Hi, I'm Ask INFA!
What would you like to know?
ASK INFAPreview
Please to access Ask INFA.

Table of Contents

Search

  1. Preface
  2. Runtime environments
  3. Hosted Agent
  4. Secure Agent groups
  5. Elastic runtime environments
  6. Serverless runtime environments
  7. Secure Agents
  8. Secure Agent installation

Runtime Environments

Runtime Environments

Configuring the firewall

Configuring the firewall

If your organization uses a protective firewall, include the
Informatica Intelligent Cloud Services
domain name or IP address ranges in the list of approved domain names or IP addresses. To ensure that the Secure Agent can perform all necessary tasks through the firewall, enable the port that the Secure Agent uses.
The Secure Agent uses port 443 (HTTPS) to connect to the internet. Configure your firewall to allow traffic to pass over port 443. Also exclude the following directory from security scans:
<Secure Agent installation directory>/apps
. Scanning files in this directory can interfere with the operation of the Secure Agent.
The list of allowed domains and IP addresses can vary according to your POD (Point of Deployment). You can identify your POD through the URL that appears when you open any service. The first few characters of the URL string identify the POD. For example, if the URL starts with
usw3.dm-us.informaticacloud.com
, your POD is USW3.
For the list of all the domains and IP addresses that you must allow for the different PODs, see Pod Availability and Networking.

0 COMMENTS

We’d like to hear from you!