Trustwave SpiderLabs Exposes Unique Cybersecurity Threats in the Public Sector. Learn More

Trustwave SpiderLabs Exposes Unique Cybersecurity Threats in the Public Sector. Learn More

Services
Capture
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

twi-managed-portal-color
Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

twi-briefcase-color-svg
Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

tw-laptop-data
Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

twi-database-color-svg
Database Security

Prevent unauthorized access and exceed compliance requirements.

twi-email-color-svg
Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

tw-officer
Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

tw-network
Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats
Loading...
Loading...

INFO: What ports need to be open in my firewall for MailMarshal SMTP?

Expand / Collapse


This article applies to:

  • Trustwave MailMarshal (SEG)

Question:

What ports need to be open in my firewall for MailMarshal SMTP?

Information:

For latest information, always review the Release Notes and User Guide for your installed version of the product.

The table below details the various ports used by Trustwave MailMarshal (SEG):

Port Direction Source Destination Required for Versions Explanation
tcp/25 Both Mail Processing Nodes All All MailMarshal SMTP must be able to send and receive data on port 25 for SMTP communications to the outside world.
udp/53
tcp/53
Outbound All MailMarshal SMTP Components DNS servers specified in MailMarshal SMTP configuration All MailMarshal SMTP uses port 53 to query DNS servers during PTR checking, blocklist lookups, authentication, and when sending email to an external recipient.
tcp/80
tcp/443
Outbound Array Manager www.marshal.com All The automatic updates feature connects to www.marshal.com periodically to download new SpamCensor updates (and occasionally updates to other functionality, depending on version) using HTTP and HTTPS.
tcp/80
tcp/443
Outbound Node Controller 

Receiver 

Engine 
Any 6.5 and above Various functions of the MailMarshal processing node require HTTP and HTTPS access. IP addresses and URLS are not limited to a known set.

Notably for use of TLS (version 7.1 and above) the Controller must be able to access Certificate Revocation Lists that could be published at any valid URL.
tcp/443 Incoming Workstations/Browsers used to configure and manage SEG Management Console website (Array Manager server) 10.X and above MailMarshal (SEG) 10 introduces a web management interface in place of the Configurator and Console. Carefully consider access to this interface (intranet only, extranet, or potentially Internet).
tcp/110 Incoming All Mail Processing Nodes (POP3 only) All If the MailMarshal POP3 server is being used, incoming access to port 110 is required for clients to retrieve their mail.
tcp/389 Outgoing Array Manager Active Directory Domain Controllers/LDAP Servers All Outbound access to port 389 is required if MailMarshal retrieves groups from Active Directory or another LDAP server, if Active Directory is used for SMTP AUTH, or if email addresses are retrieved automatically from AD for the Spam Quarantine Management website.
tcp/1433 Outgoing Array Manager SQL Server All Outbound access to port 1433 on the SQL server is mandatory.
tcp/19001 Incoming Controller

MailMarshal Configurator (8.X and below)

MailMarshal Console (8.X and below)

MailMarshal Web Components
Array Manager All The Controller must be able to contact the Array Manager to receive configuration updates, service commands, etc.

The Configurator, Console, and Web Components must talk to the Controller or Array Manager (depending on version) in order to function.

Note: The Array Manager should be installed in the trusted network. Connection from the Configurator to the Array Manager requires NetBIOS ports (135-139) and Trustwave recommends you DO NOT open these ports through your firewall. See Trustwave Knowledgebase article Q10026.

tcp/19001 Incoming Array Manager Controller All The Array Manager must be able to contact the Controller server to check node status, and various other administrative tasks.
tcp/19006
(https)
Incoming Array Manager REST API clients 8.X and above If you use the SEG REST API to manage SEG, this is the required port for client connections.

 

This article was previously published as:
NETIQKB36130

 

 

 


To contact Trustwave about this article or to request support:


Rate this Article:
     
Tags:

Related Articles



Add Your Comments


Comment submission is disabled for anonymous users.
Please send feedback to Trustwave Technical Support or the Webmaster
.