Ports used on your PBX
The table below outlines all the ports used on your PBX that you need to open on your hardware firewall if you want outside users to have access to things. These are default port assignments for new installs, but most can be changed by the user post install. Legacy versions may have used different default port numbers (notably http provisioning) and the original port numbers remain unaffected when the system is upgraded.
→ For a list of IPs your PBX will need to communicate with, please see Allowed IPs for PBXact Upgrade.
PBX Admin Access
PORT | TCP/UDP | PURPOSE | CHANGING PORT | SECURITY | NOTES |
---|---|---|---|---|---|
22 | TCP | SSH Console | This can only be changed inside from inside Linux CLI and not recommended to be changed. | Not recommended to open this up to untrusted networks. | Port used to allow SSH to the PBX from the outside world. |
80 FreePBX 2001 PBXact | TCP | PBX GUI HTTP (Non HTTPS) | Can change this port inside the PBX Admin GUI > System Admin Module > Port Management section. | Not recommended to open this up to untrusted networks. | Used to access the PBX Admin GUI |
443 | TCP | PBX GUI HTTPS | Can change this port inside the PBX Admin GUI > System Admin Module > Port Management section. | Not recommended to open this up to untrusted networks. | Used to access the PBX Admin GUI with SSL encryption |
1194 | UDP | OpenVPN server | Admin GUI → System Admin Pro→ VPN Server → Settings tab → Server Port | Can open to untrusted hosts | Used to connect OpenVPN clients to PBX VPN Server. |
PBX SIP and IAX Communication
PORT | TCP/UDP | PURPOSE | CHANGING PORT | SECURITY | NOTES |
---|---|---|---|---|---|
5060 | UDP | chan_PJSIP Signaling | Can change this port inside the PBX Admin GUI SIP Settings module. | Not recommended to open this up to untrusted networks. | Standard Port used for chan_PJSIP Signalling. |
5061 |
| chan_PJSIP | Can change this port inside the PBX Admin GUI SIP Settings module. | Not recommended to open this up to untrusted networks. | Secure Port used for chan_PJSIP Signalling. |
5160 | UDP | chan_SIP Signaling | Can change this port inside the PBX Admin GUI SIP Settings module. | Not recommended to open this up to untrusted networks. | Standard Port used for chan_SIP Signalling. |
5161 |
| chan_SIP | Can change this port inside the PBX Admin GUI SIP Settings module. | Not recommended to open this up to untrusted networks. | Secure Port used for chan_SIP Signalling. |
10000-20000 | UDP | RTP for SIP | Can change this port inside the PBX Admin GUI SIP Settings module. | Safe to open to the outside world and is required by most SIP Carriers as your RTP traffic can come from anywhere. | Used for the actual voice portion of a SIP Call. |
4569 | UDP | IAX | Can change this port inside the PBX Admin GUI IAX Settings module. | Not recommended to open this up to untrusted networks. | Used for IAX protocol and trunking |
4000-4999 | UDP | FAX UDPTL | Not configurable in the GUI, on by editing custom conf file. |
| Used for T38 fax media |
PBX User Control Panel (UCP)
PORT | TCP/UDP | PURPOSE | CHANGING PORT | SECURITY | NOTES |
---|---|---|---|---|---|
81 | TCP | PBX User Control Panel (UCP) HTTP (Non HTTPS) | Can change this port inside the PBX Admin GUI > System Admin Module > Port Management section. | Not recommended to open this up to untrusted networks as the traffic is not encrypted. Recommend using HTTPS version of PBX User Control Panel instead for remote users. | Port used to access the GUI portion of UCP |
4443 | TCP | PBX User Control Panel (UCP) HTTPS | Can change this port inside the PBX Admin GUI > System Admin Module > Port Management section. | Safe to open this up to untrusted networks as the traffic is encrypted and requires username and password authentication. | Port used to access the GUI portion of UCP with SSL encryption |
8088 | TCP | WebRTC Unencrypted Softphone Client | Can change this port inside the PBX Admin GUI > Advanced Settings > Asterisk Builtin mini-HTTP section > HTTP Bind Port | Not recommended to open this up to untrusted networks as the traffic is not encrypted. Recommend using HTTPS version | Used for the WebRTC portion of UCP |
8089 | TCP | WebRTC Encrypted Softphone Client | Can change this port inside the PBX Admin GUI > Advanced Settings > Asterisk Builtin mini-HTTP section > HTTPS Bind Port | Cautiously open this up to untrusted networks if needed. Traffic is encrypted with SSL and requires username and password authentication, so verify using very complex username and password. | Used for the WebRTC portion of UCP |
