Technical Manual for Network Access Control
WINK Forge Transcoder & Media Router Deployments
This guide provides comprehensive firewall and network configuration requirements for WINK Forge Transcoder and Media Router deployments. Whether you're deploying on-premise hardware appliances or virtual machines, this document covers all network access scenarios including:
For comprehensive product configuration, refer to these companion guides:
Use Case: Physical WINK Forge or Media Router appliance installed in your data center or equipment room.
Network Requirements:
Use Case: WINK Forge or Media Router deployed on VMware, Hyper-V, Proxmox, KVM, or cloud infrastructure (AWS, Azure, GCP).
Network Requirements:
See also: Virtual Appliance Hardware Requirements for complete VM specifications.
Use Case: Hosting streams for public access via HLS/DASH on port 443.
Network Requirements:
Use Case: Cameras on internal LAN, streams distributed both locally and remotely.
Network Requirements:
Port(s) | Protocol | Direction | Purpose | Notes |
---|---|---|---|---|
443 | TCP | Inbound | HTTPS Web Interface & API | Primary management interface |
444 | TCP | Inbound | HTTPS Admin Interface | Secondary admin port |
554 | TCP | Inbound + Outbound | RTSP Camera Input | For connecting to IP cameras |
554 | UDP | Inbound + Outbound | RTSP UDP Transport | Used when TCP transport unavailable |
8554 | TCP | Inbound + Outbound | Alternative RTSP Port | Secondary RTSP port for compatibility |
5000-5999 | UDP | Inbound + Outbound | RTP/RTCP Media Streams | Dynamic ports for RTSP media |
1935 | TCP | Inbound + Outbound | RTMP Streaming | Ingest and delivery |
8000-8016 | TCP | Inbound | Genetec Security Center Integration | VMS integration ports (16 channels) |
8100-8116 | TCP | Inbound | Genetec Security Center Integration | Additional VMS ports (16 channels) |
8200-8216 | TCP | Inbound | Genetec Omnicast Integration | Legacy VMS integration (16 channels) |
8080-8090 | TCP | Inbound | HTTP Stream Output | Alternative HTTP ports for media |
9000 | UDP | Inbound + Outbound | SRT (Secure Reliable Transport) | Configurable, 9000 is default |
123 | UDP | Outbound | NTP Time Synchronization | Critical for licensing and SSL |
When integrating WINK Forge with Genetec Security Center or Omnicast VMS:
Related Guide: See the WINK-Genetec Interface Manual for complete integration setup.
Port(s) | Protocol | Direction | Purpose | Notes |
---|---|---|---|---|
80 | TCP | Inbound + Outbound | HTTP Media Distribution | HLS, DASH, JPEG preview access |
443 | TCP | Inbound + Outbound | HTTPS Media Distribution | Secure HLS, DASH delivery |
88 | TCP | Inbound | HTTP Admin Interface | Deprecated - migrate to port 444 |
444 | TCP | Inbound + Outbound | HTTPS Admin Interface & API | Primary management + API access |
1935 | TCP | Inbound + Outbound | RTMP Publishing & Playback | Ingest from Forge, deliver to clients |
554 | TCP | Inbound + Outbound | RTSP Distribution | RTSP re-streaming |
554 | UDP | Inbound + Outbound | RTSP UDP Transport | Alternative to TCP transport |
8554 | TCP | Inbound + Outbound | Alternative RTSP Port | Secondary RTSP port for compatibility |
1024-32000 | UDP | Inbound + Outbound | RTSP RTP/RTCP Dynamic Ports | Wide range for RTP sessions |
8889 | TCP | Inbound + Outbound | WebRTC (WHIP/WHEP) | Ultra-low latency streaming |
123 | UDP | Outbound | NTP Client | Time synchronization |
25 | TCP | Outbound | SMTP | Email notifications (configurable) |
Port(s) | Protocol | Direction | Purpose | When Required |
---|---|---|---|---|
161 | UDP | Inbound | SNMP Monitoring | If using SNMP-based monitoring |
123 | UDP | Inbound | NTP Server | If device acts as NTP source |
5353 | UDP | Inbound + Outbound | ZeroConf/mDNS Discovery | Auto-discovery on LAN |
8080 | TCP | Inbound | HTTP Media Alt Port | Alternative HTTP media port |
If you need to minimize open ports, this is the bare minimum required configuration:
WINK Forge (Minimal):
Inbound: TCP 443 (HTTPS Web), TCP 444 (HTTPS Admin)
Outbound: TCP 554 (RTSP to cameras), UDP 5000-5999 (RTP), UDP 123 (NTP)
WINK Forge (with Genetec Integration):
Inbound: TCP 443, 444 (HTTPS Admin), TCP 8000-8016 (Genetec)
Outbound: TCP 554 (RTSP to cameras), UDP 5000-5999 (RTP), UDP 123 (NTP)
WINK Media Router (Minimal for HLS-only distribution):
Inbound: TCP 443 (HTTPS Media), TCP 444 (HTTPS Admin), TCP 1935 (RTMP from Forge)
Outbound: UDP 123 (NTP)
IMPORTANT: All WINK Streaming hardware appliances and virtual machines are assigned MAC addresses from WINK Streaming's IETF PEN (Private Enterprise Number) allocation.
