Skip to end of metadataGo to start of metadata
The table below outlines all the ports used on your PBX that you need to open on your hardware firewall if you want outside users to have access to things. These are default port assignments for new installs, but most can be changed by the user post install. Legacy versions may have used different default port numbers (notably http provisioning) and the original port numbers remain unaffected when the system is upgraded. Imvu official download.
Yate client(Qt) - launch the Yate client; Yate Cosole - launch the Yate server Yate Web Site Installing Yate from SVN Requirements. TortoiseSVN; at least Visual Studio 2005 Compiling Yate on Windows. To compile please build the 'YATE' project - it will build the library and all modules without external dependencies. Before using the interface, the WebGUI must be given write right to Yate's configuration directory. The command that has to be run as root is: chmod a+rw /etc/yate (If yatebts is installed from package.) or chmod a+rw /usr/local/etc/yate/ (If yatebts is installed from sources.). A gateway for engines with a J1708 serial interface to a NMEA 2000 marine digital network. It supports three protocols that work over J1708: the standard J1587 used by many manufacturers, the proprietary Cummins KCM-II and the proprietary Volvo Penta protocol used in engines with EDC I.
→ For a list of IPs your PBX will need to communicate with, please see Allowed IPs for PBXact Upgrade.
PORT | TCP/UDP | PURPOSE | CHANGING PORT | SECURITY | NOTES |
---|---|---|---|---|---|
22 | TCP | SSH Console | This can only be changed inside from inside Linux CLI and not recommended to be changed. | Not recommended to open this up to untrusted networks. | Port used to allow SSH to the PBX from the outside world. |
80 FreePBX Colorsnapper2 v 1 1 3 download free. 2001 PBXact | TCP | PBX GUI HTTP (Non HTTPS) | Can change this port inside the PBX Admin GUI > System Admin Module > Port Management section. | Not recommended to open this up to untrusted networks. | Used to access the PBX Admin GUI |
443 | TCP | PBX GUI HTTPS | Can change this port inside the PBX Admin GUI > System Admin Module > Port Management section. | Not recommended to open this up to untrusted networks. | Used to access the PBX Admin GUI with SSL encryption |
1194 | TCP/UDP | OpenVPN server | Change not supported | Can open to untrusted hosts | Used to connect OpenVPN clients to PBX VPN Server. |
PORT | TCP/UDP | PURPOSE | CHANGING PORT | SECURITY | NOTES |
---|---|---|---|---|---|
5060 | UDP | chan_PJSIP Signaling | Can change this port inside the PBX Admin GUI SIP Settings module. | Not recommended to open this up to untrusted networks. | Standard Port used for chan_PJSIP Signalling. |
5061 | chan_PJSIP | Can change this port inside the PBX Admin GUI SIP Settings module. | Not recommended to open this up to untrusted networks. | Secure Port used for chan_PJSIP Signalling. | |
5160 | UDP | chan_SIP Signaling | Can change this port inside the PBX Admin GUI SIP Settings module. | Not recommended to open this up to untrusted networks. | Standard Port used for chan_SIP Signalling. |
5161 | chan_SIP Secure Signaling | Can change this port inside the PBX Admin GUI SIP Settings module. | Not recommended to open this up to untrusted networks. | Secure Port used for chan_SIP Signalling. | |
10000-20000 | UDP | RTP for SIP | Can change this port inside the PBX Admin GUI SIP Settings module. | Safe to open to the outside world and is required by most SIP Carriers as your RTP traffic can come from anywhere. | Used for the actual voice portion of a SIP Call. |
4569 | UDP | IAX | Can change this port inside the PBX Admin GUI IAX Settings module. | Not recommended to open this up to untrusted networks. | Used for IAX protocol and trunking |
4000-4999 | UDP | FAX UDPTL | Not configurable in the GUI, on by editing custom conf file. | Used for T38 fax media |
PORT | TCP/UDP | PURPOSE | CHANGING PORT | SECURITY | NOTES |
---|---|---|---|---|---|
81 | TCP | PBX User Control Panel (UCP) HTTP (Non HTTPS) | Can change this port inside the PBX Admin GUI > System Admin Module > Port Management section. | Not recommended to open this up to untrusted networks as the traffic is not encrypted. Recommend using HTTPS version of PBX User Control Panel instead for remote users. | Port used to access the GUI portion of UCP |
4443 | TCP | PBX User Control Panel (UCP) HTTPS | Can change this port inside the PBX Admin GUI > System Admin Module > Port Management section. | Safe to open this up to untrusted networks as the traffic is encrypted and requires username and password authentication. | Port used to access the GUI portion of UCP with SSL encryption |
