Skip to main content
All CollectionsTablet
Firewall Requirements
Firewall Requirements
Updated over a week ago

Dedicated devices are often behind corporate firewalls, preventing Esper's backend and Lula Applications from communicating with them (or vice-versa). Please make sure to whitelist the following URLs and Ports if your fleet runs behind such a firewall.

FQDN

Wildcard

Port

Feature

*.amazonaws.com

*.amazonaws.com

TCP: 443 (HTTPS)

For provisioning, app management, and device management.

Note: Contact Esper if you're interested in replacing *.amazonaws.com with our streamer service. After streamer setup, your new requirement will be:
streamer.esper.io | TCP: 443. Learn more about our streamer service or enable it in Firewall Settings. You may need to enable proxy accesss through your router as well.

mqtt.shoonyacloud.com

*.shoonyacloud.com

TCP: 1883 (MQTT)

For MQTT communication with devices.

services.shoonyacloud.com

TCP: 443 (HTTPS)

For Android for Work (AFW) and Zero Touch Enrollment (ZTE) provisioning and Remote Viewer APK.

turn.shoonyacloud.com

TCP/UDP: 3478 (SCTP)

TCP/UDP: 5349 (SCTP)

UDP: 49152 - 65535

authn2.esper.cloud

*.esper.cloud


TCP: 443 (HTTPS)

id.esper.cloud

TCP: 443 (HTTPS)

ping.esper.cloud

Port 443 (HTTPS)

For checking the device's internet connectivity.

Note: For Esper Agent versions 7.12.3767 and above.

ozrlk.esper.cloud

TCP: 443 (HTTPS)

For granting access to the Esper Console when operating under a network with a restricted outbound firewall.

ozrlk-api.esper.cloud

TCP: 443 (HTTPS)

For communicating from the device to the Esper tenant. (example: device status events and command success/failure messages).

mqtt.esper.cloud

TCP: 443 (HTTPS)

For MQTT communication to devices for commands (with TLS).

statserv.esper.cloud

TCP: 443 (HTTPS)

For sending deployment stats and provisioning failures to Esper monitoring systems.

onboarding.esper.cloud

TCP: 443 (HTTPS)

For device onboarding.

Note: For Esper Agent versions 7.14.0931 and above. If not listed, defaults to services.shoonyacloud.com.

eea-sentry.esper.cloud

TCP: 443

For sending telemetry data to Sentry.

downloads.esper.io

*.esper.io

TCP: 443 (HTTPS)

For standalone Esper Agent updates.

13.52.132.230

13.52.132.230

TCP: 40000-50000

For allowing secure remote ADB access to your devices and the Esper CLI.

shoonya-firebase.firebaseio.com

*.crashlytics.com

crashlyticsreports-pa.googleapis.com

firebasecrashlyticssymbols.googleapis.com

*.firebaseio.com
*.crashlytics.com
*.googleapis.com

TCP: 443 (HTTPS)

TCP: 5228 (HTTPS)

TCP: 5229 (HTTPS)

TCP: 5230 (HTTPS)

For Firebase/Crashlytics. Used to send crash reports.

8.8.8.8

8.8.8.8

TCP: 443 (HTTPS)

For checking the device's internet connectivity.

Note: For Esper Agent versions lower than 7.12.3767 and greater than 7.8.7060.

*.luladelivery.store

*.luladelivery.store

TCP: 443 (HTTPS)

Used to enable services and features in the Lula Store Platform application

*.intercom.io

*.intercom.io

TCP: 443 (HTTPS)

Used to enable services and features in the Lula Store Platform application

*.segment.com

*.segment.com

TCP: 443 (HTTPS)

Used to enable services and features in the Lula Store Platform application

*.segment.io

*.segment.io

TCP: 443 (HTTPS)

Used to enable services and features in the Lula Store Platform application

*.intercomcdn.com

*.intercomcdn.com

TCP: 443 (HTTPS)

Used to enable services and features in the Lula Store Platform application

*.onesignal.com

*.onesignal.com

TCP: 443 (HTTPS)

Used to enable services and features in the Lula Store Platform application

*.posthog.com

*.posthog.com

TCP: 443 (HTTPS)

Used to enable services and features in the Lula Store Platform application

clients*.google.com

clients*.google.com

TCP: 443 (HTTPS)

Used to enable services and features in the Lula Store Platform application

TCP: 443 (HTTPS)

Used to enable services and features in the Lula Store Platform application

csi.gstatic.com

csi.gstatic.com

TCP: 443 (HTTPS)

Used to enable services and features in the Lula Store Platform application

geo*.ggpht.com

geo*.ggpht.com

TCP: 443 (HTTPS)

Used to enable services and features in the Lula Store Platform application

lh*.ggpht.com

lh*.ggpht.com

TCP: 443 (HTTPS)

Used to enable services and features in the Lula Store Platform application

*.stripecdn.com

*.stripecdn.com

TCP: 443 (HTTPS)

Used to enable services and features in the Lula Store Platform application

*.stripe.com

*.stripe.com

TCP: 443 (HTTPS)

Used to enable services and features in the Lula Store Platform application

cbks*.google.com

cbks*.google.com

TCP: 443 (HTTPS)

Used to enable services and features in the Lula Store Platform application

cbks*.googleapis.com

cbks*.googleapis.com

TCP: 443 (HTTPS)

Used to enable services and features in the Lula Store Platform application

lh*.googleusercontent.com

lh*.googleusercontent.com

TCP: 443 (HTTPS)

Used to enable services and features in the Lula Store Platform application

*.explo.co

*.explo.co

TCP: 443 (HTTPS)

Used to enable services and features in the Lula Store Platform application

Did this answer your question?