Lantronix welcomes Uplogix! Learn more here.

Network Services

Updated March 9, 2021. Written for LMS Version 6.2.

Overview

The Control Center is designed to receive and respond to requests from Local Managers. In secure environments, exceptions made need to be made in firewalls to ensure proper operation.

Ports Used

The following inbound ports are used during normal operation.

  • TCP 443 - HTTP, provides access to the Control Center GUI - required
  • TCP 8443 - Heartbeat and Archive, used for communication between Control Center and Local Managers - required
  • TCP 7 - Echo, used by the Pulse feature
  • TCP 22 - SSH, used to connect to the Control Center CLI
  • TCP 2222 - Reverse SSH, used by Local Managers to create a reverse-ssh tunnel with the Control Center
  • TCP 2244 - Reverse SSH, used by clients to connect to Local Managers via the reverse-SSH tunnel
  • TCP 80 - HTTP, provides access to the Control Center GUI, redirects to 443
  • UDP 123 - NTP, provides NTP servers to managed devices

If you will be using the SOCKS proxy server, you will also need to open TCP 1080 (typical default) or TCP 9000 (as suggested in our documentation).

This information is for use with external firewalls and NATs. The Lantronix Control Center runs its own firewall to ensure only the above ports are accessible.

Traffic Compression

The use of network traffic compression services / devices is not recommended for Lantronix products. Devices such as Riverbed accelerators / optimizers may cause Heartbeat and Pulse features to fail.

Lantronix recommends adding exceptions for the ports listed above to ensure proper operation.

Not finding what you're looking for?

The LEVEL Technical Services team is standing by 24/7/365 to answer any questions you may have about the installation, configuration, and usage of our products.

© 2024 Lantronix, Inc. All Rights Reserved