Network Requirements | AT&T Office@Hand
Article #91404
TABLE OF CONTENTS
1. Introduction
2. IP supernets
3. Whitelisting of domains, IP addresses, and ports
3.1 Common cloud services
3.2 Endpoints
3.2.1 AT&T Office@Hand desktop, web, and mobile app
3.2.2 AT&T Office@Hand Video mobile, desktop, and web application
3.2.3 AT&T Office@Hand Webinar
3.2.4 AT&T Office@Hand Video Rooms
3.2.5 AT&T Office@Hand Video with Room Connector
3.2.6 AT&T Office@Hand desk, conference, and cordless phones
3.2.7 AT&T Office@Hand desktop softphone application
3.2.8 AT&T Office@Hand mobile softphone application
3.3 AT&T Office@Hand Archiver
3.4 SIP trunks
3.5 Communication integration services
4. Domain Name Service (DNS)
5. Network Address Translation (NAT)
6. Security software
7. Quality of Service guidelines
8. VLAN configuration guidelines
1. Introduction
The purpose of this document is to inform enterprises of the network requirements for firewall and web proxy configuration for cloud-based Office@Hand Unified Communication Services to operate correctly.
2. IP supernets
The supernets (concatenated subnets) in Table 2.1 are advertised by the AT&T Office@Hand cloud using the BGP routing protocol to support Unified Communication Services over the internet. These networks can be used to connect to the AT&T Office@Hand cloud over the internet.
Table 2.1 – Advertised IP supernets |
66.81.240.0/20
80.81.128.0/20
103.44.68.0/22
104.245.56.0/21
185.23.248.0/22
192.209.24.0/21
199.68.212.0/22
199.255.120.0/22
208.87.40.0/22 |
Additional requirements apply for enterprises with private connections to the AT&T Office@Hand cloud. Please contact AT&T Office@Hand Support for more information.
To ensure that Office@Hand services operate properly, your enterprise network must accept the supernets at all locations where unified communication services are used.
These supernets must be used by the enterprise network for:
- Configuring firewall rules for signaling and media ports.
- Configuring DSCP markings in IP packet headers according to the Quality of Service Guidelines (Section 7).
- Selectively disabling Layer 7 device functions, such as Deep Packet Inspection for UDP traffic to and from the unified communication cloud (Section 7).
3. Whitelisting of domains, IP addresses, and ports
3.1 Common cloud services
You may need to whitelist the destination ports in Table 3.1.1 for all of your enterprise firewalls and web proxies. Whitelisting these ports allows devices and applications to access supporting cloud services, domain names, and IP addresses.
You should whitelist only the set of services that you need. For example, if you don’t use the Live Reports portal, you need not whitelist the live-officeathand.att.com domain.
You must always whitelist the following domains:
- The AT&T Office@Hand company website, which provides general information about AT&T and its products, and does not require login.
- The AT&T Office@Hand Administrator/User Account portal, which authenticates admin and user access to underlying communication and administration services.
- AT&T Office@Hand discovery service API, which:
- Allows client applications to dynamically discover the correct .com and .biz API domains before a user logs in.
- Points to the Login Process service. After the Login service authenticates an admin or user, the Discovery service API uses configured account data to determine the appropriate API domain.
- Service web portal, which provides access to administration and unified communication services.
- The Analytics portals, which provide account admins with unified communication service data about the AT&T Office@Hand system. This data can help admins understand the current state of the system, and to troubleshoot certain issues.
- The Live Reports portals, which provide access to real-time call center performance data.
Note: The Analytics and Live Reports portals may be country-specific to comply with data-locality requirements. If you only access these portals for Canadian accounts, for example, then you need only whitelist these portals’ Canadian domain names.
Table 3.1.1 – Common cloud services |
Purpose |
Application protocol |
Domain name/IP addresses |
Destination port |
Company website |
HTTPS |
www.business.att.com |
TCP\443 |
Service status portal |
HTTPS |
status-officeathand.att.com |
TCP\443 |
Accounts management portal |
HTTPS |
accounts-officeathand.att.com |
TCP\443 |
Administrator/User account portal |
HTTPS |
login-officeathand.att.com |
TCP\443 |
Discovery service |
HTTPS |
discovery.ringcentral.biz |
TCP\443 |
Service web portal |
HTTPS |
service-officeathand.att.com |
TCP\443 |
Analytics portal |
HTTPS |
analytics-officeathand.att.com |
TCP\443 |
Live Reports portal |
HTTPS |
live-officeathand.att.com |
TCP\443 |
3.2 Endpoints
This section provides endpoint-specific tables for domain names, supernets, and a range of cloud destination ports for various types of communication services traffic, including media, signaling, and registration traffic.
