Firewall Exceptions European AWS Cloud
The ESChat client requires specific network routes to communicate between the host device (such as a smartphone or computer running the client) and the remote servers. We continue to push our architecture and deployment model forward to improve security and redundancy for our customers. If you currently have firewall rules in place, the following tables outline existing and new rules that are required to support our newest servers and our disaster recovery instances. All ports are outbound only. Please enter all information as listed in the tables. We do not control IP ranges required by third party providers. While most third party vendors will accept IP addresses, Google Maps requires the DNS name: https://maps.googleapis.com/
If your device has a firewall enabled or is on a network that operates behind a firewall, such as many corporate wired and WiFi networks, it may be blocking connectivity to our server and/or audio from passing through. If you experience problems or need assistance changing the settings of your firewall, please contact your IT staff.
This document is specific to AWS European cloud deployments:
We require a 12 min TCP port registration timer and a 1 min UDP port registration timer.
ESChat requires various ports to be opened for both outbound traffic and inbound response (as requested from the client) to the IP addresses. The signaling port and data port range are specific to each customer's build.
1. ESChat requires various ports to be opened for outbound traffic to 4 IP addresses, as listed below.
The signaling port and data port range are specific to each customer's build. New IPs are shown in Bold. Please contact Support to obtain your specific port(s) if you do not know them.
Description | IP Address | Port(s) | Type |
ESChat Provisioning server | Primary: 54.215.171.160 Disaster Recovery: | 80 & 443 | TCP |
ESChat Signaling Port | 35.158.170.102 18.197.30.85 | To determine your signaling port, go to the Administrative Portal and view your customer profile. You'll see your TCP Signaling Port. | TCP |
ESChat Data Ports | 35.158.170.102 18.197.30.85 | Port thru Port + 8 | UDP |
2. AWS requires 2 ports be opened for outbound traffic for outbound traffic to various IP ranges due to the Elastic Load Balancer (ELB).
You can find more documentation on AWS IP Ranges here: http://docs.aws.amazon.com/general/latest/gr/aws-ip-ranges.html
A real time JSON file that lists all AWS IP ranges by region and availability zone here: https://ip-ranges.amazonaws.com/ip-ranges.json
Description | IP Ranges | Port(s) | Type |
AWS ELB for ESChat server | 18.153.0.0/16 18.184.0.0/15 18.194.0.0/15 18.196.0.0/15 3.120.0.0/14 3.124.0.0/14 35.156.0.0/14 52.28.0.0/16 52.29.0.0/16 52.46.184.0/22 52.57.0.0/16 52.58.0.0/15 52.94.248.112/28 52.95.248.0/24 52.95.255.128/28 54.93.0.0/16 | 80 & 443 | TCP |
3. Apple requires 2 ports be opened for outbound traffic to the IP range below for the APNS Push Notifications.
Description | IP Range | Port(s) | Type |
Apple APNS (iOS Only) | 17.0.0.0/8 | 80 & 5223 | TCP |
4. Google requires a port be opened for outbound traffic to the DNS names below.
Description | DNS Name | Port | Type |
Client Mapping Tiles | maps.googleapis.com | 80 | TCP |