Skip to content

Network and Security Requirements

A secure and stable network setup is essential for HuLoop IPD to function properly. This section outlines the necessary port configurations, DNS setup, SSL certificate requirements, and optional security settings.

Required Ports

The following ports must be open to ensure successful communication between the IPD Server and Discovery Agents:

PortProtocolPurpose
80HTTPRedirects all traffic to HTTPS (443)
443HTTPSEncrypted data transfer and UI access
22SSHRemote maintenance and server access (Linux only)

If you’re using a firewall, whitelist ports 80, 443, and 22 on both inbound and outbound rules.

DNS Configuration

Set up a fully qualified domain name (FQDN) for your IPD Server to make it easily accessible from client machines.

  • Register a DNS entry for the server (e.g., ipd.companydomain.com)
  • If using a load balancer, create a DNS record for the load balancer endpoint instead

SSL Certificate Setup

HuLoop IPD requires a valid SSL certificate to secure traffic between agents and the server.

  • Use a publicly signed SSL certificate (PFX or PEM format) issued to your domain
  • Install the certificate on the IPD Server and ensure it is not expired
  • Add the certificate to your trusted root certificate store if you’re using internal certs
Important: Self-signed certificates are not recommended for production environments.

Minimum Bandwidth Recommendations

For smooth data transfer from agents to the server, we recommend:

  • Minimum 2 Mbps per 50 users
  • Stable and continuous connection preferred (wired or reliable Wi-Fi)

Optional Security and Integration Settings

If using a load balancer:

  • Port 443 traffic from the load balancer should forward to port 80 or 443 on the IPD server
  • SSL certificate should be installed at the load balancer level

For SSO with Azure AD:

Allow outbound access to:

For email integrations:

Allow outbound traffic on:

  • Port 587 or 465 for SMTP mail delivery

For Concierge Extension (OpenAI LLM):

Ensure outbound traffic to:

  • https://api.openai.com/v1 (on port 443)
Note: IPD doesn’t support filtering HTTPS traffic based on phrases or content due to end-to-end encryption. Do not apply DPI (Deep Packet Inspection) on port 443.

Last updated: Sep 09, 2025
Back To Top