Sie sind auf Seite 1von 20

C•CURE 9000 and iSTAR

Port Assignments
The port assignments in this document are valid for C·CURE 9000 2.70, iSTAR Ultra family firmware v6.6.3, iSTAR Pro
firmware v5.2.x, and the iSTAR Edge/eX firmware v6.2.x. This document also provides port information for C·CURE 9000
integrations. The main purpose of this port document is to help customers when setting up a firewall. This document does not
list ports using internally by each device.

Ports are listed by the device that has the port open.

Release Date: September 2018

8200-1413-01 D4
Table of Contents

Table of Contents ................................................................................................................................................................ 2

C•CURE 9000 Server (victor Application Server) ................................................................................................................ 3

iSTAR Edge/eX ................................................................................................................................................................... 6

iSTAR Pro ........................................................................................................................................................................... 7

iSTAR Ultra, iSTAR Ultra SE, iSTAR Ultra LT ..................................................................................................................... 8

iSTAR Ultra Video ............................................................................................................................................................... 9

IP-ACM v1 ......................................................................................................................................................................... 12

IP-ACM v2 ......................................................................................................................................................................... 12

Innometriks Readers ......................................................................................................................................................... 12

SQL Server........................................................................................................................................................................ 13

ICU .................................................................................................................................................................................... 14

Other Components ............................................................................................................................................................ 15

2
C•CURE 9000 Server (victor Application Server)

C•CURE 9000 Server (victor Application Server (vAS))


Port/ Protocol Direction Initiator Process/ Description
Range Service
80 TCP Inbound Client IIS for HTTP Port for IIS, C·CURE web client. If IIS is installed on a
Listening different server, please make sure this Inbound listening
port is opened for the IIS server.
443 TCP Inbound Client IIS for HTTPS Port for IIS, C·CURE web client. If IIS is installed on a
Listening different server, please make sure this Inbound listening
port is opened for the IIS server.
2800 UDP and Inbound iSTAR Host port for iSTAR driver Host port for incoming non-encrypted iSTAR (Pro and Ultra)
TCP Listening connections
2801 TCP Inbound iSTAR iSTAR Fast personnel download host port - HOST port for non-encrypted fast personal download to
Listening iSTAR (Pro and Ultra) panels
2802 TCP Inbound iSTAR Fast image download host port (iSTAR Pro location = vAS, Traffic Direction from vAS = inbound,
Listening only) Connection Initiate from iSTAR panels. Non-encrypted
image download for iSTAR Pro.
2804 TCP Inbound iSTAR Ultra Fast SQLite personal database download HOST port for unencrypted fast SQLite personal download
Listening (unencrypted or to iSTAR Ultra and Ultra SE (in Pro Mode) panels.
in Ultra SE Pro
Mode)
2816 TCP Inbound iSTAR Ultra Panel uploads personnel database file to Host port for unencrypted uploading SQLite personnel
Listening host database file.
3000 TCP Inbound C·CURE web HTTP for C·CURE Web This port is needed if C·CURE web server is installed on the
Listening same PC with C·CURE server.
3001 TCP Inbound C·CURE web HTTPs for C·CURE Web This port is needed if C·CURE web server is installed on the
Listening same PC with C·CURE server.
5984 TCP Inbound C·CURE Web HTTP for C·CURE Web DB This port is needed if C·CURE web server is installed on the
Listening couch DB same PC with C·CURE server.
7144- TCP Inbound EMC Replistor EMC Replistor For EMC Replistor failover/redundancy
7145 Listening
8042- TCP Inbound EMC Autostart EMC AutoStart For EMC AutoStart failover/redundancy
8045 Listening

