Domains used by your Alta Video deployment
Last modified: Wednesday July 03, 2024.
Your Alta Video deployment periodically contacts different domains and IP addresses, for a variety of reasons, including checking for updates, ensuring communications are ongoing, and to send/fetch data that is needed for correct operation of your configured Alta Video features. These connections can include *.alta.avigilon.com, *.avasecurity.com, *.motorolasolutions.com and other domains, and can optionally include contact with IP address 1.1.1.1 for DNS queries and network connectivity testing.
Updated domains
As we unify Avigilon Alta video and Alta access, alta.avigilon.com will become the main domain used by Avigilon Alta Video and other Avigilon Alta services. Update your firewall rules to include this domain and its subdomains.
For the complete list of domains used, see:
- Ports required by Avigilon Ava and Avigilon Alta cloud-native cameras
- Ports required by Alta Cloud Connectors
- Ports required by Avigilon Ava cameras connected to Alta Cloud Connectors
- Client connections
Firewall settings for Alta Video
As the domains used by Alta Video change as new Alta Video features, regions, and clusters are added, we recommend you use the wildcard domains listed in the referenced topics when configuring your corporate firewall rules.
However, for networks that cannot use wildcard entries in their firewall allow lists, you can interrogate the Alta Video API to get the current list of domains being used by your Alta Video deployment.
Task — Interrogate Alta Video to view the list of domains currently being used
- Create the API query by appending /api/v1/firewallRules to the end of your deployment URL: https://<deployment URL>/api/v1/firewallRules.
- Using your browser, navigate to the URL created above.
The list of currently-in-use domains, together with the descriptions, ports, and protocols used, is displayed. - Use the information from the API query to create a list of domains to be whitelisted within your corporate firewall rules.
Avigilon Alta only guarantees continued operation of all Alta Video functions if wildcard domains are used for your firewall allow lists, or if those Allow lists are automatically updated with the currently-in-use domain lists.
Whitelisting outbound cloud connection addresses
In some scenarios, Alta Video Cloud makes outbound connections, for example, when a cloud-based webhook is triggered. The IP addresses that these are sent from depends on the region configured for your deployment. To allow whitelisting of this traffic, Alta Video have created a DNS entry for each region. These are of the format:
nats.<region>.alta.avigilon.com, where <region> matches the region used in the URL for your deployment.
These DNS entries can be used to whitelist the source of the webhooks sent to your systems. For preference, you should enter the appropriate DNS name(s) into your firewall infrastructure directly, thereby ensuring that list of the IP addresses behind the name(s) is automatically kept up-to-date inside the firewall.
If you need to resolve these records manually in order to configure your infrastructure with IP addresses, then please note that the addresses are not fixed and will vary from time to time. You will need to ensure that you fetch the latest list on a regular basis to prevent messages sent to your systems from Alta Video from being blocked.