Simplified flowchart of Medulla
Simplified Flow Rules
The rules are interpreted as follows:
-
SOURCE -> DESTmeans that the flow is initiated from the SOURCE to the DESTINATION. - If the protocol is not specified, then it defaults to TCP.
If you have a single Medulla server, refer to the table:
- 1. Without a Relay Server
If you have a Medulla server and a relay server, refer to the table:
- 2. With a Classic Relay Server
If you have a Medulla server and a DMZ relay server, refer to the table:
- 3. With a DMZ Relay Server
Medulla external access:
- updates.siveo.net:443
- download.windowsupdate.com:80
Medulla access to other internal servers:
- Your GLPI server (if you have one)
- Your LDAP server (if you have one; see our LDAP documentation: LDAP DOC)
Access from your Admin Machine to Medulla:
| Connection | Ports Used (DEST) | Notes |
| Your internal admin workstation ➡️ Medulla server |
139/445 8384 |
Traffic initiated by the internal admin workstation to Medulla. |
1. Without Relay Server
| Connection | Ports Used (DEST) | Notes |
| Internal workstation ➡️ Medulla server | 22 (SSH) 67/69 (UDP) 80/443 111/2049 (TCP & UDP) 5222 8443 9990 9999, 22067 55415 |
Traffic initiated by the extension to Medulla. |
| Medulla server ➡️ Internal workstation | 9 22 ( SSH) 3389 5900 5985/5986 35621 35623 |
Traffic initiated by the Medulla server to internal extensions. |
2. With Classic Relay Server
| Connection | Ports Used (DEST) | Notes |
| Internal workstation ➡️ Medulla servers | 22 (SSH) 67/69 (UDP) 80/443 111/2049 (TCP & UDP) 5222 8443 9990 9999, 22067 55415 |
Traffic initiated by the extension to Medulla. |
| Medulla servers ➡️ Internal workstation | 9 22 ( SSH) 3389 5900 5985/5986 35621 35623 |
Traffic initiated by the Medulla server to internal workstations. |
| --- | --- | --- |
| Medulla Server ➡️ Relay Server |
22 ( SSH) 5269 9990 |
Traffic initiated by Medulla to the DMZ Server. |
| Relay Server ➡️ Medulla Server |
22 ( SSH) 5269 |
Traffic initiated by the DMZ server to Medulla. |
| --- | ||
| Internal Station ➡️ Relay Server |
22 69/69 (UDP) 80/443 111/2049 (TCP & UDP) 5222 9990 |
Traffic initiated by the internal extension to the Relay Server. |
| Relay Server ➡️ Internal Station |
9 22 3389 5900 |
Traffic initiated by the Relay Servertothe internal extension. |
3. With DMZ Relay Server
| Connection | Ports Used (DEST) | Notes |
| Internal workstation ➡️ Medulla Server | 22 (SSH) 67/69 (UDP) 80/443 111/2049 (TCP & UDP) 5222 8443 9990 9999, 22067 55415 |
Traffic initiated by the extension to Medulla. |
| Medulla server ➡️ Internal workstation | 9 22 ( SSH) 3389 5900 5985/5986 35621 35623 |
Traffic initiated by the Medulla server to internal workstations. |
| --- | --- | --- |
| Medulla Server ➡️ DMZ Relay Server |
22 ( SSH) 4369 4370 to 4380 |
Traffic initiated by Medulla to the DMZ Server. |
| DMZ Relay Server➡️ MedullaServer |
22 ( SSH) 4369 4370 to 4380 |
Traffic initiated by the DMZ server to Medulla. |
| --- | --- | --- |
| External Host ➡️ DMZ Server | 22 ( SSH) 5222 |
Traffic initiated by the external workstation to the DMZ server.
|
Port descriptions
Port 9: used for Wake on LAN (WOL) to wake up a remote workstation.
Port 22 (SSH): SSH port used by Medulla for remote operations, command execution, and agent administration.
Ports 67 and 69 (UDP): used for DHCP and TFTP, particularly during PXE boot or for loading deployment images.
Ports 80 and 443: HTTP and HTTPS, used for web access and secure communication with Medulla services.
Port 111 (TCP and UDP): used by Portmapper / RPCbind, required for NFS services and certain internal network calls.
Port 3389: used for RDP to connect remotely to Windows workstations.
Port 4369: used for an ejabberd cluster if you have a DMZ relay
Ports 4370 to 4380: used for an ejabberd cluster if you have a DMZ relay
Port 5222: used by XMPP for communication between Medulla agents and the server.
Port 5269: used by XMPP for server-to-server communication, particularly between Medulla and the DMZ relay server.
Port 5900: used by VNC for remote control.
Ports 5985 and 5986: used by WinRM (HTTP and HTTPS) for remote commands on Windows.
Ports 7080 and 8081: used by internal services or management APIs required by the relay server or Medulla components.
Port 8443: HTTPS used by Medulla’s secure interface or APIs.
Port 9990: used by an internal Medulla service for management and monitoring.
Port 9999: used as an internal synchronization or exchange port between the Medulla server and components such as the relay.
Port 22000: used by Syncthing as the main channel for data synchronization (packages, artifacts, inventories).
Port 22067: used by Syncthing as a relayed channel, useful for mobile devices or those located behind a NAT.
Ports 35621, 35623, and 55415: dynamic ports used by Medulla agents for real-time communication, inventory, synchronization, or task execution.