TOP

AT&T Office@Hand

Learn how to use features from AT&T Office@Hand. Access our self-help options to set up and use this application to communicate with customers.

Back to Product Page
Use the dropdown to get support, or purchase this product

Network Requirements | AT&T Office@Hand
Article #91404

TABLE OF CONTENTS

1. Introduction
2. IP supernets
3. Whitelisting of domains, IP addresses, and ports
     3.1 Common cloud services
     3.2 Endpoints
          3.2.1 AT&T Office@Hand desktop, web, and mobile app
          3.2.2 AT&T Office@Hand Video mobile, desktop, and web application
          3.2.3 AT&T Office@Hand Webinar
          3.2.4 AT&T Office@Hand Video Rooms
          3.2.5 AT&T Office@Hand Video with Room Connector
          3.2.6 AT&T Office@Hand desk, conference, and cordless phones
          3.2.7 AT&T Office@Hand desktop softphone application
          3.2.8 AT&T Office@Hand mobile softphone application
     3.3 AT&T Office@Hand Archiver
     3.4 SIP trunks
     3.5 Communication integration services
4. Domain Name Service (DNS)
5. Network Address Translation (NAT)
6. Security software
7. Quality of Service guidelines
8. VLAN configuration guidelines

1. Introduction

The purpose of this document is to inform enterprises of the network requirements for firewall and web proxy configuration for cloud-based Office@Hand Unified Communication Services to operate correctly.

2. IP supernets

The supernets (concatenated subnets) in Table 2.1 are advertised by the AT&T Office@Hand cloud using the BGP routing protocol to support Unified Communication Services over the internet. These networks can be used to connect to the AT&T Office@Hand cloud over the internet.

Table 2.1 – Advertised IP supernets
66.81.240.0/20
80.81.128.0/20
103.44.68.0/22
104.245.56.0/21
185.23.248.0/22
192.209.24.0/21
199.68.212.0/22
199.255.120.0/22
208.87.40.0/22

Additional requirements apply for enterprises with private connections to the AT&T Office@Hand cloud. Please contact AT&T Office@Hand Support for more information.

To ensure that Office@Hand services operate properly, your enterprise network must accept the supernets at all locations where unified communication services are used.

These supernets must be used by the enterprise network for:

  • Configuring firewall rules for signaling and media ports.
  • Configuring DSCP markings in IP packet headers according to the Quality of Service Guidelines (Section 7).
  • Selectively disabling Layer 7 device functions, such as Deep Packet Inspection for UDP traffic to and from the unified communication cloud (Section 7).

3. Whitelisting of domains, IP addresses, and ports

3.1 Common cloud services

You may need to whitelist the destination ports in Table 3.1.1 for all of your enterprise firewalls and web proxies. Whitelisting these ports allows devices and applications to access supporting cloud services, domain names, and IP addresses.

You should whitelist only the set of services that you need. For example, if you don’t use the Live Reports portal, you need not whitelist the live-officeathand.att.com domain.

You must always whitelist the following domains:

  • The AT&T Office@Hand company website, which provides general information about AT&T and its products, and does not require login.
  • The AT&T Office@Hand Administrator/User Account portal, which authenticates admin and user access to underlying communication and administration services.
  • AT&T Office@Hand discovery service API, which:
    • Allows client applications to dynamically discover the correct .com and .biz API domains before a user logs in.
    • Points to the Login Process service. After the Login service authenticates an admin or user, the Discovery service API uses configured account data to determine the appropriate API domain.
  • Service web portal, which provides access to administration and unified communication services.
  • The Analytics portals, which provide account admins with unified communication service data about the AT&T Office@Hand system. This data can help admins understand the current state of the system, and to troubleshoot certain issues.
  • The Live Reports portals, which provide access to real-time call center performance data.

Note: The Analytics and Live Reports portals may be country-specific to comply with data-locality requirements. If you only access these portals for Canadian accounts, for example, then you need only whitelist these portals’ Canadian domain names.

