mirror of
https://github.com/jetkvm/kvm.git
synced 2026-03-02 22:58:00 -05:00
Firewall ports not documented or known #270
Labels
No labels
component/keyboard-layout
component: cloud
component: device screen
component: extensions
component: hid/keyboard
component: hid/mouse
component: network
component: timesync
component: ui
component: updater
component: usb
component: usb/hid
component: usb/storage
component: video
component: webrtc
component: webserver
need-more-details
status: working-in-progress
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/kvm#270
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @discotimetraveler on GitHub (May 15, 2025).
Originally assigned to: @ym on GitHub.
When attempting to isolate KetJVM to a management network/VLAN, the ports to connect to JetKVM are unknown and not documented. This is not related to public internet connectivity.
There is some discussion of this in issue #84 that is linked from the Troubleshooting documentation. But that thread is full of browser issues, OS issues, Internet issues, etc.
This issue is very simple. What ports are required to connect from the browser to the JetKVM and get video working locally? 80/443 are not enough. 80/443 & STUN (3478) are not enough. 80/443 and a huge block of 49152-65535 (as mentioned in issue #84) is almost enough but not quite right, as well as having a huge dynamic port range is very security unfriendly.
If this device requires a massive dynamic port range, and that is seemingly solved "publicly" with Cloudflare and whatever is happening with STUN/TURN as documented here https://jetkvm.com/docs/networking/remote-access, this is not helpful on a local network with firewall segmentation. Not only is this common in Home Lab setups, it's in every Enterprise network everywhere. Having clearly defined and ideally minimal port range known and documented is mandatory.
@sint-sol2023 commented on GitHub (May 19, 2025):
A bump for this issue. I received two JetKVMs last week and must say that the product has a very slick look, is easy to set up, and quite user friendly. However, this device must be isolated from the client network and made accessible on an isolated VLAN which can be reached only via a VPN. This VLAN is not per se a secure place and is set up to allow only a minimum range of ports to reach the machines there. My first idea was allow only the http port 80, but no was as it only allows to see and pass the login page while the whole feature set of the KVM is then not working - USB, video, web console, virtual media are all grayed out.
A solution for now will have to be to remove all restrictions for this devices or to move it to yet another VLAN both of which are not exactly optimal. When I check open sockets I get following output:
If we ignore dropbear, then there are still quite a few TCP and UDP ports and the port 80 is just a tip of an iceberg. Current documentation has yet no information on isolating and securing a JetKVM device on a network. I understand that the product is still fairly new, wildly popular among home labbers, but starts to spill over to SME. Therefore, quite few people would appreciate more documentation/information on this topic.
Thank you once a gain for a great product and software stack and looking forward to more info.
@maxmeyer commented on GitHub (May 19, 2025):
I second the request for a more complete documentation about firewall ports.
@baarcher commented on GitHub (May 19, 2025):
Bump - Until this is published for me JetKVM is a just a (very cool) paperweight. In a Zero trust environment knowing what flows are required is critical and should be published as a matter of course.
@ym commented on GitHub (Jul 11, 2025):
Currently, Pion uses the full range of ephemeral UDP ports (1024–65535), covering nearly all available UDP ports. We’re planning to introduce a feature that allows users to override this setting and specify a smaller port range.
In the meantime, it may be advisable to permit all outgoing UDP ports to ensure full functionality.
Additionally, many cloud-based features rely on dynamic IP ranges. To ensure proper operation, such as with STUN or JetKVM Cloud, you may need to allow all IP ranges from Cloudflare.
@J0E6469 commented on GitHub (Nov 3, 2025):
Any update on this?
@purepani commented on GitHub (Dec 26, 2025):
This is important to me as well.