US English (US)
FR French
DE German
ES Spanish
IT Italian
PL Polish
BR Portuguese (Brazil)

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Contact Us
  • Submit a Diagnostic Report
English (US)
US English (US)
FR French
DE German
ES Spanish
IT Italian
PL Polish
BR Portuguese (Brazil)
  • Home
  • Getting Started for Managers

Firewall & Secure Networks

Written by TJ Salyars

Updated at December 12th, 2025

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Getting Started for Advisors
  • Getting Started for Managers
  • Ticket Functionality
    Basic Ticket Functionality Advanced Ticket Functionality
  • Contact Management
  • Insights
  • Manage Team Settings
    Team Settings VoiceHub Settings Chat Settings EmailHub Settings WhatsApp
  • Manage Company Settings
  • Admin Page Settings
  • Integrations
  • Mobile App Functionality
  • Best Practices
  • Troubleshooting
  • FAQ's
+ More

Table of Contents

Core Configuration Domain Requirements Email Configuration VoiceHub Configuration Signaling (SIP/WebSocket) - Control Phase Media/RTP Streams - Streaming Phase Servers Video Configuration Security FAQs IT Admin TL;DR Core Domain & HTTPS Email Service VoiceHub - Video Calling Video Calling Implementation Checklist Testing and Validation Support Contact Proxy Services Still Having Trouble?

Your Dealership's IT organization may block access to certain websites or web functionalities. Please share this article with your IT department and ask them to ensure your network infrastructure is configured correctly to allow list the IPs, port ranges, and domains required for ExpertConnect and its features to function optimally.

Core Configuration

Add/allow/whitelist the following destination domains and the corresponding ports to your firewall configurations:

Domain

*.expertconnect.deere.com

Note: The * above represents multiple sites under the expertconnect.deere.com domain name. 

Requirements

  1. Allow HTTPS traffic (TCP port 443) for this domain. 
  2. Ensure that any ports required for real-time communication services are open, and the following should be considered: 
    • TCP 443 for HTTPS and WebSocket connections (primary requirement). 
    • No additional custom ports are typically required; all communication occurs over HTTPS. 
  3. If your firewall uses FQDN filtering, please add the domain above to the follow list for outbound traffic. 

Email Configuration

Dealerships with spam filters blocking any emails from ExpertConnect, including verification emails, can whitelist below dedicated IP address assigned from our Email Service Provider for ExpertConnect. 

IP Address: 149.72.202.18 Subnet Mask: 255.255.255.255

VoiceHub Configuration

VoiceHub feature in ExpertConnect provides WebRTC & VoIP-based capabilities for real-time communication.

This can be categorized into two phases: 

  • Call control phase - Also known as Signaling (SIP/WebSocket) - This is the phase that handles the call's setup and control, for calls reaching the Expert's device on Web or Mobile apps or when the Expert initiates outbound calls via ExpertConnect - including the initiation, handshake, setting call internal routes, choosing the nearest edge server, configuration check, and connecting the call with the other participant.
  • Call streaming phase - Also known as Media/RTP Streams - This is the phase that defines the time spent on a "connected" call, for the incoming and outgoing streaming audio for both participants.

If your location's firewall and internet filtering configurations are blocking these underlying mechanisms, you may experience:

  • Intermittent call failures.
  • Calls failing continuously or intermittently to ring in/out or connect with the other participant.
  • Incoming and outgoing audio not heard at all or drops intermittently, with symptoms of one-way audio (caller can't hear callee or callee cannot hear caller or both) or silence.
  • Features like transfers of call or DTMF (Press x) may not work as expected.
  • Long delays in call control phase - for setup and connecting with the other participant

Signaling (SIP/WebSocket) - Control Phase

Web Application: 

  • Protocol: TCP
  • Source IP: ANY
  • Source Port: ANY †
  • Destination:
    • For Secure TLS to Call insights logging gateway
      • eventgw.twilio.com
    • For Secure TLS connection to Signalling Gateway
      • voice-js.roaming.twilio.com
    • For Secure TLS Connection to Regional Signalling gateways
      • voice-js.ashburn.twilio.com
      • voice-js.umatilla.twilio.com
      • voice-js.sao-paulo.twilio.com
      • voice-js.frankfurt.twilio.com
      • voice-js.dublin.twilio.com
      • voice-js.sydney.twilio.com
      • voice-js.singapore.twilio.com
      • voice-js.tokyo.twilio.com
  • Destination Port: 443 

