Skip to main content

IP Whitelisting

What IP Whitelisting Does

IP Whitelisting ensures that GCXONE servers can communicate securely with customer devices over the internet. By allowing only the specified IP addresses and ports, customers can maintain a secure and controlled network environment while enabling full platform functionality.

Why It Matters

Without proper IP whitelisting, GCXONE may be unable to reach devices behind customer firewalls, resulting in failed connections, missing alarms, and unavailable video streams. Whitelisting the required IPs guarantees seamless connectivity between customer devices and GCXONE infrastructure.

How It Works

Mandatory IPs

The following IP addresses must be whitelisted for all customers regardless of device type:

IP AddressPurpose
18.185.17.113Genesis Primary Gateway
3.124.50.242Genesis Secondary Gateway
3.126.237.150Streaming Primary Gateway
3.75.73.51Streaming Secondary Gateway
18.156.39.63Streaming Secondary Gateway
3.127.50.212Messaging Services

Device-Specific IPs

In addition to the mandatory IPs, customers must whitelist the following IPs based on their device type:

DeviceIP AddressPurpose
Camect3.122.169.231Camect Alarm Receiver Gateway
Dahua52.59.60.20Dahua Alarm Receiver Gateway
Hikvision35.156.60.98Hikvision Alarm Receiver Gateway
Hanwha18.184.110.24Hanwha Alarm Receiver Gateway
Milestone3.66.98.181Milestone Alarm Receiver Gateway
Uniview18.158.140.99Uniview Alarm Receiver Gateway
Heitel3.123.206.197Heitel Gateway 1 (Live Video)
Heitel3.124.38.48Heitel Gateway 2 (Events)
ADPROUpon requestADPRO Alarm Receiver Gateway

Key Capabilities

Talos Customers

Customers using Evalink Talos must additionally whitelist the following:

Inbound Connections

  • 195.8.103.10
  • 195.8.103.11
  • 195.8.103.12
  • 193.151.94.10
  • 193.151.94.11
  • 193.151.94.12

Outbound Connections

  • 91.240.18.20
  • 91.240.19.20

Wildcard Allow-List

  • *.evalink.io
  • *.talos-app.io
  • *.eu.auth0.com

Port Enabling Guidelines

For customers using public devices, the required ports depend on the specific device type. The following port types must be enabled based on the customer's setup:

  • Web console ports
  • Server ports
  • RTSP ports

Any custom port-forwarded ports configured at the customer's environment IP Whitelisting (Wildcard Support)

Domains, Ports and Protocols

For Firewalls that Support Wildcard Domain Whitelisting

IP/DomainPortProtocolPurpose
*.nxgen.cloud443HTTPSGenesis Web App Access
*.eu.auth0.com443HTTPSAuth0 Login Access
*.auth0.com443HTTPSGenesis Web App Dependency
*.cloudflare.com443HTTPSGenesis Web App Dependency
*.fontawesome.com443HTTPSGenesis Web App Dependency
unpkg.com443HTTPSGenesis Web App Dependency
*.googleapis.com443HTTPSGenesis Web App Dependency
*.what3words.com443HTTPSGenesis Web App Dependency
fonts.gstatic.com443HTTPSGenesis Web App Dependency
*.amazonaws.com443HTTPSGenesis Web App Dependency
*.evalink.io443HTTPSTalos CMS Web Application
meetbeta.nxgen.cloud (3.126.237.150)1880 10000 to 10500HTTP/S WSSGenesis Streaming Server Individual Streaming Agents to handle multiple streaming requests
meetbeta02.nxgen.cloud (3.75.73.51)80, 443 14891HTTP/S HTTPS, WSS, WebrtcGenesis Streaming Server BackupGenesis Streaming Manager and Agent
monitor.nxgen.cloud (3.127.50.212)80, 443 1883HTTP/S MQTTGenesis Alerts Manager Genesis Alerts Service
streaming03.nxgen.cloud (18.156.39.63)1880 8005 to 9005, 51984HTTP/S HTTP/STCP/UDPGenesis Proprietary Streaming Service Genesis Proprietary Streaming Agents
*.twilio.com443HTTPSGenesis VOIP Manager
*.us1.twilio.com443HTTPSGenesis VOIP Agent
*.sip.twilio.com443HTTPSGenesis VOIP Agent
registry.npmjs.org443HTTPSGenesis Dependency Management
*.hik-partner.com443HTTPSHik Partner Access
open.dolynkcloud.com443HTTPSDahua DoLynk Portal Access
18.158.38.1781880, 19225 to 19232, 19245, 19250HTTP, TCPAMWin(DC09)
Note

Other than the above Domains, Ports and Protocols, in case if the user is trying to access Customer's devices (for ex. hikvision), its IP might be public/VPN based, those customer IP, Ports and Protocols need to be added in the whitelist/rules to make sure Genesis Access those devices in Peer-2-Peer mode to enable faster streaming access.

