Configure TAC Server Infrastructure
Configure TAC Server Infrastructure
Configure TAC Server Infrastructure
DNS No Yes
Some of our customer network scenarios are not falling to proper network profiles
(domain for internal NIC & public for external NIC) that may cause communication
issues when TAC is in array.
TAC will work as an independent server in the network. When it is in the DMZ, it is
possible to leave it as a workgroup computer. Here are some limitations when
using TAC is in the workgroup:
Use system properties to join the TAC server to the domain. The TAC server name
must set before applying the TAC license as changing server name will require the
request of new license key from PortSys.
When the TAC server is behind a firewall or placed in a internal/external DMZ, the
following firewall ports are required to be to open
Workgroup Mode
Outside Access to
Internet TAC Server 443 Portal
Outside Access to
Internet TAC Server 80 Portal
TAC Internal TCP & UDP TAC to AD server
Server subnet 389 lookups
TAC Internal
Server Subnet TCP 3268 LDAP GC
Domain Joined
Protocol /
Source Destination Port Description
TAC AD/GC
Server Server IP TCP 3268 LDAP GC
TAC AD/GC
Server Server IP TCP 636 Secure LDAP
TAC AD/GC
Server Server IP TCP 3269 Secure LDAP GC
SMB,CIFS,SMB2,
DFSN, LSARPC, NbtSS,
TAC AD/DC TCP & UDP NetLogonR, SamR,
Server Server IP 445 SrvSvc
TAC AD/DC
Server Server IP TCP 135 RPC, EPM
TAC AD/DC
Server Server IP TCP 5722 RPC, DFSR (SYSVOL)
TAC AD/Time
Server Server IP UDP 123 Windows Time
DFSN, NetLogon,
TAC AD/DC NetBIOS Datagram
Server Server IP UDP 138 Service
TAC AD/DC
Server Server IP UDP 9389 SOAP
TAC DHCP UDP 67 &
Server Server IP UDP 2535 DHCP, MADCAP
Additional Ports may need to open based on the application published needs.
TAC in Array
* If TAC array nodes are placed behind firewalls following additional ports needs to
open apart to above ports in domain joined
The above ports and ranges should be opened between all servers in the array in
both directions.
Configuring Certificate
TAC requires a publicly resolvable certificate to be installed on the TAC server for
secure communication.
A SSL certificate is required on the TAC server. The certificate must be issued by
public certification authority (CA).
You may need to add multiple certificates for different applications that have
alternate public host names.
Further, you may need to install certificates on endpoints to trust the connectivity
between endpoints and TAC Gateway. If you publish generic client server
application or VPN or RDP application where the TAC client component is involved,
you will need to install trusted system certificate on endpoints.
If you use a self-signed certificate (issued by a custom CA) for the TAC site, the CA
that issued cert has to be added to Trusted Root Certificate Authority under Local
Computer on the end-point in order for the the TAC Client Services to work
properly.
Configuring DNS
The Administrator has to register the TAC Site’s public host name(s) in their public
DNS authority to access the TAC Portal from the internet. If TAC has multiple sites
configured, those sites need to register in the DNS with the respective IPs.