8001 | TCP | Node Server | Can change this port inside the PBX Admin GUI > Advanced Settings > UCP NodeJS Server > NodeJS Bind Port | Not recommended to open this up to untrusted networks as the traffic is not encrypted. | Used by UCP with HTTP for Conf Rooms and Chatting and other products in UCP |
8003 | TCP | Node Server (secure) | Can change this port inside the PBX Admin GUI > Advanced Settings > UCP NodeJS Server > NodeJS HTTPS Bind Port | Safe to open this up to untrusted networks as the traffic is encrypted with SSL and requires username and password authentication. | Used by UCP with HTTPS for Conf Rooms and Chatting and other products in UCP |
PBX Phone Provisioning and Phone Apps
PORT | TCP/UDP | PURPOSE | CHANGING PORT | SECURITY | NOTES |
---|---|---|---|---|---|
84 | TCP | HTTP Provisioning for Phones (Non HTTPS) | Can change this port inside the PBX Admin GUI > System Admin Module > Port Management section. | Not recommended to open this up to untrusted networks as the traffic is not encrypted. Recommend using HTTPS Phone Provisioning option of instead for remote users. | Make sure if opening up outside access to enable username and password authentication for HTTP provisioning from the PBX Admin GUI System Admin > Provisioning Protocol. Inside EPM you define per template if the phones use TFTP, FTP, HTTP or HTTPS provisioning. In the past, http provisioning defaulted to port 83. When upgrading older systems, the port assignments to not change from their original settings. |
1443 | TCP | HTTPS Provisioning for Phones | Can change this port inside the PBX Admin GUI > System Admin Module > Port Management section. | Safe to open this up to untrusted networks as the traffic is encrypted as long as your enable username and password authentication as outlined in the Notes section. | Make sure if opening up outside access to enable username and password authentication for HTTP provisioning from the PBX Admin GUI System Admin > Provisioning Protocol. Inside EPM you define per template if the phones use TFTP, FTP, HTTP or HTTPS provisioning. |
21 | TCP | FTP Provisioning for Phones | This can only be changed inside from inside Linux CLI and not recommended to be changed. | Not recommended to open this up to untrusted networks as it has no ability encrypt traffic and is not NAT Friendly. Recommend using HTTPS provisioning for remote phones instead. | Used if your are having phones inside EPM use TFTP for provisioning. Inside EPM you define per template if the phones use TFTP, FTP, HTTP or HTTPS provisioning. |
69 | UDP | TFTP Provisioning for Phones | This can only be changed inside from inside Linux CLI and not recommended to be changed. | Not recommended to open this up to untrusted networks as it has no ability encrypt traffic and is not NAT Friendly. | Used if your are having phones inside EPM use TFTP for provisioning. Inside EPM you define per template if the phones use TFTP, FTP, HTTP or HTTPS provisioning. |
82 | TCP | Phone Apps HTTP (Non HTTPS) | Can change this port inside the PBX Admin GUI > System Admin Module > Port Management section. | Not recommended to open this up to untrusted networks as the traffic is not encrypted. Recommend using Phone Apps HTTPS option of instead for remote users. | Port used for phone apps to communicate with the PBX as HTTP not HTTPS traffic. Inside EPM you pick if the phone apps use HTTP or HTTPS. |
3443 | TCP | Phone Apps HTTPS | Can change this port inside the PBX Admin GUI > System Admin Module > Port Management section. | Safe to open this up to untrusted networks as the traffic is encrypted. | Port used for phone apps to communicate with the PBX using SSL encryption. Inside EPM you pick if the phone apps use HTTP or HTTPS. |
Sangoma Talk (Mobile)
PORT | TCP/UDP | PURPOSE | CHANGING PORT | SECURITY | NOTES |
---|---|---|---|---|---|
see PBX SIP section above | TCP | Sangoma Connect Signaling | Change this port in the PBX Admin GUI→ Settings → Asterisk SIP Settings → PJSIP TCP Bind Port | Opening this port to untrusted source IPs is necessary for mobile clients, but it's important that it be protected with PBX Responsive Firewall and/or Intrustion Detection (fail2ban) | Used for signaling |
See PBX SIP section above | UDP | Media | The port can be changed by going to Settings → Asterisk SIP Settings → General SIP Settings Tab. Note: same RTP port configuration as SIP. | Safe to open this up to untrusted networks | Used for media
|