3
C•CURE 9000 Server (victor Application Server (vAS))
Port/ Protocol Direction Initiator Process/ Description
Range Service
8080 TCP Inbound Client Tomcat6.exe Communication from Assa Abloy DSR to C·CURE server.
Listening
8085 TCP Inbound Client Auto Update C·CURE9000 software Auto Update for clients and SAS from
Listening MAS
8985 TCP Inbound iSTAR/vAS Base address of driver service location = Server
Listening Base for drivers for iSTAR, VideoEdge, Intellex, etc. used to
drive communication
8995 TCP Inbound SAS Installation, upgrade and repair Required for SAS to communicate with MAS during
Listening operations on MAS and SAS or a install/upgrade. MAS listens, SASs initiates the
standalone to SAS conversion. communication.
8996 TCP Inbound Client Crossfire service of web client session Required for the connection between the legacy
Listening C·CURE9000 web client and the Crossfire service of
C·CURE9000 server.
8997 TCP Inbound Client Admin / Monitor Client stream Required for the connection between C·CURE9000
Listening Administration client/ C·CURE9000 Monitoring Station client
and the Crossfire service of C·CURE9000 server.
8998 HTTP Inbound Client Crossfire service of HTTP client session Required for the C·CURE9000 server to listen for HTTP
Listening requests for web service connections from the C·CURE
legacy Web Client, C·CURE Mobile, and Web Service.
8999 TCP Inbound Client Crossfire service of TCP client session Required for the connection between TCP client session of
Listening C·CURE9000 Administration client/ C·CURE9000 Monitoring
Station client and the Crossfire service of C·CURE9000
server. Configuration data exchanged between C·CURE
client and C·CURE server.
9090 TCP Inbound DSR CrossFireAssaAbloyDriverService Communication from C·CURE to DSR server.
Listening
9701 TCP Inbound iSTAR Ultra LightTPD.exe iSTAR Ultra download firmware.
Listening
27000 TCP Inbound vAS TycoESS License software Required for the license validation between C·CURE9000
Listening clients and the license server manager on C·CURE9000
server.
27010 UDP Inbound vAS TycoESS – License Vendor Daemon Required for the system feature license validation between
Listening C·CURE9000 server and the TycoESS license vendor daemon.
Services and applications that utilize TycoESS are vAS,
CCURE9000License.exe, LicenseManager.exe and Crossfire
Framework Service.

4
C•CURE 9000 Server (victor Application Server (vAS))
Port/ Protocol Direction Initiator Process/ Description
Range Service
28001 TCP Inbound iSTAR iSTAR eX/Edge/Ultra Fast personnel location = vAS, traffic direction from vAS = inbound,
Listening download connection Connection initiate from encrypted iSTAR panels
28002 TCP Inbound iSTAR iSTAR eX/Edge firmware download location = vAS, traffic direction from vAS = inbound,
Listening Connection initiate from encrypted iSTAR panels
28003 TCP Inbound iSTAR iSTAR eX/Edge/Ultra Used by host to location = vAS, traffic direction from vAS = inbound,
Listening accept eX or Edge request for certificate Connection initiate from encrypted iSTAR panels
signing
28004 TCP Inbound iSTAR Encrypted iSTAR Ultra SQL Lite database location = encrypted iSTAR Panels, traffic direction from vAS
Listening download = outbound, connection initiate from vAS
28010 TCP Inbound iSTAR Host port for incoming encrypted iSTAR Port used by Stunnel on server for incoming iSTAR panel
Listening connections connection. Stunnel is the secure encrypted wrapper for
communication between C·CURE9000 server and iSTAR
panels.
28016 TCP Inbound iSTAR Ultra Panel uploads personnel database file to Host port for encrypted uploading SQLite personnel
Listening host database file.

5
iSTAR Edge/eX

iSTAR Edge/eX
Port/ Protocol Direction Initiator Process/ Description
Range Service
Inbound Web connection used for diagnostic website. Port is closed in FIPS mode. Only
80 TCP Listening Web HTTP necessary for diagnostics
Inbound iSTAR
1999 TCP Listening members, ICU Configuration iSTAR port for incoming ICU requests.
Inbound PC running iWATCH connection port. Not open by default, but can be enabled via webpage
2008 TCP Listening iWatch iWATCH diag settings.
Encrypted
Inbound iSTAR
28003 TCP Listening members encryption Used to accept signed certificate for encryption.
Inbound encrypted
28009 TCP Listening iSTAR Cluster member iSTAR port for incoming encrypted member requests
This port number is generated during bootup and is the stunnel communication
1025 - iSTAR to C·CURE for C·CURE9000 server [port 28010 (stunnel)]. Stunnel is the secure encrypted
5000 TCP Outbound iSTAR Edge/eX communication wrapper for communication between C·CURE9000 server and iSTAR panels.
Inbound
2001 UDP Listening ICU discovery iSTAR port for ICU broadcasts
Windows DNS, a function of the Windows operating system on the iSTAR which
Inbound resolves domain names. This port cannot be closed, but is not part of the iSTAR
1025 UDP Listening vAS Windows DNS function. Customer can block this port via network firewall.
Inbound Protocol for collecting and organizing information about managed devices on IP
161 UDP Listening vAS SNMP networks and for modifying that information to change device behavior.
Inbound NetBIOS Name Service. This is a function of Windows and cannot be closed, but is
137 UDP Listening vAS Netbios-NS not required for iSTAR operation.
NETBIOS Datagram Service. This is a function of Windows and cannot be closed,
Inbound but is not required for iSTAR operation. Customer can block this port via network
138 UDP Listening vAS Netbios-DS firewall.

