Skip to main content

Network and Port Requirements

Access Analyzer requires outbound internet access during installation and operation, and specific internal ports for service communication.

Outbound Endpoints (Internet)

All outbound traffic uses HTTPS (port 443). The following endpoints must be reachable from the Access Analyzer server:

EndpointCategoryPurposeWhen Required
api.keygen.shKeygen / LicensingLicense validation APIInstallation and updates
oci.pkg.keygen.shKeygen / LicensingNetwrix OCI registry — Helm charts and application imagesInstallation and updates
raw.pkg.keygen.shKeygen / LicensingInstaller script downloadInstallation and updates
keygen-dist.c3c9112df8df715f42d1162cdce5dba1.r2.cloudflarestorage.comKeygen / Licensing CDNKeygen artifact storageInstallation and updates
api.github.comGitHubGitHub APIInstallation only
github.comGitHubRepository and release accessInstallation only
raw.githubusercontent.comGitHubArgoCD bootstrap manifestsInstallation only
release-assets.githubusercontent.comGitHubRelease asset downloadsInstallation only
pkg-containers.githubusercontent.comGitHub Container RegistryGitHub Packages CDNInstallation and updates
ghcr.ioGitHub Container RegistryContainer imagesInstallation and updates
get.k3s.ioK3s / RancherK3s installer downloadInstallation only
rpm.rancher.ioK3s / RancherK3s package repositoryInstallation only
storage.googleapis.comK3s / RancherK3s artifact storageInstallation only

Internal Ports

These ports are used within the Access Analyzer VM for service-to-service communication:

PortProtocolServiceDescription
443TCPTraefikHTTPS ingress for web UI and API
6443TCPK3s APIKubernetes API server
8090TCPArgoCDArgoCD UI (via port-forward)
5432TCPPostgreSQLDatabase connections
8123TCPClickHouseHTTP interface
9000TCPClickHouseNative protocol
6379TCPRedisCache and queue connections
note

All internal ports are bound to the local cluster network. Only port 443 (Traefik) is exposed externally for the web interface.

Connector Network Requirements

Depending on the connectors you configure, the Access Analyzer VM must also have outbound access to your data sources:

ConnectorPortProtocolNotes
CIFS / SMB445TCPSMB file sharing
Active Directory389TCPLDAP
Active Directory636TCPLDAPS (encrypted)
Active Directory135–139TCPRPC
Active Directory49152–65535TCPRPC dynamic ports
SharePoint Online443TCPMicrosoft Graph API
Entra ID443TCPMicrosoft identity platform
Local Groups5985TCPWinRM (HTTP)
Local Groups5986TCPWinRM (HTTPS)

Proxy Configuration

If outbound traffic is routed through a proxy, set the following environment variables before running the installer:

export HTTP_PROXY="http://<PROXY_HOST>:<PROXY_PORT>"
export HTTPS_PROXY="http://<PROXY_HOST>:<PROXY_PORT>"
export NO_PROXY="localhost,127.0.0.1,.svc,.cluster.local,10.0.0.0/8,172.16.0.0/12,192.168.0.0/16"

Antivirus Exclusions

If an endpoint detection or antivirus product is running on the Access Analyzer host, configure exclusions for the following paths before installation. The installer's preflight checks detect common products (CrowdStrike Falcon, SentinelOne, Sophos, and others) and will prompt you to confirm exclusions are in place.

PathReason
/var/lib/rancher/K3s runtime data
/var/lib/containerd/Container image layers
/run/k3s/K3s socket and runtime files
/usr/local/bin/k3sK3s binary
note

Setting SKIP_AV_CHECK=true before running the installer bypasses the antivirus detection prompt, but does not configure exclusions automatically. Configure exclusions manually before running the installer.

Firewall Configuration

Allow outbound HTTPS (port 443) to all endpoints listed in the Outbound Endpoints table above. The examples below show how to configure this on common platforms.

Azure (NSG Rule)

az network nsg rule create \
--resource-group <RESOURCE_GROUP> \
--nsg-name <NSG_NAME> \
--name AllowOutboundHTTPS \
--priority 100 \
--direction Outbound \
--access Allow \
--protocol Tcp \
--destination-port-ranges 443

AWS (EC2 Security Group)

aws ec2 authorize-security-group-egress \
--group-id <SECURITY_GROUP_ID> \
--protocol tcp \
--port 443 \
--cidr 0.0.0.0/0

On-Premises (ufw)

sudo ufw allow out 443/tcp
sudo ufw reload

Verify Connectivity

After configuring firewall rules, verify that the required endpoints are reachable from the Access Analyzer server:

curl -I https://oci.pkg.keygen.sh
curl -I https://ghcr.io
curl -I https://get.k3s.io

All commands should return an HTTP response (2xx or 3xx). A connection timeout or refusal indicates a firewall rule is blocking the endpoint.