Skip to main content

Port and Path Enforcement Status

Overview

The ColorTokens Xshield platform enforces microsegmentation by controlling two fundamental network exposure surfaces:

  • Ports – Listening services on hosts that can receive traffic.
  • Paths – Communication flows between source and destination hosts over specific ports and protocols.

Xshield tracks the real-time state and enforcement readiness of these elements through two indicators:

  • Current port/path policy – Shows the enforcement state of the port or path that is currently active on the asset.
  • Future port/path policy – Shows the upcoming enforceemnt state of the port or path based on the applied templates.

This document describes how these statuses are interpreted and used during test and enforcement phases.


Key Concepts

Ports

Ports represent listening services on a host (e.g., TCP 3389 for RDP). In enforcement:

  • Open ports can be unrestricted, restricted by template, or path-restricted.
  • Enforcement applies policies to control which ports are Allowed or Blocked to accept traffic..

Paths

Paths represent communications between groups of assets over a particular port and protocol (e.g., Admin Workstation → App Server on port 3389).

  • A path is not a raw TCP connection but a logical abstraction of traffic from a source group to a destination group.
  • Paths are classified as inbound or outbound, depending on the direction of traffic from the asset's perspective.

Policy Types

Xshield applies policies at two different levels to control how traffic flows to and from an asset. Each type serves a distinct purpose within the Port Level Zero Trust framework.

1. Port Policy

Port Policies provide fine-grained control by defining explicit rules for specific ports. These policies determine whether individual ports should allow traffic, restrict it to specific paths, or block it entirely.

Port Policies always take priority over Asset Policies, ensuring that critical or sensitive ports can be tightly controlled regardless of the asset’s broader security posture.

PolicyDescription
DeniedAll traffic is denied using port policy
Restricted to pathsOnly paths mentioned in policy are allowed
Allow Intranet onlyOnly Intranet traffic is allowed
Allow AllAll traffic is allowed using port policy

2. Asset Policy

Asset Policies act as a fallback rule for all ports not covered by a Port Policy. They establish the default level of access for the asset’s remaining ports, defining whether they are fully open, restricted based on past activity, or locked down according to Zero Trust principles.

This ensures that even ports without explicit Port Policies still have a clear and consistent security baseline.

Asset PolicyDescription
Zero TrustThis strict mode blocks all ports unless explicitly permitted, aligning with the Zero Trust principle of 'never trust, always verify' and significantly reducing the attack surface.
Allow Active PortsPorts that have been used in the last 30 days stay open to prevent disruptions to active services.
Allow Open PortsExisting open ports remain accessible during deployment, ensuring uninterrupted communication between applications.
Allow AllAll ports are open by default, allowing traffic to flow while administrators refine security rules. Caution should be exercised, as this may expose vulnerabilities.
info

How Port Policy and Asset Policy Work Together

Port Policies and Asset Policies complement each other to provide complete coverage:

  • Port Policies take precedence — if a specific port has a defined Port Policy, that policy is always applied first.
  • Asset Policies fill the gaps — any port that does not have a Port Policy will follow the Asset Policy for its enforcement behavior.

This layered approach ensures that organizations can apply strict, precise control where needed (specific ports) while maintaining a consistent default security posture for the rest of the asset.


Deployment Modes

Deployment Mode defines how a rule behaves when applied to an asset or port — whether it only monitors traffic (Test mode) or actively blocks unauthorized traffic (Enforce mode).

Xshield deploys microsegmentation policies to the Asset(s) in the below modes:

ModeDescription
TestTraffic which is not allowed by a rule is logged as violation without blocking
EnforceTraffic that does not match an allowed rule is blocked. All blocked traffic is recorded as blocked communication attempt

Port and Path Enforcement States

Port and Path Enforcement States describe how Xshield handles traffic for a given port or communication path.

Each state indicates whether traffic is allowed, restricted, or denied based on the applied Port Policies and Asset Policies. These states help determine how strictly a port is controlled and what level of access is permitted.