6
iSTAR Pro

iSTAR Pro
Port/ Protocol Direction Initiator Process/ Description
Range Service
Inbound Web connection used for diagnostic website. Port is closed in FIPS mode. Only
80 TCP Listening Web HTTP necessary for diagnostics
iSTAR
Inbound members, iSTAR master port for incoming non-encrypted member connections, plus incoming
1999 TCP Listening ICU Master ICU requests
Inbound PC running iWATCH connection port. Not open by default, but can be enabled via webpage
2008 TCP Listening iWatch iWATCH diag settings
Inbound
2001 UDP Listening ICU discovery iSTAR port for ICU broadcasts

SNMP
Inbound Protocol for collecting and organizing information about managed devices on IP
161 UDP Listening vAS SNMP networks and for modifying that information to change device behavior.
Windows DNS, a function of the Windows operating system on the iSTAR which
Inbound resolves domain names. This port cannot be closed, but is not part of the iSTAR
1025 UDP Listening vAS Windows DNS function. Customer can block this port via network firewall.
1025 - TCP Outbound iSTAR Pro iSTAR to C·CURE This port number is generated during bootup.
5000 communication

7
iSTAR Ultra, iSTAR Ultra SE, iSTAR Ultra LT

iSTAR Ultra, iSTAR Ultra SE, iSTAR Ultra LT (Note: iSTAR Ultra SE Pro Mode doesn’t support encryption.)

Port/ Protocol Direction Initiator Process/ Description


Range Service
Inbound Protocol for collecting and organizing information about managed devices on IP
161 UDP Listening vAS SNMP networks and for modifying that information to change device behavior.
Inbound Secure web connection used for diagnostic website. Port is closed in FIPS mode.
443 TCP Listening Web HTTPs Only necessary for diagnostics
Inbound Non-encrypted iSTAR iSTAR master port for incoming non-encrypted member connections, plus
1999 TCP Listening members, ICU Master incoming ICU requests.
Inbound
2001 UDP Listening ICU discovery iSTAR port for ICU broadcasts
Inbound iWATCH connection port. Not open by default, but can be enabled via webpage
2008 TCP Listening PC running iWatch iWATCH diag settings
Inbound Listens to requests from iSTAR Ultra web/iSTAR Ultra, and turns the web request
2899 TCP Listening iSTAR Ultra Web Service to iSTAR messages and sends them to GCM.
Inbound
2900 TCP Listening IP-ACM Communication iSTAR Ultra GCM listening port for IPACM proprietary encrypted connection
Inbound iSTAR Ultra GCM listening port for IPACM2 SSL encrypted connection with
2901 TCP Listening IP-ACM2 Communication default certificate/key.
Inbound iSTAR Ultra GCM listening port for IPACM2 SSL encrypted connection with
2902 TCP Listening IP-ACM2 Communication default certificate/key.
Inbound Encrypted iSTAR
28003 TCP Listening members encryption Used to accept signed certificate for encryption.
Inbound
28009 TCP Listening Encrypted iSTAR iSTAR Member iSTAR Ultra incoming encrypted member connection port