Mobile App - iOS and Android: 

  • Protocol: TCP
  • Source IP: ANY
  • Source Port: ANY †
  • Destination:
    • For Secure TLS to Registration Server
      • ers.twilio.com
    • For Secure TLS to Call Insights Gateway
      • eventgw.twilio.com
    • For Secure TLS connection to GLL Signalling Gateway
      • chunderm.gll.twilio.com
    • For Secure TLS Connection to Regional Signalling Gateways
      • chunderm.au1.gll.twilio.com
      • chunderm.br1.gll.twilio.com
    • chunderm.de1.gll.twilio.com
    • chunderm.ie1.gll.twilio.com
    • chunderm.jp1.gll.twilio.com
    • chunderm.sg1.gll.twilio.com
    • chunderm.us1.gll.twilio.com
    • chunderm.us2.gll.twilio.com
  • Destination Port: 443

† ExpertConnect Web and Mobile Apps will select any available port from the ephemeral range. On most machines, this means the port range 1024 to 65535. 

Media/RTP Streams - Streaming Phase Servers 

  • Protocol: UDP
  • Source IP: ANY
  • Source Port: ANY †
  • Destination IP Ranges: 168.86.128.0/18
  • Destination Port Range: 10000-60000

† The Web and Mobile Apps will select any available port from the ephemeral range. On most machines, this means the port range 1024 to 65535. 

Important: Ports need to be opened for both incoming and outgoing traffic. 

Video Configuration

Video call is carried over WebRTC protocol, and the following domains and ports need to be whitelisted for two-way communication on Web and Mobile App - iOS and Android. 

.agora.io
.edge.agora.io
.sd-rtn.com
.edge.sd-rtn.com
web-1.ap.sd-rtn.com
web-2.ap.sd-rtn.com
ap-web-1.agora.io
ap-web-2.agora.io
webcollector-rtm.agora.io
logservice-rtm.agora.io
rtm.statscollector.sd-rtn.com
rtm.logservice.sd-rtn.com
Type Protocol Destination Ports
Video Web TCP
80; 443; 3433; 4700 - 5000; 5668; 5669; 6080; 6443; 8667; 9667; 30011 - 30013 (for RTMP converter)
Video Web UDP 3478; 4700 - 5000
Signaling Web TCP 443; 6443; 9591; 9593; 9601
Signaling Native TCP 8443; 9130; 9131; 9136; 9137; 9140, 9141
Signaling Native UDP 1080; 8000; 8130; 8443; 9120; 9121; 9700; 25000

Note: Native in above context means Mobile App - iOS and Android. 

Security FAQs

Q: Why so many ports?

A: Because of the nature of real-time communication using WebRTC/VoIP protocol, a range of addresses, ports, and transport protocols is needed. 

Q: Is this inbound or outbound or does it affect traffic both ways? 

A: These network and firewall configurations affect both inbound and outbound Voice (VoiceHub) call traffic.

Q: Why does ExpertConnect require such a large range of IP addresses/ports?

A: Due to growing customer base and growth of traffic on our platform globally, this increased range helps us to provide reliability and scalability for the foreseeable future.

Q: Isn't it a security risk for us to have so many IPs/Ports open? 

A: The IP range in the respective section is owned by our Communication Provider Vendor (referred to as CPV here on) and registered with ARIN. This is not an ephemeral IP range that is at risk of being recycled by our cloud providers and could potentially be used by another organization in the future. With this in mind, it is our CPV's position that this is a security improvement over the previous paradigm, despite the larger range(s).

It is a security risk to have any IPs/ports allowlisted. If an attacker can take over one IP or port from a given range, they can take over others, so the threat doesn't increase with the number of IPs or ports open.

Q: The size of the allow list is a concern. This gives the attacker more surface area to attach and does not provide the security cover we require. 

A: Every RTP media session is negotiated by one of a few trusted RTC CPV's signaling edges. The IP/ports here refer to the RTC CPV service media edge. Thus, you should allow UDP traffic to be sent and received from the published IP address ranges. However, you do not need to open any additional IPs or ports on your side.

Q: Why don't other products have such broad requirements? 

A: We can't speak for the decision-making processes of other products/offerings or their architectural designs, but we do see others with broadly similar requirements. For example, Telnyx has a single nonregional /19 IP range, and Zoom Phone and Zoom Contact Center have a UDP port range of 20000-64000 for reference. 

