Firewall Whitelisting
Implementing firewall whitelisting can enhance your network security!
Table of Contents
AutoElevate utilizes various web services to provide the best performance and uptime possible. Below are listed the different services, their hostnames, and IP range resolvers so you can properly whitelist our services to prevent access failures.
The agents, mobile apps, and admin portal services could use any different combination of any of the following endpoints at any time.
If you set granular outbound firewall traffic rules for your client networks, you will need to specifically allow outbound traffic on port 443 to the following endpoints:
Hostnames
Note: These are the static hostnames that any of our apps & services could use at any time.
autoelevate-installers.s3.us-east-2.amazonaws.com
api.autoelevate.com
api-long.autoelevate.com
msp.autoelevate.com
apollo.autoelevate.com
juno.autoelevate.com
mercury.autoelevate.com
voyager.autoelevate.com
orion.autoelevate.com
Note: If your firewall isn't capable of whitelisting the hostnames above, you can whitelist the entire AWS "us-east-1" region. The IPs in use by AutoElevate at any given time are highly dynamic, meaning that the published ranges may cover other IP addresses not currently in use by AutoElevate. This means that it is often not desirable to open up your firewall to the whole of the AWS region for security reasons. If you want to do this regardless, you can find the published IP ranges from AWS here: http://docs.aws.amazon.com/general/latest/gr/aws-ip-ranges.html
Admin Portal External Services
Note: These are services that our Admin Portal front end will need access to to function properly.
api.qrserver.com
firebaseio.com