8
iSTAR Ultra Video

iSTAR Ultra Video


Destination Port/ Protocol Direction Initiator Process/ Description
System Range Service
iSTAR Ultra
Video iUV Web client,
VideoEdge Inbound VideoEdge web Web service for the iSTAR diagnostic site, iSTAR
iSTAR Ultra 80 TCP Listening client HTTP Ultra Video site and VideoEdge remote client
Protocol for collecting and organizing
iSTAR Ultra iUV Web client, information about managed devices on IP
Video Inbound VideoEdge web networks and for modifying that information to
VideoEdge 443 TCP Listening client HTTPS change device behavior
Inbound
VideoEdge 554 TCP Listening Camera RTSP Camera video streaming connections
Non-encrypted iSTAR master port for incoming non-encrypted
Inbound iSTAR member connections, plus incoming ICU
iSTAR Ultra 1999 TCP Listening members, ICU Master requests.
Listens to requests from iSTAR web/iUVWeb,
and turns the web request to iSTAR messages
and sends them to GCM; when iUV web service
iSTAR Ultra Inbound receives GCM responses, the service will send
Video 2899 TCP Listening iSTAR Ultra Web Service them back to web.
Inbound Communication between the IP-ACM and iSTAR
iSTAR Ultra 2900 TCP Listening IP-ACM Communication Ultra family GCM
Used for SSL encrypted communication
Inbound between the IP-ACM2 and iSTAR Ultra family
iSTAR Ultra 2901 TCP Listening IP-ACM2 Communication GCM
Reserved for enhanced SSL communication
Inbound between the IP-ACM2 and iSTAR Ultra family
iSTAR Ultra 2902 TCP Listening IP-ACM2 Communication GCM
Inbound
VideoEdge 3389 TCP Listening RCP client RDP XRDP
Inbound
VideoEdge 55555 TCP Listening Internally Used Transmit Manager Transmit manager - not used externally
Inbound
VideoEdge 25 TCP Listening mail server SMTP SMTP
Inbound
VideoEdge 68 UDP Listening DHCP server DHCPC Obtaining dynamic IP address (DHCP)

9
iSTAR Ultra Video
Destination Port/ Protocol Direction Initiator Process/ Description
System Range Service
Inbound NTP (time
VideoEdge 123 UDP Listening server) NTP ntp
Inbound
VideoEdge 161 UDP Listening SNMP manager SNMP SNMP
Inbound
VideoEdge 162 UDP Listening SNMP manager SNMP SNMP Trap
Remote control
Inbound (should be
VideoEdge 623 UDP Listening closed) RPC RPC - standard Linux open port
Inbound
VideoEdge 1900 UDP Listening Any UPnP UPnP
Inbound veAutoDiscSSDP - Discovery of devices, close
VideoEdge 1900 SSDP Listening Any AD discovery after setup
Inbound veAutoDiscScan - Discovery of devices, close
VideoEdge 2980 UDP Listening Any AD discovery after setup

Inbound Web veAutoDiscovery WSDicovery - Discovery of


VideoEdge 3702 UDP Listening Server/Any AD discovery devices, close after setup
Inbound veAutoDiscMDNS - Discovery of devices, close
VideoEdge 5353 UDP Listening Any AD discovery after setup
Inbound
VideoEdge 5432 TCP Listening SQL Postgresql Postgresql
Inbound
VideoEdge 5800-5803 TCP Listening remote unit VNC Java-enabled web browser VNC server
Inbound
VideoEdge 5900-5903 TCP Listening remote unit VNC VNC server
Inbound veAutodiscoveryADPort - Discovery of devices,
VideoEdge 8848 UDP Listening Any AD discovery close after setup
Inbound veAutoDiscADScanPort - Discovery of devices,
VideoEdge 8992 UDP Listening Any AD discovery close after setup
Inbound veAutoDiscADPo - Discovery of devices, close
VideoEdge 12345 UDP Listening Any AD discovery after setup
VideoEdge VideoEdge victor Client UDP Default VideoEdge UDP port range (for victor
Client 32200-38199 UDP Outbound server communication client connections)