MAC Address Pool: 8c:1f:64:37:xx:xx
Critical Requirements:
Licensing Impact:
When deploying WINK virtual machines, the MAC address configuration in your hypervisor software is critical:
Important: If you manually assign a different MAC address or allow the hypervisor to generate a random MAC, the system will fail to license properly.
Troubleshooting MAC-Related Issues:
To verify the MAC address on your WINK system:
8c:1f:64:37
- Network Adapter Type: VMXNET3 (recommended) or E1000E
- Port Group: Standard or Distributed vSwitch
- MAC Address Setting: Set to "Automatic" OR manually enter WINK-assigned MAC (8c:1f:64:37:xx:xx)
- Security: Promiscuous Mode OFF, MAC Changes REJECT, Forged Transmits REJECT
- IMPORTANT: Do not select "Manual" with a different MAC address
- Network Adapter: Synthetic (Generation 2) or Legacy (Generation 1)
- Virtual Switch: External for production traffic
- MAC Address Setting: Set to "Dynamic" (auto-accept) OR "Static" with WINK-assigned MAC (8c:1f:64:37:xx:xx)
- MAC Spoofing: Disabled
- IMPORTANT: If using Static, enter the exact WINK-provided MAC address
- Network Model: VirtIO (best performance) or E1000
- Bridge: vmbr0 or custom bridge to physical NIC
- MAC Address Setting: Leave blank/auto OR manually enter WINK-assigned MAC (8c:1f:64:37:xx:xx)
- Firewall: Can be enabled at Proxmox level or within VM
- IMPORTANT: In Proxmox, edit VM → Hardware → Network Device → MAC Address field
AWS: Security Groups (stateful firewall), ENI configured with WINK MAC or auto-assigned
Azure: Network Security Groups (NSGs), NIC with WINK MAC address configured
GCP: VPC Firewall Rules, ensure MAC address matches WINK assignment (8c:1f:64:37:xx:xx)
Note: Cloud providers may handle MAC addresses differently. Consult WINK support for
cloud-specific deployment guidance to ensure proper MAC address configuration.
Additional Reading: For complete virtual machine specifications including CPU, RAM, and storage requirements, see the Virtual Appliance Hardware Requirements Guide.
If the WINK VM has a guest-level firewall (iptables, firewalld, ufw), ensure the same port rules from Section 3 are applied. Most WINK deployments have firewall disabled at the guest level, relying on hypervisor or network-level firewalls instead.
Scenario: WINK Forge/Media Router and IP cameras are on the same internal network (e.g., 192.168.1.0/24 or 10.0.0.0/8).
Component | Configuration | Firewall Rule |
---|---|---|
WINK Forge | Must be able to reach camera IPs directly | Outbound TCP/UDP 554 to camera subnet |
IP Cameras | RTSP must be enabled, username/password set | Inbound TCP/UDP 554 from WINK Forge IP |
Internal Firewall | If segmented networks, allow WINK → Camera traffic | Allow TCP/UDP 554, UDP 5000-5999 |
RTP Media | Dynamic UDP ports for video/audio data | Outbound UDP 5000-5999 from WINK to cameras |
Your network firewall must allow the following traffic:
Configure these rules on your router, enterprise firewall (Cisco ASA, Palo Alto, Fortinet), or cloud security groups.
Related Guide: For optimal camera placement and mounting angles, see the Camera Mounting & Analytics Guide.
Scenario: WINK Forge is on your LAN, but cameras are at a remote site accessible via the internet or secure tunnel.
Required Firewall Rules (Secure Tunnel Scenario):
Network Gateway Firewall:
- Allow encrypted tunnel traffic between sites
- Allow RTSP traffic through tunnel (TCP/UDP 554)
WINK Forge Firewall:
- Allow outbound to tunnel gateway
- Allow outbound RTSP to remote camera subnet via tunnel
Scenario: Distributing transcoded video to internal and external viewers via HLS, RTSP, RTMP, SRT, etc.
Use Case: Widest compatibility, works in browsers, mobile apps, smart TVs.
