Firewall Port Requirements for Kubernetes & SELinux Environments

Proper firewall configuration is essential for a stable and secure Capacity Private Cloud deployment on Kubernetes. In environments where SELinux is enabled, strict adherence to security policies is paramount—SELinux governs how processes interact with each other and the network, making explicit firewall allowances and correct SELinux context labeling critical for system stability.

Use the tables below to configure your Network Security Groups (NSGs) or local firewall rules for each component of the platform. Ensure all listed ports are open between the relevant nodes and services before deploying or upgrading.

Kubernetes Control Plane & Worker Nodes

The following ports are required for cluster orchestration and internal component communication.

ProtocolPort / RangePurposeUsed By
TCP6443Kubernetes API ServerAll
TCP2379–2380etcd server client APIkube-apiserver, etcd
TCP10250Kubelet APISelf, Control plane
TCP10256Kube-proxy health checkSelf
TCP10257kube-controller-managerSelf
TCP10259kube-schedulerSelf

NGINX Ingress Controller

The NGINX Ingress Controller manages external access to cluster services, functioning as a reverse proxy and load balancer for the platform.

ProtocolPort / RangePurposeUsed By
TCP80Standard HTTP trafficKubernetes
TCP443HTTPS / Ingress controllerKubernetes
TCP8443Internal control plane (webhook)Kubernetes
TCP10254Metrics / health check endpointKubernetes

Calico Networking (CNI)

Calico is the Container Network Interface (CNI) plugin responsible for pod networking and network security policies. These ports support node-to-node communication and routing.

ProtocolPort / RangePurposeUsed By
TCP179BGP peer-to-peer routing between nodesKubernetes
UDP4789VXLAN overlay networkingKubernetes
TCP5473Typha — scales Calico datastore API accessKubernetes

Media Server

These ports support voice and media processing through the MRCP API, including session signaling and media stream transport.

ProtocolPort / RangePurposeUsed By
TCP/UDP20000–24999MRCP server port base (media channel range)MRCP API
TCP/UDP25000–29999MRCP server port base (extended range)MRCP API
TCP/UDP5060SIP signaling (sip_port)MRCP API
TCP/UDP5061SIPS signaling (sips_port)MRCP API
TCP/UDP554RTSP media streaming (rtsp_port)MRCP API

External Services & Database Connectivity

The following ports are required for application data persistence, caching, and messaging infrastructure used by the platform.

ProtocolPort / RangePurposeUsed By
TCP22SSH remote accessSystem admins
TCP5432PostgreSQL databaseApplication clients
TCP6379Redis cacheApplication clients
TCP20717MongoDBApplication clients
TCP5672RabbitMQ (AMQP)Application clients
TCP15672RabbitMQ management consoleAdmins / monitoring

Was this article helpful?