githubEdit

Firewall & Security

Configure allowed domains and manage access to Whereby services

circle-check
Service
Source
Destination port
Protocol

browser-device

443

TCP

Whereby TURN relay (TCP/TLS)

browser-device

443

TCP

Whereby TURN relay (UDP)

browser-device

443

UDP

browser-device

1024-65535

UDP

circle-exclamation

Domain Whitelisting (HTTPS/WSS + TURN over TCP/TLS)

If your firewall or proxy supports domain-based rules, you can use the domains below as an allowlist for HTTPS/WSS signaling and TURN over TCP/TLS on port 443. These flows use TLS and typically include hostname information that proxies/firewalls can evaluate.

  • *.sfu.whereby.com

  • *.sfu.svc.whereby.com

  • *.srv.whereby.com

  • *.svc.whereby.com

  • *.appearin.net

  • *.turn.whereby.com

  • *.turn.svc.whereby.com

  • *.posthog.com

  • *.sentry.io

  • *.helpscout.net

  • *.amazonaws.net (for user avatars)

  • *.cloudfront.net

circle-exclamation

IP Whitelisting

Whereby servers don't currently have a static range of IP addresses. We can provide a list of current server IPs to our annual an enterprise customers upon request. Partner with your dedicated Success Manager or Solutions Engineer to obtain relevant information for your clients and discuss eligibility.

Additional Info

Signaling (wss)

Control messages between the clients and Whereby servers when in a call ("signaling") is transmitted over secure websockets (wss). These utilize the same ports as HTTPS, but will set up persistent two-way connections. Proxies and firewalls that intercept HTTPS traffic should be configured to allow websocket traffic towards these hosts/domains:

  • *.sfu.whereby.com

  • *.sfu.svc.whereby.com

  • *.srv.whereby.com

  • *.svc.whereby.com

  • *.appearin.net

circle-info

Because signaling uses WSS (TLS over TCP/443), domain-based allowlisting is typically sufficient here (firewalls or proxies can evaluate the destination hostname for this traffic).

TURN/SFU (media)

In order to transmit video and audio, participants must be allowed to send and receive packets containing media content. The optimal path for these packets is directly between participants, but where this is not possible or allowed Whereby provides a network of TURN servers that act as relays.

These servers are placed across the globe and participants will connect to the closest ones. Participants will connect to port 443 on these servers, using either UDP or TCP (TLS). For call quality and experience, UDP is the preferred protocol.

Firewall note for ICE / UDP media

For ICE media (especially over UDP), many firewalls cannot validate the destination by FQDN/DNS because the traffic is not HTTP and typically does not carry a hostname that can be used as a trust anchor. In practice, this means you must allow outbound UDP to the relevant ports and the resolved IP addresses of our TURN/SFU infrastructure (or allow broader UDP egress on those ports).

The TURN servers are identified by the following hostname patterns:

  • *.turn.whereby.com

  • *.turn.svc.whereby.com

  • turnserver.appearin.net

circle-exclamation

Last updated

Was this helpful?