The AT&T Office@Hand cloud does not initiate any session toward customer endpoints. All sessions are initiated from an endpoint toward AT&T Office@Hand’s cloud communication services.
Please note the following endpoint table guidelines for firewall and web proxy configuration:
-
- The endpoint tables do not specify cloud destination ports, since port range is operating-system-dependent, and ports are dynamically selected by the operating system.
- The tables provide modular sets of requirements for firewall control to support different mixes of AT&T Office@Hand endpoint deployments. They do not necessarily match 1:1 with AT&T Office@Hand product definitions since, for example, AT&T Office@Hand Video can be used with AT&T Office@Hand as well as a stand-alone product. For this reason, a separate table, Table 3.2.2, lists the endpoints for AT&T Office@Hand Video mobile, desktop, and web. This table factors out the specific firewall requirements for video service.
- In creating your firewall configurations, you need only refer to the tables for the endpoints that you actually use. For example, if you don’t use hardphones, you may ignore the hardphone table.
- Rows in the port table are generally ordered from highest QoS traffic priority (media) to lowest QoS traffic priority (supporting data service).
- Different endpoint tables may contain the same domain names or port ranges when they are shared. As well, these duplications in different tables ensure that each endpoint can be deployed independent of other endpoint types. If you deploy multiple endpoints that require the same domain and associated ports to be whitelisted, then you need configure only one whitelist or access rule instance in the firewall.
- You may use the AT&T Office@Hand mobile app on a mobile operator network or a WiFi network.
- On a mobile operator network on which traffic only traverses the internet to AT&T Office@Hand communication services, firewall configuration is irrelevant.
- On an enterprise WiFi network on which you’re configuring a firewall for the Office@Hand mobile app, refer to Table 3.2.1.
3.2.1 AT&T Office@Hand desktop, web, and mobile app
Table 3.2.1 – AT&T Office@Hand desktop, web, and mobile app |
Purpose |
Application protocol |
Domain name/IP addresses |
Destination ports |
Media/media secured and media access control |
RTP/SRTP (DTLS) and STUN |
IP supernets or *.ringcentral.biz |
UDP\20000-64999 and UDP\19302 |
Signaling mobile app |
SIP/TCP |
IP supernets |
TCP\5091 |
Signaling secured mobile app |
SIP/TLS |
IP supernets |
TCP\5097 |
Signaling secured mobile app |
SIP/WSS/TLS |
IP supernets |
TCP\443 |
Signaling secured desktop and web app |
SIP/WSS/DTLS |
IP supernets |
TCP\8083 |
IOVATION SDK for two-factor login |
HTTPS |
mpsnare.iesnare.com |
TCP\443 |
Application file upload and download |
HTTPS |
glip-prod-biz-us-east-1-core-data.s3.amazonaws.com glip-prod-biz-us-east-1-core-data.s3-accelerate.amazonaws.com |
TCP\443 |
Log file upload |
HTTPS |
www.filestackapi.com |
TCP\443 |
Application service API |
HTTPS |
*.ringcentral.biz |
TCP\443 |
Messaging service API |
HTTPS |
glip.ringcentral.biz |
TCP\443 |
Presence status, call log notifications, and voicemail notifications |
HTTPS |
ringcentral.pubnubapi.com
ringcentral-0.pubnubapi.com
ringcentral-1.pubnubapi.com
ringcentral-2.pubnubapi.com
ringcentral-3.pubnubapi.com
ringcentral-4.pubnubapi.com
ringcentral-5.pubnubapi.com
ringcentral-6.pubnubapi.com
ringcentral-7.pubnubapi.com
ringcentral-8.pubnubapi.com
ringcentral-9.pubnubapi.com |
TCP\443 |
Android application push notifications |
HTTPS |
mtalk.google.com |
TCP\443, 5228, 5229, 5230 |
iOS application push notifications |
HTTPS |
api.push.apple.com |
TCP\443, 2197, 5223 |
Messaging content support |
HTTPS |
api.giphy.com
media0.giphy.com
media1.giphy.com
media2.giphy.com
media3.giphy.com
media4.giphy.com |
TCP\443 |
Software and provisioning updates |
HTTPS |
*.cloudfront.net |
TCP\443 |
AT&T Office@Hand video mobile, desktop, and web application |
Add Table 3.2.2 |
3.2.2 AT&T Office@Hand Video mobile, desktop, and web application
Note:
- AT&T Office@Hand Video uses the Connect platform API for user authentication and communication session control.
