In order to broadcast or view streams, you will need to ensure that any firewall is configured to allow traffic on specific ports. A firewall can reside on your local machine, on your router, or as part of your corporate network.
Firewall settings needed for viewing streams
In order to watch IBM streams you have to create the following stateful firewall rules, assuming you have a regular internet connection:
- Outgoing UDP destination port
53
to your nameserver or any IP for domain name resolution (DNS). - Outgoing TCP destination port
80
,443
to any IP for web. - Outgoing TCP destination port
1935
to any IP for streaming (RTMP). - Outgoing TCP destination ports
8001-8004
toIP ADDRESS RANGES
below for web based chat.
Firewall settings needed for broadcasting
In order to Broadcast via IBM Video Streaming you have to create the following stateful firewall rules, assuming you have a regular internet connection. In case you are behind a corporate firewall please ensure your IT department configures the firewall to accommodate these settings:
- Outgoing UDP destination port
53
to your nameserver or any IP for domain name resolution (DNS). - Outgoing TCP destination port
80
,443
to IP ADDRESS RANGES below for web. - Outgoing TCP destination port
1935
to IP ADDRESS RANGES below for streaming (RTMP).
Optional: If you have secure ingest setup for your account, you will need to open these additional ports.
- Outgoing TCP destination port
4444
to IP ADDRESS RANGES below. - Outgoing UDP destination port
2070-2090
to IP ADDRESS RANGES below.
IP Address Ranges
List of IP address ranges you have to create firewall filters.
In order to ensure a smooth experience, please whitelist *all* of the following IP address ranges regardless of which locations are closest to your streaming location.
IP | LOCATION |
149.81.152.236 |
Frankfurt, Germany, Europe |
149.81.152.43 |
Frankfurt, Germany, Europe |
149.81.154.66 |
Frankfurt, Germany, Europe |
149.81.157.92 |
Frankfurt, Germany, Europe |
149.81.160.184 |
Frankfurt, Germany, Europe |
149.81.161.63 |
Frankfurt, Germany, Europe |
149.81.161.69 |
Frankfurt, Germany, Europe |
149.81.162.158 |
Frankfurt, Germany, Europe |
149.81.162.159 |
Frankfurt, Germany, Europe |
149.81.165.69 |
Frankfurt, Germany, Europe |
149.81.165.72 |
Frankfurt, Germany, Europe |
149.81.165.73 |
Frankfurt, Germany, Europe |
149.81.166.116 |
Frankfurt, Germany, Europe |
158.177.11.16 |
Frankfurt, Germany, Europe |
158.177.11.224 |
Frankfurt, Germany, Europe |
158.177.12.189 |
Frankfurt, Germany, Europe |
158.177.12.253 |
Frankfurt, Germany, Europe |
158.177.13.241 |
Frankfurt, Germany, Europe |
158.177.15.23 |
Frankfurt, Germany, Europe |
158.177.2.103 |
Frankfurt, Germany, Europe |
158.177.2.105 |
Frankfurt, Germany, Europe |
158.177.4.19 |
Frankfurt, Germany, Europe |
158.177.6.112 |
Frankfurt, Germany, Europe |
158.177.9.135 |
Frankfurt, Germany, Europe |
158.177.9.211 |
Frankfurt, Germany, Europe |
158.177.9.31 |
Frankfurt, Germany, Europe |
158.177.9.93 |
Frankfurt, Germany, Europe |
161.156.161.167 |
Frankfurt, Germany, Europe |
161.156.163.110 |
Frankfurt, Germany, Europe |
161.156.166.57 |
Frankfurt, Germany, Europe |
161.156.166.95 |
Frankfurt, Germany, Europe |
161.156.167.206 |
Frankfurt, Germany, Europe |
161.156.168.45 |
Frankfurt, Germany, Europe |
161.156.168.87 |
Frankfurt, Germany, Europe |
161.156.169.171 |
Frankfurt, Germany, Europe |
161.156.173.111 |
Frankfurt, Germany, Europe |
161.156.175.205 |
Frankfurt, Germany, Europe |
161.156.175.56 |
Frankfurt, Germany, Europe |
149.81.161.63 |
Frankfurt, Germany, Europe |
158.177.4.19 |
Frankfurt, Germany, Europe |
161.156.175.56 |
Frankfurt, Germany, Europe |
169.50.20.44 |
Frankfurt, Germany, Europe |
169.50.20.46 |
Frankfurt, Germany, Europe |
161.156.171.17 |
Frankfurt, Germany, Europe |
149.81.5.141 |
Frankfurt, Germany, Europe |
161.156.83.167 |
Frankfurt, Germany, Europe |
149.81.165.86 |
Frankfurt, Germany, Europe |
Additional firewall settings needed for ECDN servers
ECDN servers are deployed behind customer firewalls. These servers act as local caches for the video streaming content. To pull down the content, they need outbound-to-Internet network connectivity. The list below indicates the IP address ranges on the Internet that should be reachable from the ECDN servers. No inbound connectivity from Internet is needed.