Firewall Configuration:
Media Router Firewall:
- ALLOW Inbound TCP 443 from ANY (or specific IP ranges)
- ALLOW Outbound TCP 443 for API callbacks (if used)
Example URL Format:
https://mediarouter.example.com/live/HLS/WMR1-GUID_camera1.m3u8
Client Requirements: Modern web browser, HLS-compatible player (VideoJS, JW Player, native HTML5).
Use Case: VMS integration (Milestone, Genetec, ExacqVision), professional monitoring clients.
Firewall Configuration:
Media Router Firewall:
- ALLOW Inbound TCP 554 from specific VMS server IPs
- ALLOW Inbound UDP 554 if UDP transport is used
- ALLOW Inbound UDP 1024-32000 for RTP media streams
Example URL Format:
rtsp://mediarouter.example.com:554/live/WMR1-GUID_camera1
Use Case: Legacy flash players, OBS Studio ingest, social media restreaming.
Firewall Configuration:
Media Router Firewall:
- ALLOW Inbound TCP 1935 from client IP ranges
- ALLOW Outbound TCP 1935 to upstream services (YouTube, Facebook)
Example URL Format:
rtmp://mediarouter.example.com/live/WMR1-GUID_camera1
Use Case: Low-latency internet streaming with error correction, contribution feeds.
Firewall Configuration:
Media Router Firewall:
- ALLOW Inbound UDP 9000 (or custom port) from specific source IPs
- ALLOW Outbound UDP 9000 for caller mode connections
Example URL Format:
srt://mediarouter.example.com:9000?streamid=camera1&passphrase=secret123
Related Guide: For detailed protocol comparisons and use case recommendations, see Protocol Selection for Long-Distance Streaming.
Use Case: Ultra-low latency browser-based viewing, interactive applications.
Firewall Configuration:
Media Router Firewall:
- ALLOW Inbound TCP 8889 for WHIP/WHEP signaling
- ALLOW Inbound UDP 1024-65535 for ICE/STUN/TURN (ephemeral ports)
- Configure STUN/TURN servers for NAT traversal
Example URL Format:
http://mediarouter.example.com:8889/streamname/whep
Port | Protocol | Direction | Purpose | Priority | Default State |
---|---|---|---|---|---|
80 | TCP | Inbound | HTTP Redirect | Optional | Enabled (redirects to 443) |
123 | UDP | Outbound | NTP Client | Required | Enabled |
443 | TCP | Inbound | HTTPS Web/API | Required | Enabled |
444 | TCP | Inbound | HTTPS Admin | Required | Enabled |
554 | TCP | In/Out | RTSP Camera Input | Required | Enabled |
554 | UDP | In/Out | RTSP UDP Transport | Optional | Enabled |
1935 | TCP | In/Out | RTMP | Optional | Enabled if configured |
5000-5999 | UDP | In/Out | RTP/RTCP | Required | Enabled |
8000-8016 | TCP | Inbound | Genetec Security Center | Optional | Enabled if configured |
8080-8090 | TCP | Inbound | HTTP Streams | Optional | Enabled if configured |
8100-8116 | TCP | Inbound | Genetec Security Center | Optional | Enabled if configured |
8200-8216 | TCP | Inbound | Genetec Omnicast | Optional | Enabled if configured |
8554 | TCP | In/Out | Alternative RTSP | Optional | Enabled if configured |
9000 | UDP | In/Out | SRT | Optional | Enabled if configured |
Port | Protocol | Direction | Purpose | Priority | Default State |
---|---|---|---|---|---|
25 | TCP | Outbound | SMTP Email | Optional | Enabled if configured |
80 | TCP | In/Out | HTTP Media | Required | Enabled |
88 | TCP | Inbound | HTTP Admin (Legacy) | Deprecated | Enabled (will be removed) |
123 | UDP | Inbound | NTP Server | Optional | Disabled |
123 | UDP | Outbound | NTP Client | Required | Enabled |
161 | UDP | Inbound | SNMP | Optional | Disabled |
443 | TCP | In/Out | HTTPS Media | Required | Enabled |
444 | TCP | In/Out | HTTPS Admin/API | Required | Enabled |
554 | TCP | In/Out | RTSP | Required | Enabled |
554 | UDP | In/Out | RTSP UDP | Optional | Enabled |
1024-32000 | UDP | In/Out | RTSP RTP/RTCP | Required | Enabled |
1935 | TCP | In/Out | RTMP | Required | Enabled |
5353 | UDP | In/Out | ZeroConf | Optional | Disabled |
8080 | TCP | Inbound | HTTP Media Alt | Optional | Disabled |
8554 | TCP | In/Out | Alternative RTSP | Optional | Enabled if configured |
8889 | TCP | In/Out | WebRTC WHIP/WHEP | Optional | Enabled if configured |
# Allow Forge to access cameras
Rule 1: ALLOW 192.168.1.50 → 192.168.1.10-20 TCP/UDP 554
Rule 2: ALLOW 192.168.1.50 → 192.168.1.10-20 UDP 5000-5999
# Allow Forge to publish to Media Router
Rule 3: ALLOW 192.168.1.50 → 192.168.1.51 TCP 1935
# Allow public access to Media Router HLS
Rule 4: ALLOW ANY → 192.168.1.51 TCP 443 (port forward from WAN)
# Allow both systems to sync time
Rule 5: ALLOW 192.168.1.50,51 → ANY UDP 123
Many government agencies and transportation departments use WINK systems to share live camera feeds with partner organizations:
State DOT sharing traffic cameras with city/county agencies and media outlets
Police/Fire sharing surveillance feeds during incidents
Citizen-facing portals for public camera access
County sharing with adjacent counties or state agencies
Partner agencies never receive direct camera access. All distribution flows through WINK Media Router acting as a secure proxy layer.