10
iSTAR Ultra Video
Destination Port/ Protocol Direction Initiator Process/ Description
System Range Service
VideoEdge Outbound VideoEdge veAutoDiscMDNS - Discovery of devices, close
Client 32200-38199 UDP server AD discovery after setup
VideoEdge Outbound
VideoEdge veAutoDiscScan - Discovery of devices, close
Client 32200-38199 UDP server AD discovery after setup
VideoEdge
VideoEdge veAutoDiscSSDP - Discovery of devices, close
server
Client 32200-38199 UDP Outbound AD discovery after setup
VideoEdge VideoEdge
Client 32200-38199 UDP Outbound server UPnP VideoEdgeupnpn
VideoEdge VideoEdge veAutoDiscSSD - Discovery of devices, close
server
Client 32200-38199 UDP Outbound AD discovery after setup
VideoEdge VideoEdge veAutoDiscWSDi - Discovery of devices, close
Client 32200-38199 UDP Outbound server AD discovery after setup
VideoEdge VideoEdge
Client/Camera 6000-7999 UDP Outbound server RTP/RTCP RTP/RTCP
VideoEdge VideoEdge
Client/Camera 9000-9511 UDP Outbound server Multicast multicast port range

Remote
Transcoding and
Failover NVR 9000-9128 TCP Outbound NVR Failover Remote Transcoding and Failover
Inbound
iSTAR Ultra 2001 UDP Listening ICU discovery iSTAR port for ICU broadcast
Inbound PC running
iSTAR Ultra 2008 TCP Listening iWatch iWATCH iWATCH connection port
Inbound Encrypted iSTAR Ultra incoming encrypted member
iSTAR Ultra 28009 TCP Listening iSTAR iSTAR Member connection port
Encrypted
Inbound iSTAR Ultra Used to accept signing for certificate for
iSTAR Ultra 28003 TCP Listening members Certificate signing encryption

11
IP-ACM v1

IP-ACM
Port/ Protocol Direction Initiator Process/ Description
Range Service
Inbound
80 TCP Listening Web HTTP Web connection used for configuration and diagnostics.

IP-ACM v2

IP-ACM2
Port/ Protocol Direction Initiator Process/ Description
Range Service
Inbound
443 TCP Listening Web HTTPS Secure Web connection used for configuration and diagnostics.

Innometriks Readers

Innometriks
Destination Port/ Protocol Direction Initiator Process/ Description
System Range Service
Inbound Communication between ID Server and
Panel Server 5002, 5050 TCP Listening vAS PanelServer.exe C·CURE panel, as well as to GCM.
Enrollment Inbound Enrollment Port used for incoming enrollments from
Server 8000 TCP Listening Server EnrollmentServer.exe C·CURE FICAM client.

12
SQL Server

Destination Port/ Protocol Direction Initiator Process/ Description


System Range Service
SQL Server default port used for communication
between the C·CURE Application Server and the
Database Server. For enterprise system, SAS
needs to access both SAS SQL DB and MAS SQL
DB. MAS only needs to access MAS SQL DB.
Inbound VAS or other Please contact your Database Administrator for
SQL Server 1433 TCP listening SQL Clients SQL Server the exact ports used.
SQL Server Browser Service default port for
Dynamic port discovery on the Database Server
only if SQL Browsing Services are being used.
Inbound VAS or other SQL Server Please contact your Database Administrator for
SQL Server 1434 UDP listening SQL Clients Browser the exact ports used.

∗ See https://docs.microsoft.com/en-us/sql/sql-server/install/configure-the-windows-firewall-to-allow-sql-server-access for additional SQL Server


information.

13
ICU

ICU (The Windows PC it’s running on)


Port/ Protocol Direction Initiator Process/ Description
Range Service
Inbound ICU host port for iSTAR configuration updates (this port can be
2801 TCP Listening iSTAR Configuration changed in ICU).
Inbound
2001 UDP Listening iSTAR Discovery Listening port for iSTAR broadcast.
Inbound IP-ACM and Listening port for IP-ACM broadcast and
2910 UDP Listening IP-ACM2 Discovery IP-ACM2 broadcast.
Inbound
9701 TCP Listening iSTAR ICU/LightTPD Server port for FW download to iSTAR Ultra

