Firewall Exceptions for Canada AWS (5.x) Cloud
This document is specific to AWS Canada cloud 5.x) deployments.
Portal: https://ca-portal.sla-ptt.com/portal/
We require a 12 min TCP port registration timer and a 1 min UDP port registration timer.
The ESChat client requires specific network routes to communicate between the host device (such as a smartphone or computer running the client) and the remote servers.
We continue to push our architecture and deployment model forward to improve security and redundancy for our customers. If you have firewall rules in place, the following tables outline the current rules required to support our newest servers and our disaster recovery instances. All ports are outbound only.
Please enter all information as listed in the tables. We do not control IP ranges required by third party providers. While most third party vendors will accept IP addresses, Google Maps requires the DNS (Domain Name System): https://maps.googleapis.com/
If your device has a firewall enabled or is on a network that operates behind a firewall, like many corporate wired and WiFi networks, it may be blocking connectivity to our server and/or audio from passing through. If you experience problems or need assistance changing the settings of your firewall, please contact your IT staff.
ESChat requires various ports to be opened for both outbound traffic and inbound response (as requested from the client) to the IP addresses listed below (including the Disaster Recovery addresses). The signaling port and data port range are specific to each customer's build.
Description | IP Addresses | Port(s) | Type |
ESChat Provisioning Server |
Primary: 54.215.171.160 54.219.138.108 52.61.94.106 3.31.151.6 3.31.160.231 18.252.168.182 18.253.93.42 18.254.200.140 Disaster Recovery: 35.153.48.78 |
80 & 443 | TCP |
ESChat Signaling Port |
35.183.162.161 35.183.194.99 35.182.64.40 |
To determine your signaling port, go to the admin portal and view the TCP Signaling Port in the customer profile. |
TCP |
ESChat Data Port |
35.183.162.161 35.183.194.99 35.182.64.40 |
4201-4264 | UDP |
AWS requires two ports to be opened for outbound traffic to various IP ranges due to the Network Load Balancer (NLB)
Description | IP Addresses | Port(s) | Type |
AWS NLB for ESChat |
15.222.97.140
35.182.185.133 3.99.93.19
|
80 & 443 | TCP |
Apple requires 2 ports be opened for outbound traffic to the IP range below for the APNS Push Notifications.
Description | IP Range | Port(s) | Type |
Apple APNS (iOS Only) | 12.0.0.0/8 | 80 & 5223 | TCP |
Description | DNS Name | Port(s) | Type |
Client Mapping Tiles |
maps.googleapis.com fonts.gstatic.com |
80 & 443 | TCP |