The below table illustrates the enforcement states for every port/path:

StatusDescription
Allow All (System)All traffic is allowed by system default rules
Denied (Port Policy)All traffic is denied using port policy
Restrict to allowed paths (Port Policy)Only paths mentioned in policy are allowed
Allow Intranet only (Port Policy)Only Intranet traffic is allowed
Allow all (Port Policy)All traffic is allowed using port policy
Allow All (Asset Policy)All traffic is allowed by asset policy (Allow all, Allow open, Allow active)
Denied (Asset Policy)All traffic is denied by asset policy (Zero trust)
UnreviewedNo policy
Allow intranet only (Port Policy)Only Intranet traffic is allowed
Default Allow (Asset Policy)All ports are open by default, allowing traffic to flow while administrators refine security rules. Caution should be exercised, as this may expose vulnerabilities.
Allowed By TestAsset and port policies are currently deployed in test

Asset Security States

Asset Security States indicate the overall security posture of an asset based on how its port and asset policies are deployed.

These states show whether the asset is fully protected, partially protected, or still in a testing phase. They help administrators understand how much of the asset’s attack surface/blast radius is currently governed by enforced Zero Trust policies versus what remains unprotected or under evaluation.

StateDescription
UnsecureNo policies are deployed
Partially SecureOnly individual port policies are deployed; asset-level policy is not deployed
Secure TestPort policies may be deployed; asset-level policy is under test
Secure*Asset level policy is in enforce mode; some port policies may still be under test
SecureBoth asset and port policies are in enforce mode

State Transition Diagram

                    ┌──────────────────────┐
│ Unreviewed │
(Initial asset state)
└───────────┬──────────┘


┌──────────────────────┐
│ Reviewed │
(Asset analyzed;
│ ready for testing)
└───────────┬──────────┘


┌──────────────────────┐
│ Test │
(Violations logged, │
│ no blocks enforced)
└───────────┬──────────┘


┌──────────────────────┐
│ Enforce │
(Policies active;
│ violations blocked)
└──────────────────────┘

Operational Checklist for Port/Path Deployment

TaskDescriptionWhen
✅ Review future policy StatusCheck paths/ports flagged as "By Template" orDuring Partially Secure, Secure Test and Secure* Mode
✅ Validate BehaviorConfirm that observed communications aligns with expected application behaviorDuring path analysis
✅ Mark as ReviewedApprove or override the proposed future policy statusBefore switching to Secure Mode
✅ Check ViolationsMonitor "Allowed Test Denied Violation" paths in violation dashboardRegularly during testing
✅ Apply TemplatesEnsure policy templates are assigned and reflect desired controlsAt setup and during reviews
✅ Confirm Enforcement ReadinessSwitch to Secure Mode only after reviewing all critical paths and portsBefore go-live enforcement

Viewing States in Xshield UI

ComponentUI SectionWhat to Look For
Current Port PolicyAsset > Port ViewShows current enforcement (e.g., "Allow Intranet")
Future Port PolicyAsset > Port ViewShows proposed action (e.g., "Allow Any By Template")
Current Path PolicyAsset > Path ViewView each connection’s current enforcement
Future Path PolicyAsset > Path ViewShows behavior/template-based suggestions
ViolationsNetwork Data > Future port/path policyLists "Test Denied Violation" paths
TemplatesTemplatesRules defining port/path candidate statuses
Policy SimulationEnforcement > TestAggregates candidate status and observed behavior across tenant

Conclusion

Xshield provides an intuitive yet powerful way to manage and secure host communications through progressive port/path controls. By understanding and acting on status and Future port/path policy, operators can safely transition from visibility to enforcement, ensuring Zero Trust policies are applied without service disruption.

This document should be used as a reference when:

  • Reviewing microsegmentation readiness
  • Investigating unexpected communication behavior
  • Preparing for full enforcement rollouts