8088 | TCP | WebRTC Unencrypted Softphone Client | Can change this port inside the PBX Admin GUI > Advanced Settings > Asterisk Builtin mini-HTTP section > HTTP Bind Port | Not recommended to open this up to untrusted networks as the traffic is not encrypted. Recommend using HTTPS version | Used for the WebRTC portion of UCP |
8089 | TCP | WebRTC Encrypted Softphone Client | Can change this port inside the PBX Admin GUI > Advanced Settings > Asterisk Builtin mini-HTTP section > HTTPS Bind Port | Safe to open this up to untrusted networks as the traffic is encrypted with SSL and requires username and password authentication. | Used for the WebRTC portion of UCP |
8001 | TCP | Node Server | Can change this port inside the PBX Admin GUI > Advanced Settings > UCP NodeJS Server > NodeJS Bind Port | Not recommended to open this up to untrusted networks as the traffic is not encrypted. | Used by UCP with HTTP for Conf Rooms and Chatting and other products in UCP |
8003 | TCP | Node Server (secure) | Can change this port inside the PBX Admin GUI > Advanced Settings > UCP NodeJS Server > NodeJS HTTPS Bind Port | Safe to open this up to untrusted networks as the traffic is encrypted with SSL and requires username and password authentication. | Used by UCP with HTTPS for Conf Rooms and Chatting and other products in UCP |
PORT | TCP/UDP | PURPOSE | CHANGING PORT | SECURITY | NOTES |
---|---|---|---|---|---|
84 | TCP | HTTP Provisioning for Phones (Non HTTPS) | Can change this port inside the PBX Admin GUI > System Admin Module > Port Management section. | Not recommended to open this up to untrusted networks as the traffic is not encrypted. Recommend using HTTPS Phone Provisioning option of instead for remote users. | Make sure if opening up outside access to enable username and password authentication for HTTP provisioning from the PBX Admin GUI System Admin > Provisioning Protocol. Inside EPM you define per template if the phones use TFTP, FTP, HTTP or HTTPS provisioning. In the past, http provisioning defaulted to port 83. When upgrading older systems, the port assignments to not change from their original settings. |
1443 | TCP | HTTPS Provisioning for Phones | Can change this port inside the PBX Admin GUI > System Admin Module > Port Management section. | Safe to open this up to untrusted networks as the traffic is encrypted as long as your enable username and password authentication as outlined in the Notes section. | Make sure if opening up outside access to enable username and password authentication for HTTP provisioning from the PBX Admin GUI System Admin > Provisioning Protocol. Inside EPM you define per template if the phones use TFTP, FTP, HTTP or HTTPS provisioning. |
21 | TCP | FTP Provisioning for Phones | This can only be changed inside from inside Linux CLI and not recommended to be changed. | Not recommended to open this up to untrusted networks as it has no ability encrypt traffic and is not NAT Friendly. Recommend using HTTPS provisioning for remote phones instead. | Used if your are having phones inside EPM use TFTP for provisioning. Inside EPM you define per template if the phones use TFTP, FTP, HTTP or HTTPS provisioning. |
69 | UDP | TFTP Provisioning for Phones | This can only be changed inside from inside Linux CLI and not recommended to be changed. | Not recommended to open this up to untrusted networks as it has no ability encrypt traffic and is not NAT Friendly. | Used if your are having phones inside EPM use TFTP for provisioning. Inside EPM you define per template if the phones use TFTP, FTP, HTTP or HTTPS provisioning. |
TCP | Phone Apps HTTP (Non HTTPS) | Can change this port inside the PBX Admin GUI > System Admin Module > Port Management section. | Not recommended to open this up to untrusted networks as the traffic is not encrypted. Recommend using Phone Apps HTTPS option of instead for remote users. | Port used for phone apps to communicate with the PBX as HTTP not HTTPS traffic. Inside EPM you pick if the phone apps use HTTP or HTTPS. | |
3443 | TCP | Phone Apps HTTPS | Can change this port inside the PBX Admin GUI > System Admin Module > Port Management section. | Safe to open this up to untrusted networks as the traffic is encrypted. | Port used for phone apps to communicate with the PBX using SSL encryption. Inside EPM you pick if the phone apps use HTTP or HTTPS. |
PORT | TCP/UDP | PURPOSE | CHANGING PORT | SECURITY | NOTES |
---|---|---|---|---|---|
8002 | TCP | Zulu 3 Client Communication with PBX | Can change this port inside the PBX Admin GUI > Advanced Settings > Zulu Section > Zulu Bind Address | Safe to open this up to untrusted networks as the traffic is encrypted with SSL and requires username and password authentication. | Used for signalling |
10000-20000 | UDP | Media - RTP | The port can be changed by going to Settings → Asterisk SIP Settings → General SIP Settings Tab. Note: Zulu uses the same rtp port configuration as SIP. | Safe to open this up to untrusted networks, as your RTP traffic can come from anywhere your Zulu users are connecting from. | Used for handling media during a call |