For Firewalls that Do Not Support Wildcard Domain Whitelisting

IP/DomainPortProtocolPurpose
* tenantname*.nxgen.cloud443HTTPSGenesis Web Application Access
api.nxgen.cloud443HTTPSAPI Access for Genesis Web
nxgen.eu.auth0.com443HTTPSAuth0 Login Access
cdn.auth0.com443HTTPSGenesis Web App Dependency
cdn.eu.auth0.com443HTTPGenesis Web App Dependency
cdnjs.cloudflare.com443HTTPSGenesis Web App Dependency
use.fontawesome.com443HTTPSGenesis Web App Dependency
unpkg.com443HTTPSGenesis Web App Dependency
maps.googleapis.com443HTTPSGenesis Web App Dependency
khms0.googleapis.com443HTTPSGenesis Web App Dependency
khms1.googleapis.com443HTTPSGenesis Web App Dependency
assets.what3words.com443HTTPSGenesis Web App Dependency
fonts.googleapis.com443HTTPSGenesis Web App Dependency
fonts.gstatic.com443HTTPSGenesis Web App Dependency
events-snapshots.s3-eu-central-1.amazonaws.com443HTTPSGenesis Web App Dependency
nxgen-multi-language.s3-eu-central-1.amazonaws.com443HTTPSGenesis Web App Dependency
nxgen-organization-images.s3-eu-central-1.amazonaws.com443HTTPSGenesis Web App Dependency
nxg-reference-img-upload-test.s3-eu-central-1.amazonaws.com443HTTPSGenesis Web App Dependency
nxgen-sensor-icons.s3-eu-central-1.amazonaws.com443HTTPSGenesis Web App Dependency
talos.evalink.io443HTTPSTalos CMS Web Application
login.evalink.io443HTTPSTalos CMS Web App Dependency
sitasys-prod.eu.auth0.com443HTTPSTalos CMS Web App Dependency
assets.what3words.com443HTTPSGenesis Web App Dependency
insightsbeta.nxgen.cloud443HTTPSGenesis Web App Dependency
insightsbeta02.nxgen.cloud443HTTPSGenesis Web App Dependency
meetbeta.nxgen.cloud (3.126.237.150)1880HTTP/SGenesis Streaming Server
meetbeta.nxgen.cloud (3.126.237.150)10000 to 10500WSSIndividual Streaming Agents to handle multiple streaming requests
meetbeta02.nxgen.cloud (3.75.73.51)80, 443HTTP/SGenesis Streaming Server Backup
meetbeta02.nxgen.cloud (3.75.73.51)14891HTTPS, WSSGenesis Streaming Manager and Agent
monitor.nxgen.cloud (3.127.50.212)80, 443HTTP/SGenesis Alerts Manager
monitor.nxgen.cloud (3.127.50.212)1883MQTTGenesis Alerts Service
streaming.nxgen.cloud443HTTPSGenesis Streaming Server Fallback
streaming03.nxgen.cloud (18.156.39.63)1880HTTP/SGenesis Proprietary Streaming Service
streaming03.nxgen.cloud (18.156.39.63)8005-9005, 51984HTTP/S, TCP/UDPGenesis Proprietary Streaming Agents
sdk.twilio.com443HTTPSGenesis VOIP Manager
chunderw-vpc-gll.twilio.com443HTTPSGenesis VOIP Agent
eventgw.us1.twilio.com443HTTPSGenesis VOIP Agent
genesisaudio.sip.twilio.com443HTTPSGenesis VOIP Agent
registry.npmjs.org443HTTPSGenesis Dependency Management
ieu.hik-partner.com443HTTPSHik Partner Access
open.dolynkcloud.com443HTTPSDahua DoLynk Portal Access
18.158.38.1781880, 19225 to 19232, 19245, 19250HTTP, TCPAMWin (DC09)
note

Other than the above Domains, Ports and Protocols, in case if the user is trying to access Customer's devices (for ex. hikvision), its IP might be public/VPN based, those customer IP, Ports and Protocols need to be added in the whitelist/rules to make sure Genesis Access those devices in Peer-2-Peer mode to enable faster streaming access.

Real-World Use Cases

  • A new customer onboards with Hikvision NVRs — the IT team whitelists the mandatory IPs plus the Hikvision-specific IP before go-live, ensuring alarms and video streams reach GCXONE without interruption.
  • A customer using Evalink Talos cannot receive alarm dispatches — IT discovers the Talos inbound IPs are blocked by the corporate firewall and adds them to the whitelist.
  • A customer's firewall supports wildcard domain whitelisting — IT uses the *.evalink.io and *.talos-app.io entries instead of managing individual IPs.

Best Practices

  • Always whitelist the mandatory IPs first before adding device-specific IPs — these are required for all customers regardless of device type.
  • Whitelist device-specific IPs based on the exact device type deployed — do not whitelist IPs for devices that are not in use.
  • For Talos customers, whitelist both inbound and outbound IPs — missing either direction will break alarm delivery.
  • Contact support before go-live to obtain the ADPRO Alarm Receiver Gateway IP if ADPRO devices are in use.
Loading...