-
Used for setting the clock on the ECDN servers - outgoing UDP port 123. Required
Clock synchronization is needed for SSL connections to work. Either use a local NTP server(s) or open port
[0-3].ubuntu.pool.ntp.org123
to:
-
Allow OpenVPN traffic over port
443
to terminator.deepcaching.com. RequiredSometimes, during server upgrades or when customers need additional help in diagnosing the issues, there is a need for ECDN operations team to remotely login to the servers.
ECDN Management Portal allows customers to selectively enable/disable a VPN connection from a ECDN server to an IBM Video ECDN server
terminator.deepcaching.com
in the cloud.When enabled, it allows ECDN operations team to remotely login to this ECDN server, and help with the diagnosis.
The VPN tunnel establishes an OpenVPN connection via port 443. This requires the firewall to NOT block such outbound traffic via port
443
toterminator.deepcaching.com
. -
Allow 3128 port when child-parent proxy feature is enabled. Optional
From the ECDN server version 2.4.2 (20190724) the Child ECDN servers can use Parent ECDNs as proxy for HTTPS calls to connect to Internet. This is an optional feature and can be enabled by IBM via customer request.
When this feature is enabled then the port is used by Child servers to connect to the proxy services running on Parent ECDN nodes.
Domain names
Many enterprise customers use a proxy server to manage the HTTP and HTTPS traffic within their intranet. These proxy servers can become overwhelmed if all video streaming traffic is also channeled through them. To avoid this, proxy servers allow you to define an exclude list of domain names, which allows any traffic to these domains to bypass the proxy server.
IBM products uses several domain names as part of its service delivery. These domain names are categorized into:
-
Control plane - such as access to the web portal, support etc. - this traffic may flow via the proxy or bypass it.
ustream.tv *.ustream.tv ustreamstatic-a.akamaihd.net ustvstaticcdn1-a.akamaihd.net ustvstaticcdn2-a.akamaihd.net *.deepcaching.com video.ibm.com *.video.ibm.com *.services.video.ibm.com ubuntu.pool.ntp.org
-
Data plane - large volume of video data as pulled by the video player - this traffic should bypass the proxy.
*.deepcaching.net vod-cdn.ustream.tv ustreamssl-a.akamaihd.net uhsakamai-a.akamaihd.net ustream.lldns.net
Frequently asked questions
My company uses a proxy service (like Zscaler) for all HTTP(S) traffic. Do I need to bypass all the IP address destinations listed on this page?
Yes. To reduce management overheads, we strongly recommend customers make firewall changes to ensure all IP addresses identified in this article to be are reachable. This is the minimal list.
IBM Video Streaming offers video streaming services to customers around the world. Most enterprise customers have presence in multiple regions. Our services use source IP address of the player to make routing decision to the nearest ECDN configured for that location, or to the external CDN provider in that region. Routing all playback traffic through a centralized proxy may result in sub-optimal performance.
If customers are using proxy services like Zscaler, then it is required that all traffic to the above list of IP addresses be bypassed. Doing so will enable us to accurately route all playback requests to their closest ECDN servers or external CDN servers most appropriate based on the player's IP address.
Who owns the IP addresses listed on this page?
Unless explicitly qualified, all the IP addresses shown on this page are owned and managed by IBM.
How often the do the IP addresses mention in this article change? How much notice do you provide to customers before this list is changed?
The IP addresses mentioned in this article rarely change. If we do make any changes, we will give you 30 days notice to make the changes to the firewall settings.
Setting up firewall rules on Microsoft Windows 10
- Open Control Panel (click on Start → Type "Control Panel" → Click on Control Panel app
- Click on System and Security then on Windows Defender Firewall
- On the left pane click on Advanced settings, this opens Windows Defender Firewall with Advanced Security window
- On the left pane right click on Outbound Rules → New Rule
- Select "Port" → "TCP" or "UDP" → specify the port → Allow the connection → select when does this rule apply based on your preferences → Name the rule
Setting up firewall rules on Mac OS X
- http://support.apple.com/kb/HT1507?viewlocale=en_US&locale=en_US- You have to replace the port numbers while creating the rules listed in our article above.
- http://portforward.com/networking/static-Mac10.4.htm