Firewall rules and ports for the Pexip Service
This article describes the firewall rules and port requirements for the Pexip Service. It covers:
- Recommended general firewall rules
- Video network readiness evaluation
- Safelisting domains: firewall, proxies and group policy
- Web proxies and the Pexip web app
- SIP calling port ranges for devices not registered to the Pexip Service network
- Inbound H.323 calling port ranges for devices not registered to the Pexip Service network
The current set of recommended general firewall rules for the Pexip Service are listed at https://pexip.me/test/firewall. Note that port 389 is a secure LDAP connection (StartTLS).
Please note that the firewall changes announced in December 2020 have now been implemented August 2021 — please see Alignment of firewall addresses on the Pexip Service for details.
The Activate Endpoint app can be used to check the suitability of your network environment for registering your endpoint to the Pexip Service. The test evaluates whether your network supports the Pexip services, verifies that no firewalls will block the service, identifies any issues and explains how to resolve them. You can save the report and forward it to your IT administrator.
Here's more information on testing your network for suitability with the Pexip Service.
In certain network environments, Pexip Service domains may need to be safelisted in the group policy, web proxy or filtering corporate firewalls to allow traffic to pass without interference.
The following domains are required for the baseline Pexip Service (SIP / Pexip app / Edge services).
- *.videxio.net (mpg.videxio.net & static.videxio.net)
Administrators are also advised to keep the below rule to enable URL redirects:
Some web proxies may not support WebSocket (wss://) connections and break the connection to the Pexip servers. Please check vendor documentation to confirm the support status for the hardware/software versions. In these scenarios we recommend that you allow traffic to bypass the proxy inspection for the above domains.
Further Pexip app or SIP domains may be required for customers who are using a partner's white-labeled service. If you are unsure, please contact your account manager at your local certified Pexip Partner for more information.
The following domains are required for Skype for Business:
- ms.videxio.com (for calling to Premium subscription endpoints from Skype for Business)
See Skype for Business requirements for use with Pexip VMRs for more information on Skype for Business as an on premises deployments.
Companies with strict group policies may prevent the download of any application through web browsers. In this instance administrators need to package these applications into their enterprise software deployments.
Alternatively they can safelist the Pexip download domain:
- download.vmr.vc (and/or a specific file or sub directory)
The Pexip Service uses standards-based WebRTC and the framework given by Google for the Pexip web app. This framework is designed to work through web proxies using secure HTTPS (443) tunneling.
By default a web proxy will only forward HTTP data and does not understand how to handle outbound media in WebRTC (i.e. TCP/UDP STUN/TURN or other real-time communication (RTC) media). Therefore, the only way to send WebRTC media through a proxy is to do HTTPS tunneling, i.e. 443 tunneling where the browser opens a secure SSL channel. This allows the browser to send WebRTC media and in most cases to bypass the proxy, as the proxy will think this is normal HTTP traffic and not try to interpret the secure HTTPS packets.
Some proxies might be set up to "break" the SSL layer (MitM, e.g. the Burp proxy). It can reject communications as the TURN request is not understood as an HTTP request. If this is the case, we cannot make changes on the Pexip side, however, the customer can in some cases make the Pexip Service (or location) trusted and have the traffic pass through.
Proxy authentication protocols:
- Basic: supported
- Digest, NTLM, Negotiate and Keberos authentication are not supported.
If the client site cannot traverse or bypass the proxy, the only other option is to open up the firewall with the current SIP & UDP port ranges. This is also the only way to get non-browser based clients, such as Cisco, Polycom and other standard SIP endpoints to communicate through the firewall as these require STUN/TURN/ICE firewalls and are unable to use web proxies for traversal firewalls.
The service supports calling to and from SIP video systems that are not registered to the service network. This includes calls to and from video systems registered to other call control systems such as Pexip Infinity, Cisco Expressway, Cisco VCS, and Cisco Unified Communications Manager.
When your endpoints are hosted on your own SBC / call control system, the Pexip Service calling network requires connectivity to the IP/port announced by the SBC. This will be the public-facing leg of your SBC and normally port TCP/5061 for SIP TLS signaling (or TCP/5060 for SIP TCP).
In addition, the Pexip Service calling network needs to reach your SBC on the UDP media ports announced by your SBC (for example 36000-59999 on a Cisco VCS).
Outbound SIP calls from the service require DNS records and IP connectivity from the Pexip service calling network to the SBC or video gateway host and port that the service learns from resolving the called domain's DNS records. In practice this requires either TCP/5061 or TCP/5060 or both to be accessible from the Pexip Service calling network. Additionally, the entire UDP media port range configured locally on the SBC or video gateway also needs to be open from the Pexip Service calling network.
Inbound SIP calls to the service also require the same IP connectivity between the service calling network and SBC or video gateway that originated the inbound call to the service. In practice this requires either TCP/5061 or TCP/5060 or both to be accessible from the service calling network. Additionally, the SBC or video gateway's locally configured media port range also needs to be open from the service calling network.
Inbound calls to the service may work only briefly if the IP address and SIP signaling port (TCP/5061 or 5060) of the SBC or video gateway is not reachable from the service calling network. These problematic calls fail when the service attempts to refresh the SIP session but is not able to reach the IP address and SIP signaling port announced by the SBC or video gateway in the preceding SIP dialog.
Content sharing problems may also be observed for both inbound and outbound SIP calls to the service if the SBC or video gateway's entire UDP media port range is not open to the service calling network. SIP content video streams are negotiated via BFCP, and result in a unidirectional stream. This is in contrast to standard bidirectional audio and main video streams. The unidirectional nature of these content sharing streams can be problematic if the required firewall rules are not in place. So if a SIP video system is registered to a third-party call control and is not receiving content being shared from the service, but audio and video are working bidirectionally, it may be the SBC or video gateway's locally configured UDP media port range is not open from the service calling network.
For security policies that limit IP addresses, for the latest list of IP ranges used by the service network, refer to the firewall rules.section of the page in our
The service supports calling to rooms and subscribers from H.323 devices that are not registered to the service network. It supports inbound URI (Annex O) and IP address dialing.
Some dialing examples include:
- Direct IP dialing to the IVR at 22.214.171.124 or email@example.com and then entering the conference ID via DTMF to join a Virtual Meeting Room (VMR)
- 126.96.36.199##<conferenceID> for example: 188.8.131.52##87654321
- <conferenceID>@184.108.40.206 for example: firstname.lastname@example.org
- <conferenceID>@vmr.vc for example: email@example.com
- Video URI addresses for users or VMRs, for example: firstname.lastname@example.org or email@example.com
The service network uses multiple gatekeepers within our PoPs for H.323 call processing. These gatekeepers use different port ranges from the endpoints and soft clients that are registered directly to the service.
- To properly route calls geographically to the closest PoP we use some gatekeepers solely for signaling purposes (H.225/Q.931) and other gatekeepers for both signaling and media (H.245, RTP).
- H.323 Application Layer Gateways (ALG) should be disabled on edge firewalls, routing and switching as they can negatively interfere with the processing of calls in and out of the network.
- For H.323 devices that do not have static firewall rules configured on inbound ports, we cannot guarantee that signaling and media during calls will perform as expected.
These ports are used by the service network’s H.323 gatekeepers:
- H.323 call signaling port: 1720 TCP
- H.245 signaling: 33000 to 39999 TCP
- Media port range: 11050 to 39999 UDP
For security policies that limit IP addresses, for the latest list of IP ranges used by the service network, refer to the firewall rules.section of the tables in our page of