Firewall overview
General network requirements and port configuration for Tillered Cloud nodes
Before configuring vendor-specific firewall rules, review these general requirements that apply to all Tillered Cloud deployments.
Port requirements
Tillered nodes communicate using the following ports:
| Port range | Protocol | Direction | Purpose |
|---|---|---|---|
| 61000-61999 | TCP | Inbound and outbound | Tillered tunnel traffic |
| 61000-61999 | UDP | Inbound and outbound | Tillered tunnel traffic |
| 443 | TCP | Outbound | Hub communication and provisioning |
Ensure these ports are open between your Tillered nodes and on any intermediate firewalls or NAT devices.
DNS requirements
Tillered nodes need to resolve the following domains:
hub.tillered.com- management and provisioninginstallcdn.tillered.com- software updates
Ensure your DNS configuration allows resolution of these domains from the network where Tillered nodes are deployed.
SSL/TLS inspection warning
Do not apply SSL/TLS inspection (SSL proxy, HTTPS interception, or deep packet inspection) to traffic from Tillered nodes. Custom certificates cannot be installed on Tillered nodes, and SSL inspection will break the provisioning and management connection to the Tillered Hub.
If your firewall performs SSL inspection by default, create an exemption for Tillered node traffic.
Network placement
Tillered nodes are designed to sit alongside your network, not inline with traffic. Connect the entry node to a dedicated interface, VLAN, or DMZ segment. Your firewall then uses policy-based routing to direct specific traffic through the Tillered node.
Recommended topology
- Place the Tillered entry node on a dedicated network segment (DMZ or separate VLAN)
- Configure DHCP on that segment to assign reserved IP addresses to Tillered interfaces
- Create firewall policy routes that direct desired traffic through the Tillered gateway IP
- Allow the Tillered node outbound access to the internet for Hub communication
DHCP reservations
Each exit node connected to an entry node creates a virtual interface that receives an IP from your DHCP server. Create DHCP reservations for these MAC/IP pairs to ensure consistent gateway addresses for your firewall rules.
Vendor-specific guides
Configure policy-based routing on your firewall using one of these guides: