Windows firewall settings

This topic describes Windows firewall settings.

Overview

If Windows Firewall is enabled on the machine on which OpenText Service Virtualization is installed, requests from remote services to OpenText Service Virtualization are blocked. To enable the required TCP/HTTP communication, OpenText Service Virtualization adds a set of exceptions to the Firewall. This set of inbound rules is maintained automatically by OpenText Service Virtualization, and does not generally require any manual configuration.

To change the automatic configuration settings, see Windows firewall and TCP port configuration.

For TCP listeners, a firewall exception is created for the OpenText Service Virtualization Server and Designer executable files.

For HTTP listeners, OpenText Service Virtualization uses the .NET HttpListener component to listen for HTTP/HTTPS requests. OpenText Service Virtualization cannot define an exception for the HttpListener executable itself, because HttpListener runs in a separate kernel process and is shared by all applications running on the machine. Instead, a firewall exception is created for all ports where the HttpListener component is used by the OpenText Service Virtualization Designer or Server to listen for HTTP/HTTPS requests.

The OpenText Service Virtualization components use the listeners as follows:

TCP Listener:

  • SSL component of the HTTP Proxy agent
  • IMS agent

  • CICS TG

The OpenText Service Virtualization installer creates a firewall exception for the OpenText Service Virtualization Server and Designer executables.

.NET HttpListener

  • HTTP Gateway agent
  • HTTP port of the HTTP Proxy agent
  • JDBC agent
  • OpenText Service Virtualization Management API endpoint in unsecured mode
  • HTTPS Gateway agent
  • OpenText Service Virtualization Management API endpoint in secured mode

OpenText Service Virtualization creates firewall exceptions for the specific ports that the agents use, makes the relevant URL reservations, and registers an SSL certificate for each port listening for HTTPS requests.

Note: All firewall rules that OpenText Service Virtualization creates are removed if the product is uninstalled.

Back to top

Default Windows firewall settings

The default inbound rules that OpenText Service Virtualization creates during installation of the Designer or when the Server is run for the first time are as follows:

  • Rules with specified ports are used by the System HTTP Listener server, and not directly by OpenText Service Virtualization. The ports are open for any program running on the machine.
  • Rules that are assigned directly to the OpenText Service Virtualization applications enable the OpenText Service Virtualization agents to access TCP ports directly.
Name Program Port
OpenText Service Virtualization Designer VirtualServiceDesigner Any
OpenText Service Virtualization Designer (HTTP Gateway) Any 7200
OpenText Service Virtualization Designer (HTTP Proxy) Any 7201
OpenText Service Virtualization Designer (HTTPS Gateway) Any 7205
OpenText Service Virtualization Designer (Java SE 6/7 JDBC) Any 7288
OpenText Service Virtualization Designer

(RestManagementService)

Any 7280
OpenText Service Virtualization Server HP.SV.StandaloneServer Any
OpenText Service Virtualization Server (HTTP Gateway) Any 6070
OpenText Service Virtualization Server (HTTP Proxy) Any 6071
OpenText Service Virtualization Server (HTTPS Gateway) Any 6075
OpenText Service Virtualization Server (Java SE 6/7 JDBC) Any 6088

OpenText Service Virtualization Server (RestManagementService)

Any

6080 (secured)

or

6085 (secured)

Service Virtualization Management (HTTP Server) Any 6086

Back to top

Checking Windows firewall settings

To review the current Windows firewall settings for OpenText Service Virtualization:

  1. In Windows Control Panel, open Windows Firewall.
  2. Select Advanced Settings to open Windows Firewall with Advanced Security.
  3. Select Inbound Rules, and sort by group.

    The rules defined for OpenText Service Virtualization start with OpenText Service Virtualization Designer or OpenText Service Virtualization Server.

    All rules are created by OpenText Service Virtualization for the Windows Firewall Private profile, using TCP protocol, and are enabled by default.

Back to top