Table 3.1.1 – Common cloud services
Purpose Application protocol Domain name/IP addresses Destination port
Company website HTTPS www.business.att.com TCP\443
Service status portal HTTPS status-officeathand.att.com TCP\443
Accounts management portal HTTPS accounts-officeathand.att.com TCP\443
Administrator/User account portal HTTPS login-officeathand.att.com TCP\443
Discovery service HTTPS discovery.ringcentral.biz TCP\443
Service web portal HTTPS service-officeathand.att.com TCP\443
Analytics portal HTTPS analytics-officeathand.att.com TCP\443
Live Reports portal HTTPS live-officeathand.att.com TCP\443

 

3.2 Endpoints

This section provides endpoint-specific tables for domain names, supernets, and a range of cloud destination ports for various types of communication services traffic, including media, signaling, and registration traffic.

The AT&T Office@Hand cloud does not initiate any session toward customer endpoints. All sessions are initiated from an endpoint toward AT&T Office@Hand’s cloud communication services.

Please note the following endpoint table guidelines for firewall and web proxy configuration:

    • The endpoint tables do not specify cloud destination ports, since port range is operating-system-dependent, and ports are dynamically selected by the operating system.
    • The tables provide modular sets of requirements for firewall control to support different mixes of AT&T Office@Hand endpoint deployments. They do not necessarily match 1:1 with AT&T Office@Hand product definitions since, for example, AT&T Office@Hand Video can be used with AT&T Office@Hand as well as a stand-alone product. For this reason, a separate table, Table 3.2.2, lists the endpoints for AT&T Office@Hand Video mobile, desktop, and web. This table factors out the specific firewall requirements for video service.
    • In creating your firewall configurations, you need only refer to the tables for the endpoints that you actually use. For example, if you don’t use hardphones, you may ignore the hardphone table.
    • Rows in the port table are generally ordered from highest QoS traffic priority (media) to lowest QoS traffic priority (supporting data service).
    • Different endpoint tables may contain the same domain names or port ranges when they are shared. As well, these duplications in different tables ensure that each endpoint can be deployed independent of other endpoint types. If you deploy multiple endpoints that require the same domain and associated ports to be whitelisted, then you need configure only one whitelist or access rule instance in the firewall.
  • You may use the AT&T Office@Hand mobile app on a mobile operator network or a WiFi network.
    • On a mobile operator network on which traffic only traverses the internet to AT&T Office@Hand communication services, firewall configuration is irrelevant.
  • On an enterprise WiFi network on which you’re configuring a firewall for the Office@Hand mobile app, refer to Table 3.2.1.

3.2.1 AT&T Office@Hand desktop, web, and mobile app

Table 3.2.1 – AT&T Office@Hand desktop, web, and mobile app
Purpose Application protocol Domain name/IP addresses Destination ports
Media/media secured and media access control RTP/SRTP (DTLS) and STUN IP supernets or *.ringcentral.biz UDP\20000-64999 and UDP\19302
Signaling mobile app SIP/TCP IP supernets TCP\5091
Signaling secured mobile app SIP/TLS IP supernets TCP\5097
Signaling secured mobile app SIP/WSS/TLS IP supernets TCP\443
Signaling secured desktop and web app SIP/WSS/DTLS IP supernets TCP\8083
IOVATION SDK for two-factor login HTTPS mpsnare.iesnare.com TCP\443
Application file upload and download HTTPS glip-prod-biz-us-east-1-core-data.s3.amazonaws.com glip-prod-biz-us-east-1-core-data.s3-accelerate.amazonaws.com TCP\443
Log file upload HTTPS www.filestackapi.com TCP\443
Application service API HTTPS *.ringcentral.biz TCP\443
Messaging service API HTTPS glip.ringcentral.biz TCP\443
Presence status, call log notifications, and voicemail notifications HTTPS ringcentral.pubnubapi.com
ringcentral-0.pubnubapi.com
ringcentral-1.pubnubapi.com
ringcentral-2.pubnubapi.com
ringcentral-3.pubnubapi.com
ringcentral-4.pubnubapi.com
ringcentral-5.pubnubapi.com
ringcentral-6.pubnubapi.com
ringcentral-7.pubnubapi.com
ringcentral-8.pubnubapi.com
ringcentral-9.pubnubapi.com
TCP\443
Android application push notifications HTTPS mtalk.google.com TCP\443, 5228, 5229, 5230
iOS application push notifications HTTPS api.push.apple.com TCP\443, 2197, 5223
Messaging content support HTTPS api.giphy.com
media0.giphy.com
media1.giphy.com
media2.giphy.com
media3.giphy.com
media4.giphy.com
TCP\443
Software and provisioning updates HTTPS *.cloudfront.net TCP\443
AT&T Office@Hand video mobile, desktop, and web application Add Table 3.2.2

