Power Operation 2021 Ports
Power Operation 2021 Ports
Which ports are required for a specific installation depends on the Power Monitoring Expert system
configuration and the monitoring devices used.
If Power Operation alarm, trend, report and I/O servers are created using non-default ports, create
those ports exceptions.
Default
Service Description
port
Alarm Server (Citect) 5482 Database port for alarms.
Synchronization between redundant Citect alarm server
Alarm Server (Citect) 2080
components.
Application Server 23103 Web services used by Basic Reports and Live View.
Client (Citect) 2074 Cicode (custom script) debugging.
Client access and/or 5500- Ports used for thick control client and ActiveX web client to
ActiveX web client 5509 communicate to server.
Used by Power Operation components to interact with
CTAPI (Citect) 2073
Citect server processes.
Database 5432 Used to connect to PostreSQL Database Engine.
Synchronization between redundant Power Operation
Event Notification 23104
notification servers.
Page downloads for IDC, Internet Display Server/Client
FTP, IDC 21
communications.
I/O Server (Citect) 2082 Publish and subscribe I/O server communications.
ODBC 20222 Open Database Connnectivity server.
OPC UA 48031 OPC Unified Architecture communication
Report Server (Citect) 2084 Report server communications.
Page 35 of 85 7EN02-0465-00
IT Guide Cybersecurity
Default
Service Description
port
Services for communications with the Service Layer
Platform Server 23201
Platform Server.
Synchronization between redundant Citect trend server
Trends Server (Citect) 2085
communications.
Web HMI application. Access to page and document
Web Server 443
content, diagrams, and all system data.
Services for communications with the Service Layer Pso
Service Layer 23200
Web Service.
Thick Client
7EN02-0465-00 Page 36 of 85
Cybersecurity IT Guide
For information about the ports for Advanced Reporting and Dashboards, see Ports in the Power
Monitoring Expert – IT Guide.
Power Operation supports Windows Active Directory integration, including enforcement of minimal
password complexity, password expiration, role based access control and other password
management strategies.
For cybersecurity purposes, we recommend that you use Windows Active Directory with a strong
password policy.
• Unintentional access could occur, for example assumed inactive accounts could actually be
active.
• The ability to configure some settings may not be available, for example automated password
complexity and expiry.
There are eight levels of user privileges (HMI user partitioning) and HMI user event monitoring
(login/logout, shut down, control).
Power Operation components including Servers, Client Access, and View-only Clients support both
user management using Windows Active Directory groups and local users.
NOTE: Power SCADA Anywhere must be installed on a machine that is part of a Windows
domain.
Page 37 of 85 7EN02-0465-00