Network Requirements
Connectivity and port mappings for Edison Watch.
Edison Watch acts as a security gateway. Ensure the following connectivity.
Port Mappings
| Port | Protocol | Source | Purpose |
|---|---|---|---|
| 3000 | TCP | User Devices | MCP Gateway (AI tool traffic) |
| 3001 | TCP | User Devices | API Server (Dashboard & Config) |
| 443 | TCP | Internet | Cloud API/Dashboard access |
Connectivity Rules
Inbound (to Edison Server)
- Allow traffic from User Devices to ports
3000and3001. - If using a reverse proxy, expose
443and route internally to3001.
Outbound (from Edison Server)
- To MCP Servers: Access to external APIs (e.g., GitHub, Slack) on
443. - To SIEM: Access to your SIEM endpoint (e.g.,
8088for Splunk). - To Database: Port
5432if using a remote PostgreSQL instance.
Proxy Configuration
Edison Watch respects standard proxy environment variables:
SSL/TLS Requirements
- Minimum: TLS 1.2 or higher.
- Certificates: Supports Let's Encrypt, commercial, or internal CA certificates.
- Internal CAs: If using an internal CA, provide the bundle via
SSL_CERT_FILE.
Health Monitoring
Use these endpoints for load balancer health checks:
| Endpoint | Expected Response |
|---|---|
GET /health | {"status":"healthy"} |
GET /health/ready | {"ready":true} |
Important: MCP traffic relies on WebSockets. Ensure your reverse proxy (Nginx/Caddy) is configured to handle WebSocket upgrades on the /mcp/ path.