 

3.2.2 AT&T Office@Hand Video mobile, desktop, and web application

Note:

  • AT&T Office@Hand Video uses the Connect platform API for user authentication and communication session control.
  • The Statistics collector publishes detailed statistics about calls. The Analytics Portal (Table 3.1.1) uses a subset of the data extracted by the statistics collector.
  • You don’t need to whitelist the Office@Hand video web client application if you’re only using the desktop and mobile version of the Office@Hand video app.
  • You should whitelist the network connectivity test application to allow video app users to test their network connections.
Table 3.2.2 – AT&T Office@Hand Video mobile, desktop, and web application
Purpose Application Protocol Domain name/IP addresses Destination Ports
Media Secured SRTP IP supernets or *.v.ringcentral.biz UDP\10000-19999
(default)
TCP\443 (when UDP is not available – should not be used regularly, as it can affect voice quality)
Signaling secured HTTPS/WSS/TLS IP supernets
or *.ringcentral.biz
TCP\443
Web client application HTTPS meetings.officeathand.att.com TCP\443
Parser configuration for meeting link verification for mobile phones HTTPS media.ringcentral.com TCP\443
Connect platform HTTPS api-meet.ringcentral.biz TCP\443
Statistics collector HTTPS edr.ringcentral.biz TCP\443
Presence status, call log notifications, and voicemail notifications HTTPS ringcentral.pubnubapi.com
ringcentral-0.pubnubapi.com
ringcentral-1.pubnubapi.com
ringcentral-2.pubnubapi.com
ringcentral-3.pubnubapi.com
ringcentral-4.pubnubapi.com
ringcentral-5.pubnubapi.com
ringcentral-6.pubnubapi.com
ringcentral-7.pubnubapi.com
ringcentral-8.pubnubapi.com
ringcentral-9.pubnubapi.com
TCP\443
Application configuration HTTPS downloads.ringcentral.biz TCP\443
Application download and update HTTPS app.ringcentral.biz TCP\443
Feature enablement control HTTPS *.launchdarkly.com
app.launchdarkly.com
events.launchdarkly.com
clientstream.launchdarkly.com
mobile.launchdarkly.com
TCP\443
Network connectivity test application – part of Office@Hand video HTTPS rcv.testrtc.com
which uses:
api.nettest.testrtc.com
kong.testrtc.com
*.turn.testrtc.com
*.speed.testrtc.com
TCP\443
UDP\443

 

3.2.3 AT&T Office@Hand Webinar

AT&T Office@Hand Webinar relies on two clients:

  • Webinar host client: Used by a webinar session’s host, cohosts, and panelists.
  • Webinar attendee client: Used only by webinar attendees.

For both clients, apply the whitelistings from Table 3.2.3 when configuring your enterprise firewall.

