What are common firewall rules needed for distributed scans?
The architecture relies on a Postgres-backed queueing model where the Discovery Agent hosts the "work" and Search Agents connect to it to claim tasks.
1. Internal Network (Agent-to-Agent)
These rules must be open on the Discovery Agent's local firewall and any network firewalls between the Discovery Agent and the Search Agents.
Direction | Port | Protocol | Purpose |
|---|---|---|---|
Inbound to Discovery | 6433 | TCP | pgBouncer (Critical): Search Agents connect here to check out work from the job queue. |
Inbound to Discovery | 5433 | TCP | PostgreSQL: Used for direct database management and initialization (usually local, but sometimes needed for remote troubleshooting). |
Inbound to Discovery | 8080 / 443 | TCP | Agent Communication: In some configurations, agents use these ports to coordinate status or heartbeat if not going through the console. |
2. External Network (Agent-to-Spirion Sensitive Data Platform)
All agents (Discovery and Search) must be able to communicate with the Spirion Cloud Console. These are typically Outbound rules.
Direction | Port | Protocol | Destination | Purpose |
|---|---|---|---|---|
Outbound | 443 | HTTPS |
| Policy & Reporting: Downloading scan instructions and uploading results/telemetry. |
Outbound | 443 | HTTPS |
| Storage/Ingress: Results are often shipped to an S3-backed Ingress service. |
3. Target Access (Discovery Agent only)
The Discovery Agent requires specific permissions to crawl the Target locations.
For example:
- File Shares (SMB): Ports 139 and 445 (TCP/UDP) must be open from the Discovery Agent to the File Server.
- SharePoint/O365: Port 443 (HTTPS) must be open to Microsoft's cloud URLs.
- SQL Databases: Port 1433 (TCP) for MS SQL, or the specific port for Oracle/MySQL/etc.
Common Pitfalls and Troubleshooting
- The "Ephemeral Port" Issue: Ensure that the Discovery Agent machine isn't blocking the high-range ports used by Windows for dynamic RPC communication if scanning remote Windows targets.
- Postgres Binding: By default, the Spirion Postgres instance binds to the IP address of the Discovery Agent. If the agent has multiple NICs, ensure the firewall rule matches the IP registered in the SDP Console.
- SSL Inspection: Deep Packet Inspection (DPI) or SSL Inspection on firewalls/proxies can break the connection to SDP Cloud. Ensure
*.spirion.comis bypassed or the Spirion certificate is trusted. - Verification Command: From a Search Agent machine, run this PowerShell command to test connectivity to the Discovery Agent:
Test-NetConnection [Discovery_Agent_IP] -Port 6433 - If this returns
TcpTestSucceeded : False, the Search Agent will log the "Unable to find job queue" error you saw earlier.
- If this returns
Summary for your specific error
Since your logs show "Job Queue connection failed," the most likely culprit is that Port 6433 is blocked on the Discovery Agent, preventing your Search Agents from reaching the Postgres queue.