netsh Firewall for MongoDB¶
On Windows Server systems, the
netsh program provides
methods for managing the Windows Firewall. These firewall rules make it possible
for administrators to control what hosts can connect to the system,
and limit risk exposure by limiting the hosts that can connect to a
This document outlines basic Windows Firewall configurations. Use these approaches as a starting point for your larger networking organization. For a detailed over view of security practices and risk management for MongoDB, see Security.
Windows Firewall documentation from Microsoft.
Windows Firewall processes rules in an ordered determined by rule type, and parsed in the following order:
Windows Service Hardening
Connection security rules
Authenticated Bypass Rules
By default, the policy in Windows Firewall allows all outbound connections and blocks all incoming connections.
Given the default ports of all
MongoDB processes, you must configure networking rules that permit only
required communication between your application and the appropriate
The configuration changes outlined in this document will create rules which explicitly allow traffic from specific addresses and on specific ports, using a default policy that drops all traffic that is not explicitly allowed.
You can configure the Windows Firewall with using the
netsh command line
tool or through a windows application. On Windows Server 2008 this
application is Windows Firewall With Advanced Security in Administrative Tools.
On previous versions of Windows Server, access the
Windows Firewall application in the System and Security control panel.
The procedures in this document use the
netsh command line tool.
This section contains a number of patterns and examples for
configuring Windows Firewall for use with MongoDB deployments.
If you have configured different ports using the
setting, you will need to modify the rules accordingly.
Traffic to and from
This pattern is applicable to all
mongod.exe instances running
as standalone instances or as part of a replica set.
The goal of this pattern is to explicitly allow traffic to the
mongod.exe instance from the application server.
netsh advfirewall firewall add rule name="Open mongod port 27017" dir=in action=allow protocol=TCP localport=27017
This rule allows all incoming traffic to port
allows the application server to connect to the
Windows Firewall also allows enabling network access for an entire application rather than to a specific port, as in the following example:
netsh advfirewall firewall add rule name="Allowing mongod" dir=in action=allow program=" C:\Program Files\MongoDB\Server\3.2\bin\mongod.exe"
You can allow all access for a
mongos.exe server, with the
netsh advfirewall firewall add rule name="Allowing mongos" dir=in action=allow program=" C:\Program Files\MongoDB\Server\3.2\bin\mongos.exe"
Traffic to and from
mongos.exe instances provide query routing for
sharded clusters. Clients connect to
instances, which behave from the client’s perspective as
mongod.exe instances. In turn, the
connects to all
mongod.exe instances that are components of
the sharded cluster.
Use the same Windows Firewall command to allow traffic to
and from these instances as you would from the
instances that are members of the replica set.
netsh advfirewall firewall add rule name="Open mongod shard port 27018" dir=in action=allow protocol=TCP localport=27018
Traffic to and from a MongoDB Config Server¶
Configuration servers, host the config database that stores metadata
for sharded clusters. Each production cluster has three configuration
servers, initiated using the
option.  Configuration servers listen for connections on port
27019. As a result, add the following Windows Firewall rules to the
config server to allow incoming and outgoing connection on port
27019, for connection to the other config servers.
netsh advfirewall firewall add rule name="Open mongod config svr port 27019" dir=in action=allow protocol=TCP localport=27019
netsh advfirewall firewall add rule name="Open mongod config svr inbound" dir=in action=allow protocol=TCP remoteip=<ip-address> localport=27019
|||You also can run a config server by using the
Traffic to and from a MongoDB Shard Server¶
For shard servers, running as
 Because the default port number is
27018 when running
shardsvr value for the
you must configure the following Windows Firewall rules to allow
traffic to and from each shard:
netsh advfirewall firewall add rule name="Open mongod shardsvr inbound" dir=in action=allow protocol=TCP remoteip=<ip-address> localport=27018 netsh advfirewall firewall add rule name="Open mongod shardsvr outbound" dir=out action=allow protocol=TCP remoteip=<ip-address> localport=27018
<ip-address> specification with the IP address of all
mongod.exe instances. This allows you to permit incoming
and outgoing traffic between all shards including constituent replica
set members to:
Furthermore, shards need to be able make outgoing connections to:
Create a rule that resembles the following, and replace the
<ip-address> with the address of the config servers and the
netsh advfirewall firewall add rule name="Open mongod config svr outbound" dir=out action=allow protocol=TCP remoteip=<ip-address> localport=27018
|||You can also specify the shard server option with the |
|||All shards in a cluster need to be able to communicate with all other shards to facilitate chunk and balancing operations.|
Provide Access For Monitoring Systems¶
If your monitoring system needs access the HTTP interface, insert the following rule to the chain:
netsh advfirewall firewall add rule name="Open mongod HTTP monitoring inbound" dir=in action=allow protocol=TCP remoteip=<ip-address> localport=28017
<ip-address>with the address of the instance that needs access to the HTTP or REST interface. For all deployments, you should restrict access to this port to only the monitoring instance.
netsh advfirewall firewall add rule name="Open mongos HTTP monitoring inbound" dir=in action=allow protocol=TCP remoteip=<ip-address> localport=28018
netsh advfirewall firewall add rule name="Open mongod configsvr HTTP monitoring inbound" dir=in action=allow protocol=TCP remoteip=<ip-address> localport=28019
Manage and Maintain Windows Firewall Configurations¶
This section contains a number of basic operations for managing and
netsh. While you can use the GUI front ends to manage the
Windows Firewall, all core functionality is accessible is
Delete all Windows Firewall Rules¶
To delete the firewall rule allowing
netsh advfirewall firewall delete rule name="Open mongod port 27017" protocol=tcp localport=27017 netsh advfirewall firewall delete rule name="Open mongod shard port 27018" protocol=tcp localport=27018
List All Windows Firewall Rules¶
To return a list of all Windows Firewall rules:
netsh advfirewall firewall show rule name=all
Reset Windows Firewall¶
To reset the Windows Firewall rules:
netsh advfirewall reset
Backup and Restore Windows Firewall Rules¶
To simplify administration of larger collection of systems, you can export or import firewall systems from different servers) rules very easily on Windows:
Export all firewall rules with the following command:
netsh advfirewall export "C:\temp\MongoDBfw.wfw"
"C:\temp\MongoDBfw.wfw" with a path of your choosing. You
can use a command in the following form to import a file created using
netsh advfirewall import "C:\temp\MongoDBfw.wfw"