- The Statistics collector publishes detailed statistics about calls. The Analytics Portal (Table 3.1.1) uses a subset of the data extracted by the statistics collector.
- You don’t need to whitelist the Office@Hand video web client application if you’re only using the desktop and mobile version of the Office@Hand video app.
- You should whitelist the network connectivity test application to allow video app users to test their network connections.
Table 3.2.2 – AT&T Office@Hand Video mobile, desktop, and web application |
Purpose |
Application Protocol |
Domain name/IP addresses |
Destination Ports |
Media Secured |
SRTP |
IP supernets or *.v.ringcentral.biz |
UDP\10000-19999
(default) |
TCP\443 (when UDP is not available – should not be used regularly, as it can affect voice quality) |
Signaling secured |
HTTPS/WSS/TLS |
IP supernets
or *.ringcentral.biz |
TCP\443 |
Web client application |
HTTPS |
meetings.officeathand.att.com |
TCP\443 |
Parser configuration for meeting link verification for mobile phones |
HTTPS |
media.ringcentral.com |
TCP\443 |
Connect platform |
HTTPS |
api-meet.ringcentral.biz |
TCP\443 |
Statistics collector |
HTTPS |
edr.ringcentral.biz |
TCP\443 |
Presence status, call log notifications, and voicemail notifications |
HTTPS |
ringcentral.pubnubapi.com
ringcentral-0.pubnubapi.com
ringcentral-1.pubnubapi.com
ringcentral-2.pubnubapi.com
ringcentral-3.pubnubapi.com
ringcentral-4.pubnubapi.com
ringcentral-5.pubnubapi.com
ringcentral-6.pubnubapi.com
ringcentral-7.pubnubapi.com
ringcentral-8.pubnubapi.com
ringcentral-9.pubnubapi.com |
TCP\443 |
Application configuration |
HTTPS |
downloads.ringcentral.biz |
TCP\443 |
Application download and update |
HTTPS |
app.ringcentral.biz |
TCP\443 |
Feature enablement control |
HTTPS |
*.launchdarkly.com
app.launchdarkly.com
events.launchdarkly.com
clientstream.launchdarkly.com
mobile.launchdarkly.com |
TCP\443 |
Network connectivity test application – part of Office@Hand video |
HTTPS |
rcv.testrtc.com
which uses:
api.nettest.testrtc.com
kong.testrtc.com
*.turn.testrtc.com
*.speed.testrtc.com |
TCP\443
UDP\443 |
3.2.3 AT&T Office@Hand Webinar
AT&T Office@Hand Webinar relies on two clients:
- Webinar host client: Used by a webinar session’s host, cohosts, and panelists.
- Webinar attendee client: Used only by webinar attendees.
For both clients, apply the whitelistings from Table 3.2.3 when configuring your enterprise firewall.
Note:
- AT&T Office@Hand Webinar is based on AT&T Office@Hand Video.
- If you’ve already whitelisted Cloudfront for the AT&T Office@Hand mobile, desktop, and web application (Section 3.2.1), then you need not whitelist it again.
