Security site or roadside networks are often tightly controlled to minimise vulnerabilities. The following rules must be incorporated in to any firewall settings to ensure the correct function of a Witness™ system.
Port | Required Route | Reason |
---|---|---|
22 |
| SSH to radar (TCP) |
50022 |
| SSH to embedded tracking processor in radar (TCP) |
6317* |
| Native radar data (TCP) |
56317 |
| Data from Tracker to Track Engine (TCP) |
443 |
| Web UI for radar - TLS (TCP) |
6317* |
| Messaging & Control between ClearWay™ software modules (TCP) |
4300-43xx* |
| Radar data for display (UDP) |
123 |
| NTP (UDP) |
10000* |
| XML over TCP/IP (TCP) |
51210* |
| OPC UA (TCP) |
502* |
| Modbus over TCP/IP (TCP) |
554 |
| Situational Awareness (RTSP) |
27010* |
| Database access (TCP) |
8443* |
| Web access to SItuational Awareness2 |
Ports marked with * are configurable and can be changed as part of the commissioning process. We strongly recommend that these are left at the default where possible to avoid any future issues while maintaining the system. |
Change the content by label macro to filter for other articles / resources related to this one. You can select one or labels in the macro to auto-link other pages.