8443 | TCP | Node Server. The SangomaConnect node servers binds on this port only on localhost interface (127.0.0.1). If ConnectMobile SSL certificates are being used, the binding to this port will be secured (https). | The port can be changed by going to Settings → Advanced Settings → SangomaConnect section → Sangomaconnect server Bind Port. | This port is ONLY opened and used on localhost (127.0.0.1). No need to enable/expose it on the firewall. | Used for internal Sangoma Connect API |
Sangoma Phone (Desktop Client)
PORT | TCP/UDP | PURPOSE | CHANGING PORT | SECURITY | NOTES |
---|---|---|---|---|---|
6443 | TCP | Sangoma Phone client communication with PBX | Can change this port inside the PBX Admin GUI → System Admin → Port Management | Safe to open this up to untrusted networks as the traffic is encrypted with SSL and requires username and password authentication. | Used for call signaling and API access |
10000-20000 | UDP | Media - RTP | The port can be changed by going to Settings → Asterisk SIP Settings → General SIP Settings Tab. Note: Zulu uses the same rtp port configuration as SIP. | Safe to open this up to untrusted networks, as your RTP traffic can come from anywhere your Sangoma Phone users are connecting from. | Used for call media |
Zulu 3
PORT | TCP/UDP | PURPOSE | CHANGING PORT | SECURITY | NOTES |
---|---|---|---|---|---|
8002 | TCP | Zulu 3 Client Communication with PBX | Can change this port inside the PBX Admin GUI > Advanced Settings > Zulu Section > Zulu Bind Address | Safe to open this up to untrusted networks as the traffic is encrypted with SSL and requires username and password authentication. | Used for signalling |
10000-20000 | UDP | Media - RTP | The port can be changed by going to Settings → Asterisk SIP Settings → General SIP Settings Tab. Note: Zulu uses the same rtp port configuration as SIP. | Safe to open this up to untrusted networks, as your RTP traffic can come from anywhere your Zulu users are connecting from. | Used for handling media during a call |
Zulu 2
PORT | TCP/UDP | PURPOSE | CHANGING PORT | SECURITY | NOTES |
---|---|---|---|---|---|
8002 | TCP | Zulu 2 Client Communication with PBX | Can change this port inside the PBX Admin GUI > Advanced Settings > Zulu Section > Zulu Bind Address | Safe to open this up to untrusted networks as the traffic is encrypted with SSL and requires username and password authentication. | Zulu 2.0 requires this and the ports below to be opened. NOTE: You may require the "RTP for SIP" port range to be open as well, for call audio. |
8088 | TCP | Zulu 2.0 Unencrypted Softphone Client | Can change this port inside the PBX Admin GUI > Advanced Settings > Asterisk Builtin mini-HTTP section > HTTP Bind Port | If using Zulu 3.0 this port should not be open. Not recommended to open this up to untrusted networks as the traffic is not encrypted. Recommend using HTTPS version | Used for the softphone portion of Zulu |
8089 | TCP | Zulu 2.0 Encrypted Softphone Client | Can change this port inside the PBX Admin GUI > Advanced Settings > Asterisk Builtin mini-HTTP section > HTTPS Bind Port | If using Zulu 3.0 this port should not be open. Safe to open this up to untrusted networks as the traffic is encrypted with SSL and requires username and password authentication. | Used for the softphone portion of Zulu |
5000 | TCP | Zulu 2.0 Chat | At this time can not change the port | If using Zulu 3.0 this port should not be open. Safe to open this up to untrusted networks as the traffic is encrypted with SSL and requires username and password authentication. | Used for chat portion of Zulu |
RMS Monitoring
PORTS | TCP/UDP | PURPOSE | CHANGING PORT | SECURITY | NOTES |
---|---|---|---|---|---|
443 | TCP | Checks | N/A | RMS only uses these ports for outbound connections. | If the firewall is configured to block outbound ports/connections, then these ports need to be added to the allowed outbound port list. |
Reserved Port Range (6000-6199)
This range of ports is reserved for internal usage. Current releases of the sysadmin module will prevent defining these ports for other services by having System Admin→Port Management show an alert when trying to set these as a custom port. These ports will only be used for a variety of internal services, and are intended for services that will only be accessed by localhost, and should not need any additional firewall configuration since they will not be accessed from external networks. If any of these ports have previously been configured for use by any service such as the ones listed above, it's recommended to change it to something outside of this range to avoid conflicts.