Table 3.2.3 – AT&T Office@Hand Webinar host client and attendee client |
Purpose |
Application protocol |
Domain name/IP addresses |
Destination ports |
AT&T Office@Hand Video |
Add Table 3.2.2 |
Fetch webinar session live streaming media segments |
HTTPS |
*.cloudfront.net |
TCP\443 |
3.2.4 AT&T Office@Hand Video Rooms
Table 3.2.4 – AT&T Office@Hand Video Rooms |
Purpose |
Application protocol |
Domain name/IP addresses |
Destination ports |
Media secured |
SRTP |
IP supernets |
UDP\10000-19999 (default) |
|
SRTP |
IP supernets |
TCP\443 (if UDP is not available – should not be used regularly, as it affects voice quality) |
Signaling secured |
HTTPS |
IP supernets |
TCP\443 |
SIP registration service |
HTTPS/TLS |
*.ringcentral.biz |
TCP\8085-8090 |
Rooms host device |
HTTPS |
Internal enterprise assigned private IP address (no WAN firewall traversal) |
TCP\9520-9530 |
Login portal |
HTTPS |
meetings.officeathand.att.com |
TCP\443 |
Notifications |
HTTPS |
ringcentral.pubnubapi.com
ringcentral-0.pubnubapi.com
ringcentral-1.pubnubapi.com
ringcentral-2.pubnubapi.com
ringcentral-3.pubnubapi.com
ringcentral-4.pubnubapi.com
ringcentral-5.pubnubapi.com
ringcentral-6.pubnubapi.com
ringcentral-7.pubnubapi.com
ringcentral-8.pubnubapi.com
ringcentral-9.pubnubapi.com |
TCP\443 |
Software and provisioning updates |
HTTPS |
*.ringcentral.biz |
TCP\443 |
3.2.5 AT&T Office@Hand Video with Room Connector
You must whitelist the relevant region-independent domain name. Domain names need only be whitelisted when a Room Connector is used in the indicated region.
Table 3.2.5 – AT&T Office@Hand Video with Room Connector |
Purpose* |
Application protocol |
Domain name/IP addresses |
Destination ports |
Media |
RTP/SRTP |
IP supernets |
UDP\10000-19999 |
Signaling |
SIP |
rcvsip.biz
att.rcvsip.biz |
UDP\5060 or
TCP\5060 |
Signaling secured |
SIP/TLS |
rcvsip.biz
att.rcvsip.biz |
TCP\5061 |
* Customer video devices determine whether connectivity is secured or unsecured.
3.2.6 AT&T Office@Hand desk, conference, and cordless phones
- Some third-party devices, such as the Poly IP7000 speakerphone, do not support signaling or media encryption. Such devices should be avoided in a deployment that requires complete security.
- No separate ports are specified for Busy Lamp Appearance (BLA), since BLA uses the signaling ports and standard SIP NOTIFY packets.
Table 3.2.6 – AT&T Office@Hand desk, conference and cordless phone |
Purpose |
Application protocol |
Domain Name/IP addresses |
Destination ports |
Media and media secured |
RTP/SRTP |
IP supernets |
UDP\20000-64999 |
Signaling |
SIP |
IP supernets |
TCP\5090, TCP\5099**
UDP\5090, UDP\5099** |
Signaling secured |
SIP/TLS |
IP supernets |
TCP\5096, TCP\5098** |
Network time service |
NTP |
ntp1.ringcentral.biz and ntp2.ringcentral.biz
(within the Supernets) |
UDP\123 |
LDAP directory service |
LDAP |
cd.ringcentral.biz
(within the supernets) |
TCP\636 |
Poly phones provisioning, firmware Update, and Platform API |
HTTPS |
Provisioning:
pp.ringcentral.biz pp-pre.ringcentral.biz
Firmware Update:
pp.s3.ringcentral.biz
pp.fw.ringcentral.biz
Platform API:
pp.api.ringcentral.biz |
TCP\443 |
Cisco phones provisioning and firmware update |
HTTPS |
Provisioning:
cp.ringcentral.biz
cp-pre.ringcentral.biz
Firmware Update:
cp.s3.ringcentral.biz
cp.fw.ringcentral.biz |
TCP\443 |
Yealink phones provisioning and firmware update |
HTTPS |
Provisioning:
yp.ringcentral.biz
yp-pre.ringcentral.biz
Firmware update:
yp.s3.ringcentral.biz
yp.fw.ringcentral.biz
yp.api.ringcentral.biz |
TCP\443 |
Avaya phones
Provisioning, firmware update and platform API |
HTTPS |
Provisioning:
av.ringcentral.biz
av-pre.ringcentral.biz
Platform API:
avaya.api.ringcentral.biz |
TCP\443 |
Unify phones provisioning, firmware update, and platform API |
HTTPS |
Provisioning:
unf.ringcentral.biz
unf-pre.ringcentral.biz
Platform API:
unf.api.ringcentral.biz |
Provisoning and Firmware Update: TCP\443
Platform API: TCP\18443 |
Mitel phones provisioning, firmware update, and platform API |
HTTPS |
Provisioning:
mtl.ringcentral.biz
mtl-pre.ringcentral.biz
Firmware Update:
mtl.s3.ringcentral.biz
mtl.fw.ringcentral.biz
Platform API:
mtl.api.ringcentral.biz |
TCP\443 |
SNOM phones provisoning and firmware update |
HTTPS |
snm.ringcentral.biz
snm-pre.ringcentral.biz
Firmware Update:
