- This topic has 6 replies, 3 voices, and was last updated March 2, 2022 by Matthew L.
UDP ports
-
Chung SSeptember 30, 2015 12:28:17 PM
We are seeing UDP traffic over ports in the 44,400 range between Zerto VRAs. Is anyone else seeing the same?
I can find no mention of this in the documentation.
Tagged: vmware vsphere udp firewallI know we covered this in a case, but I wanted to post the port requirements listing.
Senior Technical Architect at ZertoTagged: vmware vsphere udp firewallBastian PJanuary 4, 2016 08:25:58 PMAnyone else see the UDP packets on ports like 44446, 44447, 44448?
I see them coming from the ZRAs between sites.
Tagged: vmware vsphere udp firewallThe UDP activity is from the dhclient on the VRA. We have a feature request to change the behavior in future versions. However, as long as you have the required ports open per our documentation, everything will function correctly.
Senior Technical Architect at ZertoTagged: vmware vsphere udp firewallGreg BJune 5, 2020 07:07:08 PMIs there a way to turn this off on the VRAs?
Tagged: vmware vsphere udp firewallDavid VJanuary 25, 2022 07:24:55 PMHad a case open for this very issue. Zerto’s response:
“Being that VRAs are Linux based virtual machines and require dhclient to be active, UDP ports in the 444xx range will appear when performing a security scan. UDP ports in the 444xx range are not required for the VRA functionality and therefore can be blocked by the customer.
All ports above port 32768 are known as ephemeral ports, which are random ports assigned to the client side of a client-server connection.
These ephemeral ports are used for Linux DHCP communication and are not needed for replication.
———————————————————————
Zerto recommends UDP ports in the 444xx be blocked by the customer.”Tagged: DHCP vmware vsphere udp firewallMatthew LMarch 2, 2022 03:50:06 AMWe just ran into this as well, but found something slightly different. A security tool we had found that the VRA was sending UDP traffic to other VRA’s in the same subnet and another site. It always started at UDP port 44447 and incremented from there. That is exactly how tracepath works. Come to find, there is a cron job on the VRA that runs a series of connectivity checks constantly to the other devices, one of those tests is tracepath. Below is the crontab entry, and if you cat out that script you’ll see the references to tracepath and how it reads in the IP’s from a file. Hope this helps someone, as it was driving us nuts.
crontab -l | grep Connectivity
0 * * * * /mnt/run/scripts/periodicPeersConectivityTester.sh 2>&1 | /mnt/run/zvr/bin/LogWriter /mnt/logs/peersConnectivity 100Tagged: vmware vsphere udp firewall
The forum ‘VMware’ is closed to new topics and replies.