Cs Networkrequirements Liveuproducts
Cs Networkrequirements Liveuproducts
This document contains the network requirements for LiveU products; all communication is done through the open internet as a
medium.
• System Schematics
• Port & IP Information
o Device: LU2000/4000 (MMH/Transceiver)
o Device: Video Return Server
o Device: Ingest Servers:
o Device: LU2000/4000 Servers (MMH), LU200e, All devices.
o Device: Any computer used to access LiveU Central.
o Ubuntu Repositories (US only).
o Device: LU200e, LU210, LU220 & LiveU Solo.
o Device: LU200e, LU210, LU220.
o Device: LiveU Solo.
o Device: Solo Portal.
o Device: IFB / Audio Connect
o WebRTC Firewall Rules
o SRT - Secure Reliable Transport
o Thinclient IFB
o List of FQDNs to check Unit connectivity
• Air Control Network requirements
• AIR Control components connectivity/Network requirements
• Servers:
o Multimedia Hub
o Video Return
o Ingest Servers.
• Gateway (DataBridge) Servers.
• LiveU units.
o LU2XX
o LU300/300s
o LU6XX
o LU8XX
The information detailed in this document is relevant for products at version 7.5 and above.
General Note
Organization tools like Fortigate IPS (Intrusion prevention system) https://www.fortinet.com/products/ips can block WSS/HTTPS
traffic towards LiveU Cloud servers ( MMH in cloud ) , or can block the resolving of our servers domain
name https://support.opendns.com/hc/en-us/articles/227988047-Web-Content-Filtering-and-Security. In such case orgspecif anization
IT will need to add our servers domain to the tool white list
System Schematics
Port & IP Information
Device: LU2000/4000 (MMH/Transceiver)
Note
port 18255 & 1935 are the server internal ports .Customer can use any external available port ( in firewall ) and forward the traffic
towards these internal ports . External ports should be added to LiveU configuration (In the case the external ports aren't the same as
the internal ) , LiveU Support can work with you
52.21.44.60
52.6.93.126
Outbound 80, 443, These IP addresses are used for High Availability
Required
TCP 8543 52.70.108.25 Load Balancing
52.72.46.113
54.209.189.230
104.196.13.7
If you restrict outbound traffic in firewalls, you will need to have the following open:
• Outbound port 5061 TLS/TCP, ports 15000 – 16500 RTP/UDP
• US customers: Outbound hostname ifb-us-01.liveu.tv (IP 34.232.180.93)
• EU customers: Outbound hostname ifb-eu-01.liveu.tv (IP 99.81.196.221)
• HKG customers: Outbound hostname ifb-hkg-01.liveu.tv (IP 18.163.90.145)
193.122.181.232 - US
East - Ashburn (future)
130.61.8.103 -
Frankfurt (active)
158.101.180.199 -
* Can be limited to LiveU
Frankfurt (future)
STUN/TURN URL.
LiveU STUN/TURN
link.globalconnect.liveu.tv
infrastructure control 158.101.73.17 -
Outbound <any> UDP 3478
port. Will be used Tokyo (active)
Geo-location based,
from version 9.0
failovers can happen for
129.146.234.254 - US
improved availability
west - Pheonix (future)
168.138.111.21 -
Sydney
152.67.27.136 -
Mumbai
129.151.37.59 - Sao
Paolo
129.159.69.138 - US
East - Ashburn (active)
193.122.181.232 - US
East - Ashburn (future)
130.61.8.103 -
Frankfurt (active)
158.101.180.199 -
* Can be limited to LiveU
Frankfurt (future)
STUN/TURN URL.
LiveU STUN/TURN
link.globalconnect.liveu.tv
Relay media. Will 158.101.73.17 -
Outbound <any> UDP 49152-65535
be used from version Tokyo (active)
Geo-location based,
9.0
failovers can happen for
129.146.234.254 - US
improved availability
west - Pheonix (future)
168.138.111.21 -
Sydney (future)
152.67.27.136 -
Mumbai (future)
129.151.37.59 - Sao
Paolo (future)
Thinclient IFB
For thinclient IFB , organization should allow (under assumption thinclient is located inside the organization):