Skip to content

Network Requirements

Communication Overview

RhythmX communicates with several integrated services. The following ports must be open between the RhythmX server and the relevant services for the platform to function correctly.

flowchart LR
    LDS["LogRhythm<br>Log Distribution<br>Services"] -->|"5514, 5515, 5516"| RX["RhythmX"]
    RX -->|"9200"| ES["LogRhythm<br>DX / Indexer"]
    RX -->|"1433"| SQL["LogRhythm<br>SQL Server"]
    RX -->|"389 / 636"| LDAP["LDAP<br>Server"]
    RX -->|"514"| SYS["Syslog<br>Destination"]
    RX -->|"443"| JIRA["Jira / ServiceNow"]
    RX -->|"123"| NTP["NTP Server"]
    ANALYST["Analysts"] -->|"443"| RX

    style LDS fill:#1a237e,stroke:#534bae,color:#fff
    style RX fill:#b71c1c,stroke:#f05545,color:#fff
    style ES fill:#1a237e,stroke:#534bae,color:#fff
    style SQL fill:#1a237e,stroke:#534bae,color:#fff
    style LDAP fill:#4a148c,stroke:#7c43bd,color:#fff
    style SYS fill:#e65100,stroke:#ff9d3f,color:#fff
    style JIRA fill:#00695c,stroke:#4db6ac,color:#fff
    style NTP fill:#6a1b9a,stroke:#ab47bc,color:#fff
    style ANALYST fill:#1b5e20,stroke:#4c8c4a,color:#fff

Inbound Ports

Ports that must be open on the RhythmX server to accept incoming traffic.

Port Protocol Source Purpose
5514 TCP / UDP LogRhythm LDS Windows Event Log ingestion
5515 TCP LogRhythm LDS Linux Sysmon log ingestion
5516 TCP LogRhythm LDS Linux Auditd log ingestion
443 TCP Analyst workstations Web UI and dashboard access (HTTPS)

Outbound Ports

Ports that the RhythmX server must be able to reach on external services.

Port Protocol Destination Purpose
9200 TCP LogRhythm DX / Indexer Elasticsearch queries for threat hunting and analytics
1433 TCP LogRhythm SQL Server Alarm retrieval, case synchronization, actor data
389 TCP LDAP Server User directory sync and entity enrichment
636 TCP LDAP Server (SSL) Secure LDAP connection (if SSL is enabled)
514 TCP / UDP Syslog destination Forwarding structured detections via syslog
443 TCP Jira Cloud / ServiceNow Ticket integration — pushing incidents to external ticketing systems
123 UDP NTP Server Time synchronization — critical for accurate timestamp correlation across log sources

Firewall Rules

If the RhythmX server and LogRhythm components are deployed across different network segments or VLANs, ensure the following rules are applied on all intermediate firewalls between them.

Source Destination Port Protocol Direction Purpose
LogRhythm LDS RhythmX Server 5514 TCP / UDP Inbound Windows log ingestion
LogRhythm LDS RhythmX Server 5515 TCP Inbound Linux Sysmon log ingestion
LogRhythm LDS RhythmX Server 5516 TCP Inbound Linux Auditd log ingestion
Analyst Workstations RhythmX Server 443 TCP Inbound Web UI access (HTTPS)
RhythmX Server LogRhythm DX / Indexer 9200 TCP Outbound Elasticsearch queries
RhythmX Server LogRhythm SQL Server 1433 TCP Outbound Alarm and case sync
RhythmX Server LDAP Server 389 / 636 TCP Outbound User directory sync
RhythmX Server Syslog Destination 514 TCP / UDP Outbound Detection forwarding
RhythmX Server Jira Cloud / ServiceNow 443 TCP Outbound Ticket integration
RhythmX Server NTP Server 123 UDP Outbound Time synchronization

Note: If your environment uses network address translation (NAT) between segments, ensure the translated addresses are reflected in the firewall rules. All connections are initiated by the source listed above — no callback or reverse connections are required.


TLS Requirements

Connection TLS Requirement
Web UI (443) TLS 1.2+ required. RhythmX serves HTTPS with a self-signed or CA-issued certificate.
Jira Cloud (443) TLS 1.2+ — Jira Cloud enforces HTTPS. Ensure the RhythmX server can validate Jira's certificate chain.
ServiceNow (443) TLS 1.2+ — ServiceNow enforces HTTPS. Same certificate chain requirement.
LDAP (636) LDAPS uses TLS. If using port 389, consider upgrading to 636 for encrypted directory queries.
Syslog (514) TCP syslog can optionally use TLS for encrypted log transport. Configure the destination to accept TLS connections if required by your security policy.