Firewall Configuration¶
Default Ports¶
By default, your HylaFAX servers are listening to the following ports:
TCP 22 SSH access
TCP 25 Email to FAX submission
TCP 80 Web interface
TCP 4559 Fax job submission (see below) and fax status
TCP 27000 & 27059 HylaFSP Site License server
UDP 5060 SIP traffic
UDP 56000-57000 RTP/UDPTL media
HylaFAX uses an FTP-style protocol on port 4559. HylaFSP uses PASV
(passive) transfers when transferring data to the HylaFAX server. As such, simply port-forwarding/tunneling port 4559 will not be sufficient. If you are not using normal IP connectivity between HylaFSP and HylaFAX, your firewall/border/tunneler has to do FTP
fixups (or connection tracing/NAT) on the port it’s forwarding. If you have Cisco PIX firewall, you need FTP fixups
on port 4559.
Allow HTTPS¶
If you have installed an SSL certificate, you must open the firewall for HTTPS using the following commands:
firewall-cmd --zone=public --permanent --add-service=https
firewall-cmd --reload
Allow SIP only from certain addresses¶
This can help keep your server from accepting SIP connections from anywhere else.
firewall-cmd --zone=public --permanent --remove-service=sip
firewall-cmd --zone=public --permanent --remove-port=5060/udp
firewall-cmd --zone=public --permanent --remove-port=5080/udp
firewall-cmd --zone=public --permanent --add-rich-rule='
rule family="ipv4"
source address="123.456.789.0123/32"
port protocol="udp" port="5060" accept'
firewall-cmd --zone=public --permanent --add-rich-rule='
rule family="ipv4"
source address="456.789.012.3456/32"
port protocol="udp" port="5060" accept'
firewall-cmd --reload