Set up firewalls to allow traffic to flow as described in the following table.
Table 2–4 Summary of Firewall Rules
From |
To |
Port # |
Protocol |
Traffic Type |
---|---|---|---|---|
Internet users |
LoadBalancer-4 |
9443 |
HTTPS |
User authentication |
Internet users |
LoadBalancer-5 |
90 |
HTTP |
Application access by internet user |
Internet user |
LoadBalancer-6 |
90 |
HTTP |
Application access by internet user |
AuthenticationUI-1 |
LoadBalancer-3 |
9443 |
HTTPS |
User authentication |
AuthenticationUI-2 |
LoadBalancer-3 |
9443 |
HTTPS |
User authentication |
LoadBalancer-5 |
ProtectedResource-1 |
1080 |
HTTP |
Application access by user |
LoadBalancer-6 |
ProtectedResource-2 |
1081 |
HTTP |
Application access by user |
Intranet User |
LoadBalancer-3 |
9443 |
HTTPS |
User authentication and various Access Manager services |