snm.s3.ringcentral.biz
snm.fw.ringcentral.biz |
TCP\443 |
**Ports 5098 and 5099 should be opened for Busy Lamp Appearance only when you’re using line sharing.
3.2.7 AT&T Office@Hand desktop softphone application
Table 3.2.7 – AT&T Office@Hand desktop softphone application |
Purpose |
Application protocol |
Domain name/IP addresses |
Destination ports |
Media and media secured |
RTP/SRTP |
IP supernets |
UDP\20000-64999 |
Signaling |
SIP |
IP supernets |
TCP\5091 |
Signaling secured |
SIP/TLS |
IP supernets |
TCP\5097 |
Presence status, call log notifications, and voicemail notifications |
HTTPS |
ringcentral.pubnubapi.com
ringcentral-0.pubnubapi.com
ringcentral-1.pubnubapi.com
ringcentral-2.pubnubapi.com
ringcentral-3.pubnubapi.com
ringcentral-4.pubnubapi.com
ringcentral-5.pubnubapi.com
ringcentral-6.pubnubapi.com
ringcentral-7.pubnubapi.com
ringcentral-8.pubnubapi.com
ringcentral-9.pubnubapi.com |
TCP\443 |
Software and provisioning updates |
HTTP/HTTPS |
*.ringcentral.biz |
TCP\80
TCP\443 |
Platform API for user authentication and call features |
HTTPS |
api-sp.ringcentral.biz |
TCP\443 |
Platform API for media services
(for transferring media files: voice recordings, faxes, transcriptions, profile and contact information) |
HTTPS |
media.ringcentral.biz |
TCP\443 |
Google services (contacts and calendar) |
HTTPS |
accounts.google.com
www.google.com
www.googleapis.com |
TCP\443 |
3.2.8 AT&T Office@Hand mobile softphone application
Table 3.2.8 pertains to the use of the AT&T Office@Hand mobile softphone app on a WiFi network.
one Application (on Wi-Fi Network)
Table 3.2.8 – AT&T Office@Hand mobile softphone application |
Purpose |
Application protocol |
Domain name/IP addresses |
Destination ports |
Media |
RTP/SRTP |
IP supernets |
UDP\20000-64999 |
Signaling |
SIP |
IP supernets |
TCP\5091
UDP\5091 |
Signaling secured |
SIP/TLS |
IP supernets |
TCP\5097
TCP\443 |
Signaling (IPv6 client) |
SIP/TLS |
IP supernets |
TCP\5090-5098
TCP\443 |
SIP registration service |
HTTPS |
*.ringcentral.biz |
TCP\443 |
Application presence status, call log notifications, and voicemail notifications – used in Android, not in iOS |
HTTPS |
ringcentral.pubnubapi.com
ringcentral-0.pubnubapi.com
ringcentral-1.pubnubapi.com
ringcentral-2.pubnubapi.com
ringcentral-3.pubnubapi.com
ringcentral-4.pubnubapi.com
ringcentral-5.pubnubapi.com
ringcentral-6.pubnubapi.com
ringcentral-7.pubnubapi.com
ringcentral-8.pubnubapi.com
ringcentral-9.pubnubapi.com |
TCP\443 |
Data synchronization with cloud
(e.g., call log info, presence, and voicemails) |
HTTPS |
api-mob.ringcentral.biz |
TCP\443 |
Soft clients software and provisioning updates |
HTTPS |
*.cloudfront.net |
TCP\443 |
3.3 AT&T Office@Hand Archiver
AT&T Office@Hand Archiver is a cloud-side integration that allows administrators to copy call content to a long-term, enterprise-owned repository. Copied content includes recordings, voicemail, fax, and text messages. Archiver ensures that data is retained over a long period of time, and that it meets local data residency and regulatory retention requirements.
