Linux Requirements
    • 29 Apr 2024
    • 3 Minutes to read
    • Contributors
    • Dark
      Light
    • PDF

    Linux Requirements

    • Dark
      Light
    • PDF

    Article summary

    System Requirements

    This chapter provides a list of requirements for the Linux system on which the Nectar Endpoint Client will be installed.

    Platform Requirements

    Nectar Endpoint Client for Linux is supported for the following operating systems:

    • Red Hat Enterprise Linux (RHEL) / Rocky Linux / Oracle Linux / AlmaLinux 8 or 9
    • Debian 12
    • Ubuntu 22, 23 or 24

    The platform hardware requirements vary depending on the number of virtual endpoints that have been licensed for the agent. The following are the minimum platform requirements required for installation of a Nectar Endpoint Client on a Linux system:

    Component

    1-50 Endpoints

    50-100 Endpoints

    100-200 Endpoints

    200-500 Endpoints

    CPU
    Intel Pentium 4 2.8Ghz or higher
    Intel Pentium 4 3.0Ghz or higher
    Intel Core 2 Duo
    or higher
    Intel Core i3
    or higher
    Memory1 GB RAM
    1 GB RAM
    1 GB RAM
    2 GB RAM
    Storage
    110 MB available HD space
    110 MB available HD space
    110 MB available HD space
    110 MB available HD space

    Ports and Protocols

    The following is a list of ports and protocols used by the Nectar Endpoint Client. If the agent will be running behind a firewall, the following ports should be open in your firewall configuration to allow the agent to function properly.

    Port Number

    Protocol

    Application

    68UDPDHCP Client
    5060TCPSIP
    5060UDPSIP
    26022*
    TCP
    Outbound connections to the Controller SCP server (used to initiate transfer of TLS certificate bundles to the Agent)
    29999-50000
    UDPReal-time media
    40000*
    TCPInbound management connections from the Controller
    N/A
    ICMPInbound ICMP messages (required for some network tests)

    * Default port number.

    NOTE

    Test connections to TCP/TLS ports (DoT, SIP/TLS, SIPS, HTTP[S], POP[S], SMTP[S], etc.) may use ephemeral source ports, which can impact firewall requirements. You can find the port range assigned to ephemeral ports on the Agent host using the following command:

    [root]# sysctl -A | grep ip_local_port_range

    net.ipv4.ip_local_port_range = 32768 60999

    Firewall Configuration

    The following sections provide general guidelines for configuring the Linux firewall to open the ports required by the Agent. For more detailed information about firewall configuration, consult the firewalld or iptables documentation.

    Using firewalld 

    The following firewalld command can be used to implement the required firewall rules in RHEL etc, while logged in as 'root':

    TypeScript
    firewall-cmd --permanent --zone=[default_zone] --add-port=[port_number]/[tcp|udp]

    For example:

    TypeScript
    firewall-cmd --permanent --zone=public --add-port=5060/udp

    success

    Multiple ports can be opened with one command. For example:

    TypeScript
    firewall-cmd --permanent --zone=public --add-port=5060/tcp --add-port=5060/udp --add-port=40000/tcp --add-port=26022/tcp --add-port=29999-50000/udp
    
    success

    After configuring all the necessary ports, enter the following command to reload the firewall service:

    TypeScript
    firewall-cmd –reload

    Using iptables

    The following iptables commands can be used to implement the required firewall rules in older versions of RHEL/CentOS, while logged in as 'root':

    TypeScript
    # inbound TCP management-domain connections
    
    iptables -A INPUT -p tcp --dport 40000 -j ACCEPT
    
    # inbound ICMP messages
    
    iptables -A INPUT -p icmp -j ACCEPT
    
    # inbound UDP SIP messages
    
    iptables -A INPUT -p udp --dport 5060 -j ACCEPT
    
    # inbound TCP SIP messages
    
    iptables -A INPUT -p tcp --dport 5060 -j ACCEPT
    
    # inbound UDP RTP media and UDP P2P probes
    
    iptables -A INPUT -p udp --dport 29999:50000 -j ACCEPT
    
    # outbound TCP connections to Controller SCP
    
    iptables -A OUTPUT -p tcp --dport 26002 -j ACCEPT
    
    iptables -P INPUT DROP
    
    iptables -P FORWARD DROP
    
    iptables -P OUTPUT ACCEPT
    
    service iptables restart
    
    iptables: Setting chains to policy ACCEPT: filter [ OK ]
    
    iptables: Flushing firewall rules: [ OK ]
    
    iptables: Unloading modules: [ OK ]
    
    iptables: Applying firewall rules: [ OK ]
    NOTE
    The TCP and UDP rules listed above are only valid for default local ports.

    Test Interface IP Addressing

    When running an active test on an agent, it is necessary to select a specific local interface and IP address to be used as the test interface. It is therefore strongly recommended that a static IP address be assigned to any network interface that will be used to run tests, rather than using DHCP to assign addresses automatically. If dynamic addressing is used and a test interface IP address changes, it will cause all tests currently running on the old IP address to fail, along with any tests scheduled to run using the old IP address.

    Dynamic or static IP assignment can be used for the management domain interface used to communicate with the Controller if it is a dedicated interface that will not be used to run tests. For any interface that will be used as a test interface, static IP addressing is advised


    Was this article helpful?

    Changing your password will log you out immediately. Use the new password to log back in.
    First name must have atleast 2 characters. Numbers and special characters are not allowed.
    Last name must have atleast 1 characters. Numbers and special characters are not allowed.
    Enter a valid email
    Enter a valid password
    Your profile has been successfully updated.
    ESC

    Eddy AI, facilitating knowledge discovery through conversational intelligence