Default port information
FortiSandbox treats Port1 or any other administrative port set through the CLI command set admin-port
as reserved for device management, and Port3 be reserved for the Windows VM to communicate with the outside network. The other ports are used for file input and communication among cluster nodes. In cluster mode, FortiSandbox uses TCP ports 2015 and 2018 for cluster internal communication. If the unit works as a Collector to receive threat information from other units, it uses TCP port 2443
The following tables list the default open ports for each FortiSandbox interface.
FortiSandbox 3500D, 2000E, and 3000E default ports:
FortiSandbox 3000D default ports:
Port (Interface) |
Type |
Default Open Ports |
---|---|---|
Port1 |
RJ-45 |
TCP ports, 22 (SSH), 23 (Telnet), 80 and 443 (GUI), 514 (OFTP communication with FortiGate, FortiWeb, FortiClient & FortiMail). SNMP local query port. FortiGuard Distribution Servers (FDS) use TCP port 8890 for download. The FortiSandbox will use a random port picked by the kernel. FortiGuard Web Filtering servers use UDP port 53 or 8888. The FortiSandbox will use a random port picked up by the kernel. FortiSandbox uses UDP port 53 or 8888 and TCP port 443 of the Community Cloud server to query existing results. Before release 3.0.0, if enabled, FortiSandbox uploads detected malware information to TCP port 443 of the Community Cloud server. Since 3.0.0, the TCP ports to use on server-side are 25, 465 or 587. The FortiSandbox will use a random port picked up by the kernel. If you configure an internal mail server, internal DNS server, remote syslog server, LDAP server, SNMP managers, NTP server, or override the web filtering server IP address, communication is recommended to be through this interface. Ensure that the applicable routing is configured. |
Port2, Port4 |
RJ-45 |
No service listens except OFTP (TCP port 514). If user specifies it as an administration port through CLI command |
Port3 |
RJ-45 |
All ports are open. Reserved for guest VM to communicate with the outside network. |
Port5, Port6 |
SFP |
No service listens except OFTP (TCP port 514). If user specifies it as an administration port through CLI command |
Port7, Port8 |
SFP+ |
No service listens except OFTP (TCP port 514). If user specifies it as an administration port through CLI command |
FortiSandbox 1000D default ports:
Port (Interface) |
Type |
Default Open Ports |
---|---|---|
Port1 |
RJ-45 |
TCP ports 22 (SSH), 23 (Telnet), 80 and 443 (GUI), 514 (OFTP communication with FortiGate, FortiWeb, FortiClient & FortiMail). FortiGuard Distribution Servers (FDS) use TCP port 8890 for download. The FortiSandbox will use a random port picked by the kernel. FortiGuard Web Filtering servers use UDP port 53 or 8888. The FortiSandbox will use a random port picked up by the kernel. FortiSandbox uses UDP port 53 or 8888 and TCP port 443 of the Community Cloud server to query existing results. Before release 3.0.0, if enabled, FortiSandbox uploads detected malware information to TCP port 443 of the Community Cloud server. Since 3.0.0, the TCP ports to use on server-side are 25, 465 or 587. The FortiSandbox will use a random port picked up by the kernel. If you configure an internal mail server, internal DNS server, remote syslog server, LDAP server, SNMP managers, NTP server, or override the web filtering server IP address, communication is recommended to be through this interface. Ensure that the applicable routing is configured. |
Port2, Port4, Port5, Port6 |
RJ-45 |
No service listens except OFTP (TCP port 514). If user specifies it as an administration port through CLI command |
Port3 |
RJ-45 |
All ports are open. Reserved for guest VM to communicate with the outside network. |
Port7, Port 8 |
SFP |
No service listens except OFTP (TCP port 514). If user specifies it as an administration port through CLI command |
All ports mentioned above are the same for both IPv4 and IPv6 protocols. |
You can dynamically change system firewall rules using the |
If port3 of the FortiSandbox is connected to an interface behind the FortiGate device, make sure that the egress WAN interface does not have the Scan Outgoing Connections to Botnet Sites feature enabled, nor any active security profiles as this might impact the detection rate. If this is not possible, we recommend connecting the FortiSandbox port3 to a different egress WAN port or directly to the Internet in front of the perimeter firewall. |
For more information on FortiSandbox 1000D, FortiSandbox 3000D, FortiSandbox 3500D, FortiSandbox 2000E, and FortiSandbox 3000E interfaces, see Interfaces.