14
Other Components

Destination Port/ Protocol Direction Initiator Process/ Description


System Range Service
22 TCP Inbound everRun client SSH/everRun This port is open so that Stratus
Listening Stratus Customer Support node redundancy solution support can
Access access the system via a collaboration
everRun Server session during a support call
53 UDP Inbound everRun client SSH/everRun Connection to the active directory for
everRun Server Listening Active Directory everRun Stratus redundancy solution
80 TCP Inbound everRun client everRun IIS everRun IIS port (required to be
everRun Server Listening open) for Stratus redundancy solution
135 UDP Inbound everRun/ArcServe ArcServe RHA Control service Used by many programs and
Listening client server and the engine server protocols. RHA specifically uses it for
the remote installer. This is also used
by the Microsoft EPMAP (End Point
Mapper) which is the DCE/RPC
locator service used to remotely
everRun manage services such as DHCP
Server/ArcServe servers. This is for Stratus redundancy
server solution.
137 UDP Inbound everRun/ArcServe ArcServe RHA Control service NetBIOS Name Service - Windows
everRun Listening client server and the engine server CIFS/SMB protocol family – used by
Server/ArcServe RHA remote installer. This is used for
server Stratus redundancy solution.
138 UDP Inbound everRun/ArcServe ArcServe RHA Control service NetBIOS Datagram Service - Windows
everRun Listening client server and the engine server CIFS/SMB protocol family – used by
Server/ArcServe RHA remote installer. This is for
server Stratus redundancy solution.
8088 TCP Bidirectional ArcServe client ArcServe RHA Control service GUI connection to CS (Management
ArcServe server service) through HTTP or HTTPS.

(Stratus Disaster RHA CS to ARCserve requests on


Recovery software HTTPS can be selected during
solution) installation.
ArcServe server 24000 TCP Bidirectional ArcServe client ARCServe RHA Engine RHA Control Service/Engine
Service/Control Service Management.
(Stratus Disaster
Recovery software
solution)

15
Destination Port/ Protocol Direction Initiator Process/ Description
System Range Service
ArcServe server 25000 TCP Bidirectional ArcServe client ARCServe RHA Engine Service Protocol for data Replication and
Engines Management.
(Stratus Disaster
Recovery software
solution)
123 UDP Inbound vAS/C·CURE Time Synchronization For time synchronization.
Listening, Client
NTP server Outbound
443 TCP Inbound everRun Web everRun HTTPS Communications HTTPS Port for SSL connections with
Listening client C·CURE Go Stratus (everRun)
communication. If IIS is installed on a
different server, please make sure
this Inbound listening port is opened
for the IIS server. This is for Stratus
everRun Server redundancy solution.
80 TCP Inbound vAS, VideoEdge VideoEdge NVR Admin/Alarm VideoEdge NVR Admin/Alarm Port
VideoEdge NVR Listening Client Port
389 TCP Inbound vAS, LDAP Clients LDAP LDAP which is used to synchronize
Listening C·CURE database with other
databases (non-C·CURE ). It allows
other databases, such as human
resources information, to download
LDAP Server information
554 TCP Inbound vAS, VideoEdge RTSP stream VideoEdge NVR Live Port
Listening Client
VideoEdge NVR
1025 TCP Inbound ArcServe client ARCSERVE RHA Control service Windows active directory port, RHA
Listening center Windows DNS connects to AD to discover some
Windows domain
configuration/settings and resources
to be replicated (Exchange servers,
ArcServe server DNS server, etc.)
1025 TCP Inbound vAS Sur-Guard Sur-Guard communication
Sur-Guard Listening
2188- TCP Inbound everRun client everRun quorum service Stratus redundancy solution everRun
2189 Listening computers and XenServer hosts quorum service computers and
everRun Server XenServer hosts

16
Destination Port/ Protocol Direction Initiator Process/ Description
System Range Service
2571 TCP Inbound vAS CrossFireAssaAbloyDriverService Assa Abloy Lock communication to
Listening the DSR.
Assa Abloy DSR
5000 TCP Inbound vAS Intellex Base Intellex Base
Intellex Server Listening
5001 TCP Inbound vAS Intellex Live Intellex Live
Listening
Intellex Server
5003 TCP Inbound vAS Intellex Alarm Intellex Alarm
Intellex Server Listeningl
5000 TCP Inbound vAS ISC Controller communication ISC Controller communication,
Listening alternative 6000 port. ISC is not
supported in C·CURE 9000 v2.30 or
ISC later.
5001 TCP Inbound vAS ISC Controller communication ISC Controller communication,
Listening alternative 6001 port. ISC is not
supported in C·CURE 9000 v2.30 or
ISC later.
5002 TCP Inbound vAS ISC Controller communication ISC Controller communication,
Listening alternative 6002 port. ISC is not
supported in C·CURE 9000 v2.30 or
ISC later.
5003 TCP Inbound vAS ISC Controller communication ISC Controller communication,
Listening alternative 6003 port. ISC is not
supported in C·CURE 9000 v2.30 or
ISC later.
5025 TCP Inbound vAS ISC Point Change Port ISC Point Change Port. ISC is not
Listening supported in C·CURE 9000 v2.30 or
ISC later.
5026 TCP Inbound vAS ISC Version Attendance Port ISC Version Attendance Port. ISC is
Listening not supported in C·CURE 9000 v2.30
ISC or later.
5900 TCP Inbound everRun client VNC with Linux VMs Stratus Redundancy solution everRun
Listening communication for
everRun server failover/redundancy
7800 UDP Inbound vAS Bosch Bosch receiver port
Listening
Bosch
7900 UDP Inbound vAS Bosch Bosch receiver port
Bosch Listening

