Fortinet black logo
5.2.0

Connectivity requirements

Connectivity requirements

The communicating device on which you install the FortiEDR Collector must meet the following connectivity requirements:

  • Connectivity to a Local Area Network (for wired users) or a Wireless Network (for wireless users). If there is no connectivity, consult your IT support person.
  • Connectivity to the FortiEDR Core and the FortiEDR Aggregator. You can check this by browsing to the Core’s IP address and the Aggregator’s IP address. For problems connecting, see Troubleshooting.
  • Up to 5 Mbps of additional network workload for each 1,000 Collectors.
  • Connectivity to the following ports:
    • 559/555—Used by FortiEDR Core with/without SSL
    • 8081—Used by FortiEDR Aggregator
    • 443—For Browser connection to the FortiEDR Central Manager
    NoteMake sure these ports are not blocked by your firewall product (if one is deployed). As a security best practice, set up a narrow opening for these ports in the firewall rules. For example:
    • Open the TCP outbound port 555 only to the Core IP address.
    • Open the TCP outbound port 8081 only to the Aggregator IP address.

Connectivity requirements

The communicating device on which you install the FortiEDR Collector must meet the following connectivity requirements:

  • Connectivity to a Local Area Network (for wired users) or a Wireless Network (for wireless users). If there is no connectivity, consult your IT support person.
  • Connectivity to the FortiEDR Core and the FortiEDR Aggregator. You can check this by browsing to the Core’s IP address and the Aggregator’s IP address. For problems connecting, see Troubleshooting.
  • Up to 5 Mbps of additional network workload for each 1,000 Collectors.
  • Connectivity to the following ports:
    • 559/555—Used by FortiEDR Core with/without SSL
    • 8081—Used by FortiEDR Aggregator
    • 443—For Browser connection to the FortiEDR Central Manager
    NoteMake sure these ports are not blocked by your firewall product (if one is deployed). As a security best practice, set up a narrow opening for these ports in the firewall rules. For example:
    • Open the TCP outbound port 555 only to the Core IP address.
    • Open the TCP outbound port 8081 only to the Aggregator IP address.