Q: What about data privacy for voice, video, data exchange, and security?

A: ExpertConnect adheres to the security policies and standards set by Deere, focusing on protecting dealer data and privacy. This includes ensuring appropriate isolation of dealer-related activities. All RTC services integrated into ExpertConnect comply with these high standards, offering detailed information about their security measures and compliance policies. When selecting a Real-Time Communication SaaS provider, special attention is given to geo-routing and geo-fencing capabilities. This ensures that the selected vendor can provide an edge server close to the user, which is vital for efficient data routing. Regarding data privacy, our RTC services strictly avoid collecting personal data from users, except for IP addresses and necessary operational data for voice/video calls. ExpertConnec prioritizes user privacy, sharing only essential user data, such as an internal identifier, to set up call sessions. Voice and video call streaming is managed by the RTC CPV's Real-Time Network servers, utilizing geo-routing to match the user's cloud region. Deploying these RTC CPV SDKs within ExpertConnect does not permit other users to access or conduct unauthorized activities on the platform. 

Additionally, as part of Deere, ExpertConnect regularly conducts vulnerability assessments and security audits, and implements protections against attacks. This is complemented by a defined process for reporting and mitigating any security concerns, ensuring ongoing vigilance and responsiveness to potential threats.

Q: We want to learn more about WebRTC. 

A: WebRTC (Web Real-Time Communications) is an advanced protocol used for facilitating real-time communication capabilities such as voice, video, and data exchange directly within web browsers or through mobile applications. This technology establishes peer-to-peer connections between browsers and/or apps, which, while efficient, requires careful security configuration. WebRTC predominantly utilizes a spectrum of UDP ports, alongside occasional TCP ports, to enable this connectivity. 

In terms of firewall configuration, WebRTC necessitates the opening of a broad range of ports, typically within the ephemeral port range (1,024 to 65,535 on most machines) for UDP traffic. This requirement stems from the protocol's utilization of ICE (Interactive Connectivity Establishment) and “hole punching” techniques, which are essential for navigating through firewalls and Network Address Translation (NAT) systems. This method is crucial for enabling peers situated on disparate networks to locate and connect without the intermediation of a central server. 

Although the necessity for multiple open firewall ports might initially appear as a significant security concern, it is crucial to recognize that WebRTC is inherently designed to support secure communications using DTLS (Datagram Transport Layer Security) and SRTP (Secure Real-time Transport Protocol). The potential security risks can be effectively mitigated through strategic network configuration and the adoption of supplementary security protocols. Firewalls, for instance, can be configured to allow only outbound connections initiated by internal hosts, preventing externally initiated connections. Furthermore, the deployment of additional safeguards, such as Virtual Private Networks (VPNs), can offer an extra layer of security. In summary, while the implementation of WebRTC requires opening a range of firewall ports, the security risks are manageable and can be substantially alleviated through judicious network management and the application of robust security measures. 

ExpertConnect has integrated with CPV services to facilitate voice/video calls, utilizing the WebRTC/Signaling protocol. This advanced protocol necessitates the pre-approval of certain domains and ports within security-restricted networks. The domains specified are crucial for the initiation and execution of voice/video calls through ExpertConnect's web and mobile platforms.

Q: This configuration isn't going to work for us?

A: ExpertConnect users at your Dealership will very likely encounter service disruptions if these Domains, IP addresses, and port ranges are not allowlisted. We strongly recommend working with your IT department to implement these requirements to ensure optimal functionality of all ExpertConnect features. 


IT Admin TL;DR

This section provides a consolidated checklist for IT administrators to configure firewalls and network infrastructure for ExpertConnect. 

Core Domain & HTTPS

Required for: Main application access

  • Domain: *.expertconnect.deere.com
  • Protocol: TCP
  • Port: 443 (HTTPS/WebSocket)
  • Direction: Outboard (allow return traffic) 

Email Service

Required for: Email delivery (verification, notification) 

  • IP Address: 149.72.202.18/32
  • Subnet Mask: 255.255.255.255
  • Action: Whitelist in spam filters

VoiceHub - Video Calling

Signaling Servers (Call Control)

Web Application: 