17
Destination Port/ Protocol Direction Initiator Process/ Description
System Range Service
8080- TCP Inbound everRun client everRun eAC Stratus Redundancy solution everRun
8081 Listening eAC communication for
failover/redundancy.
everRun server
9090 TCP Inbound vAS CrossFireAssaAbloyDriverService Communication from C·CURE to DSR
Listening server.
Assa Abloy DSR
10001- TCP Inbound DSC serial serial DSC serial through Lantronix and
10002 Listening through Lantronix Simplex 4100U serial through
and Simplex Lantronix
4100U serial
Lantronix through Lantronix
22609 TCP Inbound vAS HDVR Admin/Line/Alarm Port HDVR Admin/Line/Alarm Port
Listening
HDVR
47808 UDP Inbound vAS MZX MZX fire detection integration
Listening
MZX
10001 - TCP Inbound vAS Galaxy Honeywell Galaxy Panel
Honeywell Galaxy 10002 Listening
panel
3072 TCP Inbound vAS ITV2 ITV2 – DSC PowerSeries Neo
Listening
DSC PowerSeries
5001 TCP Inbound vAS TOA TOA Intercom server
Listening
TOA Server
3001 TCP Inbound vAS Commend Commend Intercom server
Commend Server Listening
2004- TCP Inbound vAS KONE Elevator KONE Elevator
2005 Listening
KONE Elevator
45303, UDP Inbound vAS Otis Elevator Otis Elevator
45307, Listening
45308,
46307,
46308,
Otis Elevator 47307

18
Destination Port/ Protocol Direction Initiator Process/ Description
System Range Service
ThyssenKrupp 8038- UDP Inbound vAS ThyssenKrupp Elevator ThyssenKrupp Elevator
Elevator 8041 Listening

BACNet controller 47808 TCP Inbound vAS BACNet BACNet Building Management
Listening

Elpas 1001 TCP Inbound vAS Elpas Elpas real time location
Listening

Schindler Elevator 4040, TCP Inbound vAS Schindler Elevator Schindler Elevator
5050 Listening

CEM CDC Server 30000 TCP Inbound vAS CEM CEM Access Control
Listening

Entrapass Server 8801 TCP Inbound vAS Entrapass Entrapass Access Control
Listening

3VR Recorder 8080 TCP Inbound vAS 3VR 3VR video recorder
Listening

Bosch Recorder 80 TCP Inbound vAS Bosch Video Bosch video recorder
Listening

Matrix Recorder 8016 TCP Inbound vAS Matrix Video Matrix video recorder
Listening

Dedicated Micro 80 TCP Inbound vAS Dedicated Micro Dedicated Micro video recorder
Recorder Listening

Mastermind 5050 TCP Inbound vAS Mastermind Mastermind Alarm Management


System Listening

19
The trademarks, logos, and service marks displayed on this document are registered in the United States [or other countries]. Any misuse of the trademarks is strictly prohibited and Tyco will
aggressively enforce its intellectual property rights to the fullest extent of the law, including pursuit of criminal prosecution wherever necessary. All trademarks not owned by Tyco are the
property of their respective owners, and are used with permission or allowed under applicable laws.

Product offerings and specifications are subject to change without notice. Actual products may vary from photos. Not all products include all features. Availability varies by region; contact
your sales representative.

© 2018 Tyco Security Products.


All Rights Reserved.

20

Das könnte Ihnen auch gefallen