Skip to content

Networking and Connectivity Requirements

This chapter details the recommended resource configuration, network architecture topology, and access relationships between components for xSpace in actual production environments, providing a reference for system deployment and firewall policy configuration.

1. Resource Specification List

In a typical production environment, the recommended minimum resource configuration is shown in the table below:

Component Name Recommended Specification Operating System Deployment Description
Management Component 3 VMs × 8C/16G/200G openEuler 22.03 Deployed as a K3s container cluster, requires 3 static internal IP addresses.
Access Gateway 1 or more VMs × 4C/8G/100G Ubuntu 22.04.5 Recommended single NIC deployment, each requires 1 static internal IP, with a 1:1 public IP mapping.
Agent Configure cloud desktop specifications and quantity according to business needs Windows/Linux Installed inside each cloud desktop VM, requires pre-installation of Mole/HSRServer/USBRedirect software packages, and pre-configuration of Mole pointing to the management component address.
Client PC / Laptop / Mobile Phone / Tablet / Thin Client Windows, Linux, macOS, Android Requires network connectivity to the management component, access gateway, and cloud desktops.

2. Connectivity Requirements Analysis

  • Management Component Cluster Internal: The 3 management component VMs must maintain Layer 2 network connectivity for internal heartbeat monitoring and data synchronization within the container cluster. The IP address of the master node serves as the service interface address for the entire management component.
  • Southbound Management Interface: All management component nodes must be able to access the API interface address of the underlying IaaS cloud platform (used for desktop creation, power on/off, resource synchronization, etc.).
  • Agent Control Link: The agent (Mole service) inside the cloud desktop needs to be able to access the management component for status reporting, management command acquisition, and version upgrades.
  • Management Backend Access: System administrators and tenant administrators access the management component's TCP 443 port via a browser.
  • Client Access: The client accesses the management component's TCP 44301 port (for login, obtaining desktop lists); the protocol layer directly connects or forwards via the gateway to access the cloud desktop's TCP 15701, TCP&UDP 15702, TCP 5703 ports.

3. Port Access Matrix

xSpace Port Access Matrix

Please configure the allow policy in the firewall or security group according to this table.

3.1 Basic Internal Network Access

Source Object Target Object Destination Port Protocol Function Description
WEB Browser Management Component 443 TCP Web management page access
Management Component IaaS Cloud Platform Depends on the API interface port exposed by the IaaS cloud platform TCP Management component access to IaaS cloud platform
Agent (Mole) Management Component 443, 44332 TCP Agent reporting and version upgrades, etc.
Client (XSC) Management Component 44301 TCP Client API calls
Client (XSC) Cloud Desktop 15701, 15702, 5703 TCP/UDP LAN Scenario: Remote desktop protocol direct connection

3.2 Public Network Access (NAT/Mapping)

If internet access capability needs to be provided, the following public network mappings are required:

Mapping Path (Public -> Internal) Destination Port Protocol Required/Optional
Public IP : 44031 Management Component : 44031 TCP Required: Supports client access from the public network
Public IP : 443 Management Component : 443 TCP Optional: Supports public network access to system console and tenant console, external O&M management
Public IP : 44331 Management Component : 44331 TCP Optional: Supports public network access (only) to tenant console, for scenarios with public network operations
Gateway Public IP : 901/902/903/5000 Gateway Internal : 901/902/903/5000 UDP Required: Carries HSR protocol traffic forwarding

Gateway Deployment Key Points:

The internal network address of the access gateway must be routable to the business internal network address of the cloud desktops it serves, otherwise, clients in an external network environment will fail to connect to the cloud desktops.

The public network mappings for management component ports 44301, 443, and 44331 can share the same public IP with the access gateway, meaning one xSpace system can provide public network access services with a single public IP.

However, it is generally recommended that the management component occupies a separate public IP address, and each access gateway then occupies its own public IP address.

4. Public Network Bandwidth Requirement Assessment

When planning public network egress bandwidth, please estimate using the following model:

  1. Management Traffic Bandwidth: Mainly used for API access and client version package downloads. Recommended to provide a guaranteed bandwidth of 20Mbps ~ 100Mbps.
  2. Protocol Traffic Bandwidth:
    • Calculation Formula: Total Bandwidth = Estimated Concurrency × Average Traffic per Desktop
    • Reference Scenario Indicators:
      • General office/word processing: approx. 1 ~ 2 Mbps
      • HD video/complex web pages: approx. 5 ~ 10 Mbps
      • High-end 3D design/video editing: approx. 20 ~ 30 Mbps
    • Traffic Direction: Daily protocol traffic mainly consists of screen video streams from the cloud desktop, passing through the gateway to the client. From the data center perspective, this is upstream traffic; from the client side, it is download traffic.

To ensure stable business delivery, customers need to apply for independent public IP address resources and sufficient public network bandwidth from their Internet Service Provider (ISP) in advance.