Skip to main content
Version: v1.6.0

Prepare Network

Once we have a set of remote hosts (and/or a Kubernetes cluster) we need to make sure that we have appropriate firewall rules for the ioFog components that we will start deploying on those remote hosts.

The following is an exhaustive list of the ingress firewall rules required for any ioFog Edge Compute Network.

ComponentProtocol/PortDescription
Controllertcp:51121Controller API to be accessible from Agents and potctl.
Controllerhttp:80ECN Viewer to be accessible by ECN admins or users.
Routertcp:5671Router Messaging Port
Routertcp:45671Router Edge Router Connection Port.
Routertcp:55671Inter Router Connection Port.
*NATstcp:4222NATs Server Port
NATstcp:7422NATs Leaf Port
NATstcp:6222NATs Cluster Port
NATstcp:8883NATs MQTT Port
*NATshttp:8222NATs Monitoring Port
Agent-Controllertcp:22potctl SSH access to install PoT Controller and Agent on remote hosts.
warning

By default all Router ports and NATs Cluster, Leaf, MQTT ports are tls protected. NATs Server and Monitoring ports are for internal connections. Therefore it is highly recommended that do not open those ports to the public for Remote Agents and Remote Controllers, for Kubernetes ControlPlane YAML set nats-server service type as Cluster IP, or assign internal IP via annotations even if type is LoadBalancer.

Where to go from here?

Regardless of the type of deployment we need, next we have to prepare remote hosts for Controller and Agents (in case of remote deployment), or just for Agents (in case of Kubernetes deployment).

Group 3See anything wrong with the document? Help us improve it!