PORT | TCP/UDP | PURPOSE | CHANGING PORT | SECURITY | NOTES |
---|---|---|---|---|---|
8002 | TCP | Zulu 2 Client Communication with PBX | Can change this port inside the PBX Admin GUI > Advanced Settings > Zulu Section > Zulu Bind Address | Safe to open this up to untrusted networks as the traffic is encrypted with SSL and requires username and password authentication. | Zulu 2.0 requires this and the ports below to be opened. NOTE: You may require the 'RTP for SIP' port range to be open as well, for call audio. |
8088 | TCP | Zulu 2.0 Unencrypted Softphone Client | Can change this port inside the PBX Admin GUI > Advanced Settings > Asterisk Builtin mini-HTTP section > HTTP Bind Port | If using Zulu 3.0 this port should not be open. Not recommended to open this up to untrusted networks as the traffic is not encrypted. Recommend using HTTPS version | Used for the softphone portion of Zulu |
8089 | TCP | Zulu 2.0 Encrypted Softphone Client | Can change this port inside the PBX Admin GUI > Advanced Settings > Asterisk Builtin mini-HTTP section > HTTPS Bind Port | If using Zulu 3.0 this port should not be open. Safe to open this up to untrusted networks as the traffic is encrypted with SSL and requires username and password authentication. | Used for the softphone portion of Zulu |
5000 | TCP | Zulu 2.0 Chat | At this time can not change the port | If using Zulu 3.0 this port should not be open. Safe to open this up to untrusted networks as the traffic is encrypted with SSL and requires username and password authentication. | Used for chat portion of Zulu |
Yate Web Interface Software
PORT | TCP/UDP | PURPOSE | CHANGING PORT | SECURITY | NOTES |
---|---|---|---|---|---|
81 | TCP | PBX User Control Panel (UCP) HTTP (Non HTTPS) | Can change this port inside the PBX Admin GUI > System Admin Module > Port Management section. | Not recommended to open this up to untrusted networks as the traffic is not encrypted. Recommend using HTTPS version of PBX User Control Panel instead for remote users. | Port used to access the GUI portion of UCP |
4443 | TCP | PBX User Control Panel (UCP) HTTPS | Can change this port inside the PBX Admin GUI > System Admin Module > Port Management section. | Safe to open this up to untrusted networks as the traffic is encrypted and requires username and password authentication. | Port used to access the GUI portion of UCP with SSL encryption |
8088 | TCP | WebRTC Unencrypted Softphone Client | Can change this port inside the PBX Admin GUI > Advanced Settings > Asterisk Builtin mini-HTTP section > HTTP Bind Port | Not recommended to open this up to untrusted networks as the traffic is not encrypted. Recommend using HTTPS version | Used for the WebRTC portion of UCP |
8089 | TCP | WebRTC Encrypted Softphone Client | Can change this port inside the PBX Admin GUI > Advanced Settings > Asterisk Builtin mini-HTTP section > HTTPS Bind Port | Safe to open this up to untrusted networks as the traffic is encrypted with SSL and requires username and password authentication. | Used for the WebRTC portion of UCP |
8001 | TCP | Node Server | Can change this port inside the PBX Admin GUI > Advanced Settings > UCP NodeJS Server > NodeJS Bind Port | Not recommended to open this up to untrusted networks as the traffic is not encrypted. | Used by UCP with HTTP for Conf Rooms and Chatting and other products in UCP |
8003 | TCP | Node Server (secure) | Can change this port inside the PBX Admin GUI > Advanced Settings > UCP NodeJS Server > NodeJS HTTPS Bind Port | Safe to open this up to untrusted networks as the traffic is encrypted with SSL and requires username and password authentication. | Used by UCP with HTTPS for Conf Rooms and Chatting and other products in UCP |
PORT | TCP/UDP | PURPOSE | CHANGING PORT | SECURITY | NOTES |
---|---|---|---|---|---|
84 | TCP | HTTP Provisioning for Phones (Non HTTPS) | Can change this port inside the PBX Admin GUI > System Admin Module > Port Management section. | Not recommended to open this up to untrusted networks as the traffic is not encrypted. Recommend using HTTPS Phone Provisioning option of instead for remote users. | Make sure if opening up outside access to enable username and password authentication for HTTP provisioning from the PBX Admin GUI System Admin > Provisioning Protocol. Inside EPM you define per template if the phones use TFTP, FTP, HTTP or HTTPS provisioning. In the past, http provisioning defaulted to port 83. When upgrading older systems, the port assignments to not change from their original settings. |
