Note: Changes made to this page must also be made in the masking docs.
This topic covers the general network and connectivity requirements for the Delphix Engine, including connection requirements, port allocation, and firewall and Intrusion Detection System (IDS) considerations. For platform-specific network and connectivity requirements, see the relevant topics under the Requirements article for each platform.
General Outbound from the Delphix Engine Port Allocation
Connection to a local SMTP server for sending email
Connections to local DNS servers
Connection to an NTP server
|UDP||162||Sending SNMP TRAP messages to an SNMP Manager|
HTTPS connections from the Delphix Engine to the Delphix Support upload server
Secure connections to an LDAP server
Connections to a Delphix replication target (see Configuring Replication)
|TCP||50001||Connections to source and target environments for network performance tests|
General Inbound to the Delphix Engine Port Allocation
SSH connections to the Delphix Engine
HTTP connections to the Delphix GUI
|UDP||161||Messages from an SNMP Manager to the Delphix Engine|
HTTPS connections to the Delphix Management Application
Delphix Session Protocol connections from all DSP-based network services including Replication, SnapSync for Oracle, V2P, and the Delphix Connector.
|TCP||50001||Connections from source and target environments for network performance tests via the Delphix CLI|
Firewalls and Intrusion Detection Systems (IDS)
Production databases on source environments (for dSources) are often separated from the non-production environment by firewalls. Firewalls can add milliseconds to the latency between servers. Accordingly, for best performance, there should be no firewalls between the Delphix Engine and the virtual database (VDB) target environments. If the Delphix Engine is separated from a source environment by a firewall, the firewall must be configured to permit network connections between the Delphix Engine and the source environments for the application protocols (ports) listed above.
Intrusion detection systems (IDSs) should also be made permissive to the Delphix Engine deployment. IDSs should be made aware of the anticipated high volumes of data transfer between dSources and the Delphix Engine.