Networking and Firewall Guide¶
This page summarizes network boundaries for IPCom from an IT operations perspective.
1. Traffic directions¶
- Inbound to IPCom: device traffic reaches configured receiver listeners (
TCP/UDP/COM/modem paths). - Outbound from IPCom: events and status traffic are sent to CMS/automation outputs.
2. Firewall planning¶
- Allow inbound receiver listener ports only from trusted device/source networks.
- Allow outbound traffic only to approved CMS/automation destination IPs and ports.
- Keep management UI access limited to admin networks, jump hosts, or VPN.
- Review NAT and port-forwarding rules before changing listener ports in
Receivers.
3. IP allowlist notes¶
IP Whitelistfields appear in bothGeneralandOutputscontexts.- Direction and enforcement behavior must be validated in your deployment before relying on it for segmentation. [REVIEW]
4. Change checklist¶
- Apply firewall and NAT changes before modifying production receiver/output settings.
- Validate connectivity with controlled test events.
- Monitor
Statusbuffers andLogsfor rejects or connection failures. - Keep a rollback rule set for quick recovery.