Skip to main content

Port and Path Enforcement Status

1. Overview

The ColorTokens Xshield platform enforces microsegmentation by controlling two fundamental network exposure surfaces:

  • Ports – Listening services on hosts that can receive traffic.
  • Paths – Communication flows between source and destination hosts over specific ports and protocols.

Xshield tracks the real-time state and enforcement readiness of these elements through two indicators:

  • Status – Indicates the current enforced behavior.
  • Candidate Status – Indicates the recommended future enforcement based on templates or behavior analysis.

This document describes how these statuses are interpreted and used during test and enforcement phases.


2. Key Concepts

Ports

Ports represent listening services on a host (e.g., TCP 3389 for RDP). In enforcement:

  • Open ports can be unrestricted, restricted by template, or path-restricted.
  • Enforcement applies policies to control which sources are allowed to connect.

Paths

Paths represent communications between groups of assets over a particular port and protocol (e.g., Admin Workstation → App Server on port 3389).

  • A path is not a raw TCP connection but a logical abstraction of traffic from source group to destination group.
  • Paths are classified as inbound or outbound, depending on traffic direction from the asset's perspective.

3. Enforcement Modes

ModeDescription
Unsecure ModeNo policies are applied. All ports and paths are allowed.
Secure-Test ModePolicies are proposed but not enforced. Traffic is allowed, and violations are logged.
Secure ModeEnforced mode. Only reviewed and approved paths/ports are allowed. Others are denied by policy.

4. Port Enforcement States

Status (Actual Enforcement)

UI LabelDescription
Allow IntranetPort is allowed only from trusted internal sources.
Allow AnyPort is accessible from any source.
Path RestrictedPort is only allowed on explicitly reviewed paths.
Denied By TemplatePort is blocked based on assigned template policy.

Candidate Status (Recommendation)

UI LabelDescription
Allow Intranet By TemplateProposed allow based on a rule restricting access to internal sources.
Allow Any By TemplateProposed allow from any source, based on template.
Allow Any By ProgressiveInferred from behavior analysis. Recommends allowing external access.
Path Restricted By TemplateSuggested limited usage—requires review at path level.

5. Path Enforcement States

Candidate Status (Pre-Enforcement Recommendation)

UI LabelDescription
AllowedPath is reviewed and trusted.
Allowed By TemplateProposed allow per applied template rule.
Denied By TemplateProposed deny based on template.
Allowed ProgressiveSuggested allow based on observed behavior. Requires validation.

Status (Secure-Test and Secure Mode)

UI LabelDescription
AllowedPath is fully reviewed and traffic is permitted.
Allowed By TemplatePath is allowed based on matched policy template.
Denied By TemplatePath is denied due to a template rule.
Allowed TestPath is in test mode. Traffic allowed, no violations observed.
Allowed Test Denied ViolationPath is in test mode. Traffic allowed, but policy violation observed (e.g., external access when only intranet was allowed).
Allowed ProgressiveBehavior-based approval. Admin accepted traffic as valid.
Allowed Progressive TestBehavior-based test mode. Traffic observed but pending admin validation.

6. State Transition Diagram

                   ┌───────────────────────────────────────────────┐
│ Unreviewed State │
└────────────────────────────┘

┌──────────────────────────────────────────────┐
│ Candidate Status Assigned │
│ (e.g., By Template or Progressive) │
└──────────────────────────────────────────────┘


Secure-Test Mode
(Candidate Status drives logic)
┌─────────────────────────────────────────┐
│ Allowed Test Allowed Test Denied Violation │
│ Allowed Progressive Test Allowed Progressive │


Secure Mode
(Candidate ignored, Status enforced)

┌────────────────────────────────────────┐
│ Final Status = Allowed │
│ or Denied By Template │
└────────────────────────────────────────┘

7. Operational Checklist for Port/Path Enforcement

TaskDescriptionWhen
✅ Review Candidate StatusCheck paths/ports flagged as "By Template" or "Progressive"During Secure-Test Mode
✅ Validate BehaviorConfirm that observed communications align with expected application behaviorDuring path analysis
✅ Mark as ReviewedApprove or override the proposed candidate statusBefore switching to Secure Mode
✅ Check ViolationsMonitor "Allowed Test Denied Violation" paths in violation dashboardRegularly during testing
✅ Apply TemplatesEnsure policy templates are assigned and reflect desired controlsAt setup and during reviews
✅ Confirm Enforcement ReadinessSwitch to Secure Mode only after reviewing all critical paths and portsBefore go-live enforcement

8. Mapping States to Xshield UI

ComponentUI SectionWhat to Look For
Port StatusAsset > Port ViewShows current enforcement (e.g., "Allow Intranet")
Port Candidate StatusAsset > Port View > Details PanelShows proposed action (e.g., "Allow Any By Template")
Path StatusAsset > Communication MapView each connection’s current enforcement
Path Candidate StatusCommunication Map > Path DetailsShows behavior/template-based suggestions
ViolationsEnforcement > Violations DashboardLists "Test Denied Violation" paths
TemplatesPolicy > TemplatesRules defining port/path candidate statuses
Policy SimulationEnforcement > Test Mode SummaryAggregates candidate status and observed behavior across tenant

9. Conclusion

Xshield provides an intuitive yet powerful way to manage and secure host communications through progressive port/path controls. By understanding and acting on status and candidate status, operators can safely transition from visibility to enforcement, ensuring Zero Trust policies are applied without service disruption.

This document should be used as a reference when:

  • Reviewing microsegmentation readiness
  • Investigating unexpected communication behavior
  • Preparing for full enforcement rollouts