Zone | Source | Destination | Port | Protocol | Purpose |
---|---|---|---|---|---|
Internal | Forge (192.168.1.50) | Cameras (192.168.100.x) | 554 | TCP/UDP | RTSP camera input |
Internal | Forge | Cameras | 5000-5999 | UDP | RTP media streams |
Internal | Forge | Media Router (192.168.1.51) | 1935 | TCP | RTMP publishing |
DMZ | ANY (Internet) | Media Router | 443 | TCP | HTTPS/HLS distribution |
DMZ | Media Router | Internet | 123 | UDP | NTP time sync |
Management | Admin IPs | Forge/Router | 444 | TCP | Admin interface |
For detailed multi-agency sharing implementations and authentication strategies, see:
How it works:
POST /otp/api/ action=create&duration=60
24814928371014572819
https://router.agency.gov/hls/camera1.m3u8?token=24814928371014572819
Firewall Requirements:
Advantages:
How it works:
Playback ACL: 203.0.113.0/24, 198.51.100.50/32
rtsp://router.agency.gov/live/camera1
Firewall Requirements:
Media Router ACL Configuration:
Application: live
Publish ACL: 192.168.1.50/32 (only WINK Forge can publish)
Playback ACL: 203.0.113.0/24, 198.51.100.50/32 (partner IP ranges)
HTTP ACL: 0.0.0.0/0 (public HLS access with OTP)
Advantages:
Disadvantages:
50 cameras × 3 Mbps each × 5 partners = 750 Mbps potential load
Solutions:
1. Per-Partner Bandwidth Limits
2. Protocol Selection by Use Case
VMS Integration: RTSP (low latency, <10 viewers)
Web Portals: HLS (high scalability, unlimited viewers)
Public 511: HLS + CDN (millions of viewers possible)
Media Outlets: RTMP (legacy compatibility)
3. CDN for Public Distribution
4. Network Bonding
For optimal security, consider isolating your camera network from corporate networks. WINK Streaming does not prescribe specific network topologies - your network architecture is your responsibility. However, typical best practices include:
Management Network: Admin access to WINK systems
Camera Network: IP cameras and related infrastructure
Video Infrastructure: WINK Forge/Router systems
Corporate Network: General business systems
Typical Firewall Policy Considerations:
Configure ACLs on Media Router applications:
# Restrict publishing to WINK Forge only
Publish ACL: 192.168.1.50/32
# Restrict playback to internal network
Playback ACL: 192.168.0.0/16
# Public HLS access (no ACL restriction, rely on OTP)
HTTP ACL: 0.0.0.0/0 (with OTP authentication)
For public-facing deployments:
Forge shows "Camera Offline" or "Connection Timeout"
Troubleshooting Steps:
1. Verify Network Connectivity
Use the built-in network diagnostic tools in WINK Forge web interface:
2. Check Firewall Rules
Verify your network firewall configuration:
3. Verify Camera Configuration
4. Check MTU Settings
5. Review Forge Logs
"Video failed to load" or infinite buffering in browser
Troubleshooting Steps:
1. Test Direct Access
From the viewer's computer:
2. Check Media Router Status
In the Media Router web interface:
3. Verify Stream is Active
4. Check NAT/Port Forwarding
5. Browser Developer Tools
This comprehensive guide covers firewall and network configuration for all WINK Forge and Media Router deployment scenarios. Key takeaways:
Expand your knowledge with these related guides:
For additional support, contact:
Document Version: 1.0 | Last Updated: April 2022
Applies To: WINK Forge 2.x, Media Router 1.5.x
© 2022 WINK Streaming. All rights reserved.