, active)
interfaces: enp4s0f0 enp4s0f1 enp4s0f1.20 ib0
sources:
services: dhcpv6-client ssh
ports:
masquerade: no
forward-ports:
icmp-blocks:
rich rules:
rule family="ipv4" source address="10.18.214.7/32" protocol value="tcp" accept
Leave us your information and we will reach out to you shortly!
Browse videos from SEP's YouTube channel.