Table 3.3.1 – AT&T Office@Hand Archiver |
Purpose |
Application protocol |
Domain name/IP addresses |
Destination ports |
Content archiving |
HTTPS |
For Box, Dropbox, Google Drive, and Smarsh archiving systems |
TCP\443
(does not traverse enterprise network) |
SFTP |
For archiving to an enterprise SFTP server, the following SFTP client IP addresses must be whitelisted:
3.211.163.136
3.223.170.110
34.225.218.68
34.226.29.169
34.234.210.244
34.236.210.8
34.239.13.99
35.172.123.110
52.87.7.127
54.80.51.95
54.147.91.15
Any of these IP addresses may dynamically be selected by the AT&T Office@Hand SFTP client to connect to an enterprise SFTP server. |
TCP\22 |
3.4 SIP trunks
Table 3.4.1 – SIP trunks |
Purpose |
Application protocol |
IP addresses |
Destination ports |
Media |
RTP |
Public IP addresses to be provided by AT&T Office@Hand during project definition. |
UDP\1024-65535 |
Signaling |
SIP |
UDP\5060
TCP\5061-5065 |
3.5 Communication integration services
Enterprises can use Office@Hand communication integration services to develop soft-endpoint communication clients.
Table 3.5.1 summarizes the programmatic communication integration services that allow enterprises to build their own soft endpoint clients.
Note:
- You only need to whitelist the set of services that you use. For example, if you don’t use integration services, you need not whitelist that domain.
- You must whitelist the Integration service API, which is the foundation API on which all communication integration services rely.
- You must whitelist the endpoint registration service, which registers all integration services (WebRTC) endpoints with the Office@Hand Cloud Communication Service.
- The Office@Hand video scheduling service is used to create and manage video meetings.
- The Microsoft Teams (Slack) integration service integrates Office@Hand services into Teams (Slack).
- The platform APIs can be used to develop stand-alone applications (such as an outbound dialer), or applications that are embedded into existing business applications.
- You should whitelist the Stand-alone platform API and Embeddable platform API only if you actually implement applications based on these APIs.
Table 3.5.1 – Communication integration services |
Purpose |
Application protocol |
Domain name/IP addresses |
Destination ports |
Integration service API |
HTTPS |
api-rcapps.ringcentral.biz |
TCP\443 |
Endpoint registration service |
HTTPS |
sip*.ringcentral.biz |
TCP\8083 |
Video scheduling service |
HTTPS |
api-meet.ringcentral.biz |
TCP\443 |
Microsoft Teams integration service |
HTTPS |
teams.ringcentral.biz |
TCP\443 |
Slack integration service |
HTTPS |
slack.ringcentral.biz |
TCP\443 |
Stand-alone platform API |
HTTPS |
platform.ringcentral.biz |
TCP\443 |
Embeddable platform API |
HTTPS |
platform.ringcentral.biz |
TCP\443 |
4. Domain Name Service (DNS)
To function properly, all endpoints and services require internet-based DNS. For instance, endpoints rely on a DNS service to resolve the provisioning service domain name (e.g., pp.ringcentral.biz).
If you use private DNS, it must perform forward-lookups to internet-based DNS.
5. Network Address Translation (NAT)
Network Address Translation/Port Address Translation functionality (generically referred to as NAT) is applied at the border between two networks to translate between address spaces, or to prevent the collision of IP address spaces.
You must configure a minimum NAT timeout to ensure proper operation of hardphones:
- Cisco phones send a follow-up REGISTER refresh message every four minutes.
- Poly phones re-register every five minutes. For these phones, you must set NAT entry expiration timeout to greater than five minutes.
6. Security software
You may need to configure your cloud-based security software (network firewalls and web proxies) to whitelist the domains listed in this document’s tables.
7. Quality of Service guidelines
You must follow the Quality of Service guidelines to ensure the proper prioritization of your traffic. Otherwise, either or both parties may experience intermittent issues with call control or media quality.
8. VLAN configuration guidelines
You must follow VLAN configuration guidelines to ensure that VLANs are properly configured for hardphones (section 3.2.6).
Was this page helpful? Yes No