Note:

  • AT&T Office@Hand Webinar is based on AT&T Office@Hand Video.
  • If you’ve already whitelisted Cloudfront for the AT&T Office@Hand mobile, desktop, and web application (Section 3.2.1), then you need not whitelist it again.
Table 3.2.3 – AT&T Office@Hand Webinar host client and attendee client
Purpose Application protocol Domain name/IP addresses Destination ports
AT&T Office@Hand Video Add Table 3.2.2
Fetch webinar session live streaming media segments HTTPS *.cloudfront.net TCP\443

 

3.2.4 AT&T Office@Hand Video Rooms

Table 3.2.4 – AT&T Office@Hand Video Rooms
Purpose Application protocol Domain name/IP addresses Destination ports
Media secured SRTP IP supernets UDP\10000-19999 (default)
  SRTP IP supernets TCP\443 (if UDP is not available – should not be used regularly, as it affects voice quality)
Signaling secured HTTPS IP supernets TCP\443
SIP registration service HTTPS/TLS *.ringcentral.biz TCP\8085-8090
Rooms host device HTTPS Internal enterprise assigned private IP address (no WAN firewall traversal) TCP\9520-9530
Login portal HTTPS meetings.officeathand.att.com TCP\443
Notifications HTTPS ringcentral.pubnubapi.com
ringcentral-0.pubnubapi.com
ringcentral-1.pubnubapi.com
ringcentral-2.pubnubapi.com
ringcentral-3.pubnubapi.com
ringcentral-4.pubnubapi.com
ringcentral-5.pubnubapi.com
ringcentral-6.pubnubapi.com
ringcentral-7.pubnubapi.com
ringcentral-8.pubnubapi.com
ringcentral-9.pubnubapi.com
TCP\443
Software and provisioning updates HTTPS *.ringcentral.biz TCP\443

 

3.2.5 AT&T Office@Hand Video with Room Connector

You must whitelist the relevant region-independent domain name. Domain names need only be whitelisted when a Room Connector is used in the indicated region.

Table 3.2.5 – AT&T Office@Hand Video with Room Connector
Purpose* Application protocol Domain name/IP addresses Destination ports
Media RTP/SRTP IP supernets UDP\10000-19999
Signaling SIP rcvsip.biz
att.rcvsip.biz
UDP\5060 or
TCP\5060
Signaling secured SIP/TLS rcvsip.biz
att.rcvsip.biz
TCP\5061

* Customer video devices determine whether connectivity is secured or unsecured.

3.2.6 AT&T Office@Hand desk, conference, and cordless phones

  • Some third-party devices, such as the Poly IP7000 speakerphone, do not support signaling or media encryption. Such devices should be avoided in a deployment that requires complete security.
  • No separate ports are specified for Busy Lamp Appearance (BLA), since BLA uses the signaling ports and standard SIP NOTIFY packets.
Table 3.2.6 – AT&T Office@Hand desk, conference and cordless phone
Purpose Application protocol Domain Name/IP addresses Destination ports
Media and media secured RTP/SRTP IP supernets UDP\20000-64999
Signaling SIP IP supernets TCP\5090, TCP\5099**
UDP\5090, UDP\5099**
Signaling secured SIP/TLS IP supernets TCP\5096, TCP\5098**
Network time service NTP ntp1.ringcentral.biz and ntp2.ringcentral.biz
(within the Supernets)
UDP\123
LDAP directory service LDAP cd.ringcentral.biz
(within the supernets)
TCP\636
Poly phones provisioning, firmware Update, and Platform API HTTPS Provisioning:
pp.ringcentral.biz pp-pre.ringcentral.biz
Firmware Update:
pp.s3.ringcentral.biz
pp.fw.ringcentral.biz
Platform API:
pp.api.ringcentral.biz
TCP\443
Cisco phones provisioning and firmware update HTTPS Provisioning:
cp.ringcentral.biz
cp-pre.ringcentral.biz
Firmware Update:
cp.s3.ringcentral.biz
cp.fw.ringcentral.biz
TCP\443
Yealink phones provisioning and firmware update HTTPS Provisioning:
yp.ringcentral.biz
yp-pre.ringcentral.biz
Firmware update:
yp.s3.ringcentral.biz
yp.fw.ringcentral.biz
yp.api.ringcentral.biz
TCP\443
Avaya phones
Provisioning, firmware update and platform API
HTTPS Provisioning:
av.ringcentral.biz
av-pre.ringcentral.biz
Platform API:
avaya.api.ringcentral.biz
TCP\443
Unify phones provisioning, firmware update, and platform API HTTPS Provisioning:
unf.ringcentral.biz
unf-pre.ringcentral.biz
Platform API:
unf.api.ringcentral.biz
Provisoning and Firmware Update: TCP\443
Platform API: TCP\18443
Mitel phones provisioning, firmware update, and platform API HTTPS Provisioning:
mtl.ringcentral.biz
mtl-pre.ringcentral.biz
Firmware Update:
mtl.s3.ringcentral.biz
mtl.fw.ringcentral.biz
Platform API:
mtl.api.ringcentral.biz
TCP\443
SNOM phones provisoning and firmware update HTTPS snm.ringcentral.biz
snm-pre.ringcentral.biz
Firmware Update:
snm.s3.ringcentral.biz
snm.fw.ringcentral.biz
TCP\443