1443 | TCP | HTTPS Provisioning for Phones | Can change this port inside the PBX Admin GUI > System Admin Module > Port Management section. | Safe to open this up to untrusted networks as the traffic is encrypted as long as your enable username and password authentication as outlined in the Notes section. | Make sure if opening up outside access to enable username and password authentication for HTTP provisioning from the PBX Admin GUI System Admin > Provisioning Protocol. Inside EPM you define per template if the phones use TFTP, FTP, HTTP or HTTPS provisioning. |
21 | TCP | FTP Provisioning for Phones | This can only be changed inside from inside Linux CLI and not recommended to be changed. | Not recommended to open this up to untrusted networks as it has no ability encrypt traffic and is not NAT Friendly. Recommend using HTTPS provisioning for remote phones instead. | Used if your are having phones inside EPM use TFTP for provisioning. Inside EPM you define per template if the phones use TFTP, FTP, HTTP or HTTPS provisioning. |
69 | UDP | TFTP Provisioning for Phones | This can only be changed inside from inside Linux CLI and not recommended to be changed. | Not recommended to open this up to untrusted networks as it has no ability encrypt traffic and is not NAT Friendly. | Used if your are having phones inside EPM use TFTP for provisioning. Inside EPM you define per template if the phones use TFTP, FTP, HTTP or HTTPS provisioning. |
TCP | Phone Apps HTTP (Non HTTPS) | Can change this port inside the PBX Admin GUI > System Admin Module > Port Management section. | Not recommended to open this up to untrusted networks as the traffic is not encrypted. Recommend using Phone Apps HTTPS option of instead for remote users. | Port used for phone apps to communicate with the PBX as HTTP not HTTPS traffic. Inside EPM you pick if the phone apps use HTTP or HTTPS. | |
3443 | TCP | Phone Apps HTTPS | Can change this port inside the PBX Admin GUI > System Admin Module > Port Management section. | Safe to open this up to untrusted networks as the traffic is encrypted. | Port used for phone apps to communicate with the PBX using SSL encryption. Inside EPM you pick if the phone apps use HTTP or HTTPS. |
PORT | TCP/UDP | PURPOSE | CHANGING PORT | SECURITY | NOTES |
---|---|---|---|---|---|
8002 | TCP | Zulu 3 Client Communication with PBX | Can change this port inside the PBX Admin GUI > Advanced Settings > Zulu Section > Zulu Bind Address | Safe to open this up to untrusted networks as the traffic is encrypted with SSL and requires username and password authentication. | Used for signalling |
10000-20000 | UDP | Media - RTP | The port can be changed by going to Settings → Asterisk SIP Settings → General SIP Settings Tab. Note: Zulu uses the same rtp port configuration as SIP. | Safe to open this up to untrusted networks, as your RTP traffic can come from anywhere your Zulu users are connecting from. | Used for handling media during a call |
PORT | TCP/UDP | PURPOSE | CHANGING PORT | SECURITY | NOTES |
---|---|---|---|---|---|
8002 | TCP | Zulu 2 Client Communication with PBX | Can change this port inside the PBX Admin GUI > Advanced Settings > Zulu Section > Zulu Bind Address | Safe to open this up to untrusted networks as the traffic is encrypted with SSL and requires username and password authentication. | Zulu 2.0 requires this and the ports below to be opened. NOTE: You may require the 'RTP for SIP' port range to be open as well, for call audio. |
8088 | TCP | Zulu 2.0 Unencrypted Softphone Client | Can change this port inside the PBX Admin GUI > Advanced Settings > Asterisk Builtin mini-HTTP section > HTTP Bind Port | If using Zulu 3.0 this port should not be open. Not recommended to open this up to untrusted networks as the traffic is not encrypted. Recommend using HTTPS version | Used for the softphone portion of Zulu |
8089 | TCP | Zulu 2.0 Encrypted Softphone Client | Can change this port inside the PBX Admin GUI > Advanced Settings > Asterisk Builtin mini-HTTP section > HTTPS Bind Port | If using Zulu 3.0 this port should not be open. Safe to open this up to untrusted networks as the traffic is encrypted with SSL and requires username and password authentication. | Used for the softphone portion of Zulu |
5000 | TCP | Zulu 2.0 Chat | At this time can not change the port | If using Zulu 3.0 this port should not be open. Safe to open this up to untrusted networks as the traffic is encrypted with SSL and requires username and password authentication. | Used for chat portion of Zulu |
Yate Web Interface Software
Yate Web Interface Tutorial
PORTS | TCP/UDP | PURPOSE | CHANGING PORT | SECURITY | NOTES |
---|---|---|---|---|---|
443 | TCP Outbound | Checks Metrics RPC | N/A | RMS only uses these ports for outbound connections. Thus, no INBOUND firewall rule changes are necessary. | If the firewall is configured to block outbound ports/connections, then these ports need to be added to the allowed outbound port list. |