Skip to content
English
  • There are no suggestions because the search field is empty.

Cloud-Hosted Network Requirements for IT

 

1. Captive Portal

If your network uses a captive portal for authentication, it must be disabled for Rock devices.

2. SSL Inspection / Traffic Interception

If your network uses traffic inspection proxies or firewalls (e.g., Zscaler, etc.) that intercept or modify SSL/TLS traffic, exceptions must be configured to allow Rock devices to bypass SSL inspection when communicating with the Alcatraz platform.

This includes all required cloud endpoints. In addition, onboarding.alcatraz.ai must be explicitly whitelisted and excluded from SSL/TLS inspection, as it is required for device onboarding and provisioning.

3. Cloud Endpoints (Whitelisting Required)

Rock devices must be able to establish outbound connections to the Alcatraz Cloud platform.
If your network enforces outbound filtering, proxying, or firewall restrictions, you must whitelist the following URLs and/or IP addresses.

These endpoints must be reachable without SSL/TLS interception.

  • Standard Cloud (US)
    • https://platform.us.alcatraz.ai
    • https://devices.us.alcatraz.ai
    • 3.23.74.102
    • 3.140.166.106
  • Standard Cloud (EU)
    • https://platform.eu.alcatraz.ai
    • https://devices.eu.alcatraz.ai
    • 18.197.130.184
    • 3.122.185.18
  • Enterprise Cloud (Single-Tenant)
    Your Alcatraz representative will provide the specific URLs and IP addresses for your deployment:
    • https://platform.<yourCloudInstance>.alcatraz.ai
    • https://devices.<yourCloudInstance>.alcatraz.ai

4. Required Network Ports

The following outbound ports must be open from the Rock device:
TCP 443 UI and Events Outbound from Rock to Alcatraz Cloud platform
TCP 3310 Data synchronization Outbound from Rock to Alcatraz Cloud platform
TCP 8443 Onboarding and updates Outbound from Rock to Alcatraz Cloud platform
UDP 53 DNS Outbound from Rock to DNS Server
UDP 123 NTP Outbound from Rock to NTP Server

5. DNS Server Requirement

A DNS server is required.

If a corporate DNS server is not available, a public DNS server such as Google DNS may be used:

  • 8.8.8.8
  • 8.8.4.4

6. NTP Server Requirement

An NTP server is required.

If a corporate NTP server is not available, a public NTP server such as those offered by Google and NIST may be used:

  • time.google.com
  • time.nist.gov

7. Power Requirement

A PoE+ power source is required:

  • PoE+ (IEEE 802.3at Type 2), 30W

8. Optional Integrations

ACS Integration (optional)
TCP 3033 ACS Integration Sync Outbound from Alcatraz Proxy Service to Alcatraz Cloud
Varies by ACS ACS Integration Sync Outbound from Alcatraz Server to ACS Server

 

ONVIF (optional)
TCP 80 ONVIF Agent Inbound to Rock from VMS
TCP 554 RTSP Streaming Inbound to Rock from VMS
UDP 554 RTSP Streaming Inbound to Rock from VMS
UDP 3792 ONVIF Discovery Inbound to Rock from VMS

 

9. Troubleshooting Access (Optional / Support-Guided)

The following access methods may be used for administrative access and troubleshooting. These are not required for normal operation of the device.

 
ONVIF (optional)
TCP 443 Device web interface (HTTPS) Inbound to Rock from trusted internal networks
TCP 22 SSH access (advanced diagnostics) Inbound to Rock from restricted internal networks
Note: SSH access (TCP 22) may be required in rare cases for advanced troubleshooting. Customers may choose to keep this access disabled and enable it temporarily when requested by Alcatraz Support