**Ports 5098 and 5099 should be opened for Busy Lamp Appearance only when you’re using line sharing.

3.2.7 AT&T Office@Hand desktop softphone application

Table 3.2.7 – AT&T Office@Hand desktop softphone application
Purpose Application protocol Domain name/IP addresses Destination ports
Media and media secured RTP/SRTP IP supernets UDP\20000-64999
Signaling SIP IP supernets TCP\5091
Signaling secured SIP/TLS IP supernets TCP\5097
Presence status, call log notifications, and voicemail notifications HTTPS ringcentral.pubnubapi.com
ringcentral-0.pubnubapi.com
ringcentral-1.pubnubapi.com
ringcentral-2.pubnubapi.com
ringcentral-3.pubnubapi.com
ringcentral-4.pubnubapi.com
ringcentral-5.pubnubapi.com
ringcentral-6.pubnubapi.com
ringcentral-7.pubnubapi.com
ringcentral-8.pubnubapi.com
ringcentral-9.pubnubapi.com
TCP\443
Software and provisioning updates HTTP/HTTPS *.ringcentral.biz TCP\80
TCP\443
Platform API for user authentication and call features HTTPS api-sp.ringcentral.biz TCP\443
Platform API for media services
(for transferring media files: voice recordings, faxes, transcriptions, profile and contact information)
HTTPS media.ringcentral.biz TCP\443
Google services (contacts and calendar) HTTPS accounts.google.com
www.google.com
www.googleapis.com
TCP\443

 

3.2.8 AT&T Office@Hand mobile softphone application

Table 3.2.8 pertains to the use of the AT&T Office@Hand mobile softphone app on a WiFi network.
one Application (on Wi-Fi Network)

Table 3.2.8 – AT&T Office@Hand mobile softphone application
Purpose Application protocol Domain name/IP addresses Destination ports
Media RTP/SRTP IP supernets UDP\20000-64999
Signaling SIP IP supernets TCP\5091
UDP\5091
Signaling secured SIP/TLS IP supernets TCP\5097
TCP\443
Signaling (IPv6 client) SIP/TLS IP supernets TCP\5090-5098
TCP\443
SIP registration service HTTPS *.ringcentral.biz TCP\443
Application presence status, call log notifications, and voicemail notifications – used in Android, not in iOS HTTPS ringcentral.pubnubapi.com
ringcentral-0.pubnubapi.com
ringcentral-1.pubnubapi.com
ringcentral-2.pubnubapi.com
ringcentral-3.pubnubapi.com
ringcentral-4.pubnubapi.com
ringcentral-5.pubnubapi.com
ringcentral-6.pubnubapi.com
ringcentral-7.pubnubapi.com
ringcentral-8.pubnubapi.com
ringcentral-9.pubnubapi.com
TCP\443
Data synchronization with cloud
(e.g., call log info, presence, and voicemails)
HTTPS api-mob.ringcentral.biz TCP\443
Soft clients software and provisioning updates HTTPS *.cloudfront.net TCP\443

 

3.3 AT&T Office@Hand Archiver

AT&T Office@Hand Archiver is a cloud-side integration that allows administrators to copy call content to a long-term, enterprise-owned repository. Copied content includes recordings, voicemail, fax, and text messages. Archiver ensures that data is retained over a long period of time, and that it meets local data residency and regulatory retention requirements.

