Egress and Ingress communication for firewalls
If you are using a firewall or any other method to filter egress communication, please ensure that the following addresses are allowed for outbound communication. This is necessary to operate the in-cluster components.
All communication should be routed through or directed to port 443 for secure HTTPS communication.
Service | DNS | IPv4 | IPv6 |
|---|---|---|---|
ARMO Platform (default data-center in EU) | api.armosec.io | Please refer to https://www.cloudflare.com/ips/ | N/A |
ARMO Platform (US data-center) | cloud-report.us.armosec.io | Please refer to https://www.cloudflare.com/ips/ | N/A |
Grype (vulnerabilities scanning) | grype.anchore.io | 172.67.15.216 | 2606:4700:10::6816:4bd7 |
GitHub (policies download) | raw.githubusercontent.com | 140.82.121.4 | 2606:50c0:8000::154 |
For Ingress traffic please ensure the following addresses are allowed for inbound communication
| Service | DNS | IPv4 | IPv6 |
|---|---|---|---|
| ARMO Platform | 51.20.176.90 | N/A | |
| ARMO US Platform | 52.15.140.116 | N/A |
Updated 15 days ago
