Networking Requirements

For My OPSWAT Central Management to successfully provide secure access to protected applications, each of the Gateways and Clients require network access to various Cloud components, as well as to each other. Cloud-based services used by SDP include: STUN (Session Traversal Utilities for NAT), HTTPS APIs, WebSocket APIs, and NTP (Network Time Protocol).

Client

HTTPS APIs

The MetaDefender Endpoint uses HTTPS APIs hosted in the cloud to coordinate connections with My OPSWAT Central Management Gateways. Outgoing traffic should be allowed on port 443/TCP to the following hosts:

STUN Servers

STUN services detect public IP addresses and ports for clients. This is critical for SDP to detect where a user’s device is located and to coordinate it's connection to Gateways. Outgoing traffic should be allowed on port 30000/UDP to the following hosts:

Production VersionAddress
US Production

3.128.173.107

18.116.34.83

3.134.96.213

EU Production

13.48.78.200

13.48.84.113

13.51.158.149

Client-to-Gateway Communication

Client-to-Gateway communication is a crucial part of SDP functioning properly. After initial configurations are obtained from the SDP controller, subsequent communications are between the Client device and the Gateway.

The client will communicate with the Gateway over UDP. The public ports are configurable, but must be forwarded to 30000/UDP and 30001/UDP for each deployed gateway. More information about Gateway port forwards is available in the next section.

Gateway PortDescription
Port 30000/UDPGateways expect to receive most traffic from the Client on port 30000/UDP.
Port 30001/UDPWhen a connection is initializing, the client may need to send a single packet to open the firewall, on port 30001/UDP.

Gateway

HTTPS APIs

The Secure IT Access Gateway uses HTTPS APIs hosted in the cloud to coordinate connections and access for SDP Clients. Outgoing traffic from the Gateway should be allowed on port 443/TCP to the following hosts:

Gateway WebSocket APIs

Secure IT Access Gateways also make use of websockets for bi-directional communication with the SDP Controller. Outgoing traffic from the Gateway should be allowed on port 443/TCP to the following hosts for websocket traffic:

  • wss://gateway-websockets-api-us.sdp.opswat.com | US Environment
  • wss://gateway-websockets-api-eu.sdp.opswat.com | EU Environment

STUN Servers

Secure IT Access Gateways also utilize STUN services to automatically discover public IP addresses for Clients to connect to. To allow this outgoing traffic from the Gateway should be allowed on port 30000/UDP to the following hosts:

Production VersionAddress
US Production

3.128.173.107

18.116.34.83

3.134.96.213

EU Production

13.48.78.200

13.48.84.113

13.51.158.149

Gateway-to-Client Communication

Using STUN services, Gateways and Clients are able to connect through many networks automatically without the need for further configuration. In some cases, however, port-forwards configured in the public firewall may be required to allow Client traffic to successfully reach Gateways. To ensure connectivity, two UDP ports should be forwarded from the public firewall to each Gateway on ports 30000 and 30001. The public ports configured should match the configuration made for each Gateway in the My OPSWAT Central Management console.

Gateway PortDescription
Port 30000/UDPGateways expect to receive most traffic from the Client on port 30000/UDP.
Port 30001/UDPWhen a connection is initializing, the client may need to send a single packet to open the firewall, on port 30001/UDP.

NTP

NTP ensures the system clock of Gateways remains highly accurate. An accurate system clock is required for cryptographic security. Client connections may fail if the Gateway clock and Client clock disagree by more than a few seconds. Traffic should be allowed from Gateways on port 123/UDP to the following pools of public NTP servers (administrators requiring specific addresses for their region can find more information at ntppool.org):

NTPAddress
OVApool.ntp.org
AWS

0.amazon.pool.ntp.org

1.amazon.pool.ntp.org

2.amazon.pool.ntp.org

Azure2.debian.pool.ntp.org

Controller

Network traffic allowed by the administrator for SDP components (Gateway and Client) will prepare the Controller to receive and send information related to new SDP connections and established sessions.

  • HTTPS APIs - The client and gateway will make API calls over HTTPS.
  • Gateway WebSocket APIs - The Controller sends real-time updates to the gateway.
  • STUN Servers - OPSWAT supplies a STUN server to help locate clients and gateways.
  • NTP - OPSWAT relies on public NTP servers to synchronize gateways.
Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard