Network requirements

IMPORTANT

This guide only applies to Next-Gen WAF customers with access to the Next-Gen WAF control panel. If you have access to the Next-Gen WAF product in the Fastly control panel, you can only deploy the Next-Gen WAF with the Edge WAF deployment method.

When deployed in a self-hosted deployment, the Next-Gen WAF agent requires egress to multiple external endpoints to facilitate actions (e.g., configuration retrieval, updates to rules, and notifications). If installing the required Next-Gen WAF packages via a package manager, the server must also be able to access our external package repositories to retrieve packages and package updates. The sections below describe the Fully Qualified Domain Names (FQDN), and the functionalities they pertain to, that may need to be added to your egress and firewall policies.

NOTE

CNAME records resolve the endpoints to IP addresses. This means that the IP addresses are subject to change (e.g., when the services behind them scale). For this reason, we recommend allowing traffic to these endpoints by FQDN and not via IP address or IP address range. Allow-listing only IP addresses has the potential to impact the availability of your deployment.

APT installs

For distributions that use Advanced Package Tool (APT) to retrieve our packages, ensure egress to:

FQDNPortProtocolsDescription
apt.signalsciences.net443TCP/HTTPSRepository URL
dl.signalsciences.net443TCP/HTTPSUsed for GPG key verification on upgrade and install
d3fo0g5hm7lbuv.cloudfront.net443TCP/HTTPSCached package objects via packagecloud

DNF and YUM installs

For distributions that use Dandified Yum (DNF) and Yellowdog Updater (YUM) for packaging, ensure egress to:

FQDNPortProtocolsDescription
yum.signalsciences.net443TCP/HTTPSRepository URL
dl.signalsciences.net443TCP/HTTPSUsed for GPG key verification on upgrade and install
d3fo0g5hm7lbuv.cloudfront.net443TCP/HTTPSCached package objects via packagecloud

APK installs

For distributions that use Alpine Package Keeper (APK) for packaging, ensure egress to:

FQDNPortProtocolsDescription
apk.signalsciences.net443TCP/HTTPSRepository URL and GPG key location

Direct download installs and the agent auto-update service

For direct package downloads and the agent auto-update service, ensure egress to:

FQDNPortProtocolsDescription
dl.signalsciences.net443TCP/HTTPSRepository URL
dl-signalsciences-net.s3-us-west-2.amazonaws.com443TCP/HTTPSRepository URL

Next-Gen WAF endpoints

The Next-Gen WAF endpoints are fronted on the Fastly CDN or on AWS in a configuration failover scenario. If the Next-Gen WAF agent is unable to download from the Fastly CDN, it will fall back to downloading directly from an AWS S3 bucket with an additional fallback to a secondary bucket in a second region until it can download from the Fastly CDN or a primary S3 bucket again.

The agent communicates with the following endpoints:

FQDNPortProtocolsDescription
c.signalsciences.net443TCP/HTTPSNext-Gen WAF collector endpoint
wafconf.signalsciences.net443TCP/HTTPSPrimary configuration endpoint
sigsci-agent-wafconf.s3.amazonaws.com443TCP/HTTPSFailover configuration endpoint
sigsci-agent-wafconf-us-west-2.s3.amazonaws.com443TCP/HTTPSSecondary failover configuration endpoint
Was this guide helpful?

Do not use this form to send sensitive information. If you need assistance, contact support. This form is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.