Network requirements
Zoom Workplace
The Zoom Workplace app uses the standard Firewall ports and IP ranges. To add the required Firewall rules, refer to the Zoom firewall rules and Firewall rules for Zoom website sections in the Zoom network firewall or proxy server settings page.
Zoom PSI
Firewall rules for incoming traffic:
When the Client is on the Internet, the following incoming traffic must be allowed for the Zoom PSI client:
- SIP over TLS (TCP port 5061): The Zoom PSI client, like any other SIP remote client, must be able to connect to the external firewall of the MBG SBC, which is located in the DMZ. It should be able to connect to the SIP/TLS port of the access interface of MBG SBC via the external firewall. The default port value is 5061.
- SRTP media traffic (UDP): SRTP packets should be forwarded to the access interface of the SBC, based on the configured port range of the MBG SBC.
Firewall rules for outgoing traffic:
When the Client is on-premise, the following outgoing traffic must be allowed for the Zoom PSI client:
- DNS (UDP/TCP port 53): PSI client needs to resolve the FQDN of the external firewall of the MBG using DNS.
- SIP over TLS (TCP port 5061): PSI client must be connected to the external firewall of the MBG SBC using the SIP/TLS. The default value is 5061.
- SRTP media traffic (UDP) : SRTP must be allowed to reach the external firewall of the MBG SBC, based on the configured port range of the MBG.
↑