Table 3.3.1 – AT&T Office@Hand Archiver
Purpose Application protocol Domain name/IP addresses Destination ports
Content archiving HTTPS For Box, Dropbox, Google Drive, and Smarsh archiving systems TCP\443
(does not traverse enterprise network)
SFTP For archiving to an enterprise SFTP server, the following SFTP client IP addresses must be whitelisted:
3.211.163.136
3.223.170.110
34.225.218.68
34.226.29.169
34.234.210.244
34.236.210.8
34.239.13.99
35.172.123.110
52.87.7.127
54.80.51.95
54.147.91.15
Any of these IP addresses may dynamically be selected by the AT&T Office@Hand SFTP client to connect to an enterprise SFTP server.
TCP\22

 

3.4 SIP trunks

Table 3.4.1 – SIP trunks
Purpose Application protocol IP addresses Destination ports
Media  RTP Public IP addresses to be provided by AT&T Office@Hand during project definition. UDP\1024-65535
Signaling SIP UDP\5060
TCP\5061-5065

 

3.5 Communication integration services

Enterprises can use Office@Hand communication integration services to develop soft-endpoint communication clients.

Table 3.5.1 summarizes the programmatic communication integration services that allow enterprises to build their own soft endpoint clients.

Note:

  • You only need to whitelist the set of services that you use. For example, if you don’t use integration services, you need not whitelist that domain.
  • You must whitelist the Integration service API, which is the foundation API on which all communication integration services rely.
  • You must whitelist the endpoint registration service, which registers all integration services (WebRTC) endpoints with the Office@Hand Cloud Communication Service.
  • The Office@Hand video scheduling service is used to create and manage video meetings.
  • The Microsoft Teams (Slack) integration service integrates Office@Hand services into Teams (Slack).
  • The platform APIs can be used to develop stand-alone applications (such as an outbound dialer), or applications that are embedded into existing business applications.
  • You should whitelist the Stand-alone platform API and Embeddable platform API only if you actually implement applications based on these APIs.
Table 3.5.1 – Communication integration services
Purpose Application protocol Domain name/IP addresses Destination ports
Integration service API HTTPS api-rcapps.ringcentral.biz TCP\443
Endpoint registration service HTTPS sip*.ringcentral.biz TCP\8083
Video scheduling service HTTPS api-meet.ringcentral.biz TCP\443
Microsoft Teams integration service HTTPS teams.ringcentral.biz TCP\443
Slack integration service HTTPS slack.ringcentral.biz TCP\443
Stand-alone platform API HTTPS platform.ringcentral.biz TCP\443
Embeddable platform API HTTPS platform.ringcentral.biz TCP\443

 

4. Domain Name Service (DNS)

To function properly, all endpoints and services require internet-based DNS. For instance, endpoints rely on a DNS service to resolve the provisioning service domain name (e.g., pp.ringcentral.biz).

If you use private DNS, it must perform forward-lookups to internet-based DNS.

5. Network Address Translation (NAT)

Network Address Translation/Port Address Translation functionality (generically referred to as NAT) is applied at the border between two networks to translate between address spaces, or to prevent the collision of IP address spaces.

You must configure a minimum NAT timeout to ensure proper operation of hardphones:

  • Cisco phones send a follow-up REGISTER refresh message every four minutes.
  • Poly phones re-register every five minutes. For these phones, you must set NAT entry expiration timeout to greater than five minutes.

6. Security software

You may need to configure your cloud-based security software (network firewalls and web proxies) to whitelist the domains listed in this document’s tables.

7. Quality of Service guidelines

You must follow the Quality of Service guidelines to ensure the proper prioritization of your traffic. Otherwise, either or both parties may experience intermittent issues with call control or media quality.

8. VLAN configuration guidelines

You must follow VLAN configuration guidelines to ensure that VLANs are properly configured for hardphones (section 3.2.6).