Network and Security Requirements
A secure and stable network setup is essential for HuLoop IPD to function properly. This section outlines the necessary port configurations, DNS setup, SSL certificate requirements, and optional security settings.
Required Ports
The following ports must be open to ensure successful communication between the IPD Server and Discovery Agents:
Port | Protocol | Purpose |
---|---|---|
80 | HTTP | Redirects all traffic to HTTPS (443) |
443 | HTTPS | Encrypted data transfer and UI access |
22 | SSH | Remote maintenance and server access (Linux only) |
If you’re using a firewall, whitelist ports 80, 443, and 22 on both inbound and outbound rules.
DNS Configuration
Set up a fully qualified domain name (FQDN) for your IPD Server to make it easily accessible from client machines.
- Register a DNS entry for the server (e.g., ipd.companydomain.com)
- If using a load balancer, create a DNS record for the load balancer endpoint instead
SSL Certificate Setup
HuLoop IPD requires a valid SSL certificate to secure traffic between agents and the server.
- Use a publicly signed SSL certificate (PFX or PEM format) issued to your domain
- Install the certificate on the IPD Server and ensure it is not expired
- Add the certificate to your trusted root certificate store if you’re using internal certs

Minimum Bandwidth Recommendations
For smooth data transfer from agents to the server, we recommend:
- Minimum 2 Mbps per 50 users
- Stable and continuous connection preferred (wired or reliable Wi-Fi)
Optional Security and Integration Settings
If using a load balancer:
- Port 443 traffic from the load balancer should forward to port 80 or 443 on the IPD server
- SSL certificate should be installed at the load balancer level
For SSO with Azure AD:
Allow outbound access to:
For email integrations:
Allow outbound traffic on:
- Port 587 or 465 for SMTP mail delivery
For Concierge Extension (OpenAI LLM):
Ensure outbound traffic to:
- https://api.openai.com/v1 (on port 443)