  • Protocol: TCP
  • Port: 443 (HTTPS/WebSocket)
  • Source: ANY (ephemeral ports: 1024-65535)
  • Destinations:
    • eventgw.twilio.com
    • voice-js.roaming.twilio.com
    • voice-js.ashburn.twilio.com
    • voice-js.umatilla.twilio.com
    • voice-js.sao-paulo.twilio.com
    • voice-js.frankfurt.twilio.com
    • voice-js.dublin.twilio.com
    • voice-js.sydney.twilio.com
    • voice-js.singapore.twilio.com
    • voice-js.tokyo.twilio.com

Mobile Apps (iOS/Android): 

  • Protocol: TCP
  • Port: 443 
  • Source: ANY (ephemeral ports: 1024-65535)
  • Destinations:
    • ers.twilio.com
    • eventgw.twilio.com
    • chunderm.gll.twilio.com
    • chunderm.au1.gll.twilio.com
    • chunderm.br1.gll.twilio.com
    • chunderm.de1.gll.twilio.com
    • chunderm.ie1.gll.twilio.com
    • chunderm.jp1.gll.twilio.com
    • chunderm.sg1.gll.twilio.com
    • chunderm.us1.gll.twilio.com
    • chunderm.us2.gll.twilio.com

Media Servers (Audio Streaming) 

  • Protocol: UDP
  • Source IP: ANY
  • Source Port: ANY (ephemeral ports: 1024-65535)
  • Destination IP Range: 168.86.128.0/18
  • Destination Port Range: 10000-60000
  • Direction: BOTH incoming and outgoing

Video Calling

Domains by Whitelist

.agora.io
.edge.agora.io
.sd-rtn.com
.edge.sd-rtn.com
web-1.ap.sd-rtn.com
web-2.ap.sd-rtn.com
ap-web-1.agora.io
ap-web-2.agora.io
webcollector-rtm.agora.io
logservice-rtm.agora.io
rtm.statscollector.sd-rtn.com
rtm.logservice.sd-rtn.com

Ports by Platform

Platform Protocol Ports
Web - Video TCP 80, 443, 3433, 4700-5000, 5668, 5668, 6080, 6443, 8667, 9667, 30011-30013
Web - Video UDP 3478; 4700-5000
Web - Signaling TCP 443; 6443, 9591, 9593, 9601
Mobile - Signaling TCP 8443, 9130, 9131, 9136, 9137, 9140, 9141
Mobile - Signaling UDP 1080, 8000, 8130, 8443, 9120, 9121, 9700, 25000

Implementation Checklist

  • Whitelist domain: *.expertconnect.deere.com on port 443 (TCP).
  • Whitelist email IP: 149.72.202.18/32 in spam filters. 
  • Allow outbound TCP port 443 to all signaling domains (listed above). 
  • Allow outbound UDP ports 10000-60000 to IP range 168.86.128.0/18. 
  • Allow inbound UDP ports 10000-60000 from IP range 168.86.128.0/18. 
  • Whitelist all video call domains (listed above). 
  • Allow video call ports (TCP/UDP as specified in table above). 
  • Configure firewall to allow ephemeral source ports (1024-65535). 
  • Test connectivity using ExpertConnect Diagnostics & CPV Network Test Tool. 
  • Document all changes for future reference. 

Testing and Validation

After implementing these configurations:

  1. Test voice calling functionality in ExpertConnect. 
  2. Test video calling functionality in ExpertConnect. 
  3. Verify email delivery (check spam/junk folders). 
  4. Monitor firewall logs for any blocked connections. 
  5. Use above mentioned network and diagnostics test tools to validate connectivity. 
     

Support Contact

If you encounter issues after implementing these configurations, please contact your Deere ExpertConnect support team with:

  • Firewall logs showing blocked connections 
  • Specific error messages from ExpertConnect. 
  • Results from the ExpertConnect Diagnostics & CPV Network Test Tool
     

Proxy Services

Various proxy services can be made available if the above is not working. Please email expertconnect@johndeere.com and include a member of your IT team.

Still Having Trouble?

If you are still having problems, please email expertconnect@johndeere.com and include a member of your IT team.

fire protection security wall

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • Insights Dashboard
  • Block Unwanted Calls/Messages (SPAM)
  • External Advisors in your Organization
  • Port Your Google Voice Number
Feedback

United States
  • Terms and Conditions

Content is protected by copyright. Copying, modifying, or reposting content is prohibited. Copyright © 2023 Deere & Company. All Rights Reserved


Knowledge Base Software powered by Helpjuice

Expand