Outbound firewall rules for allowing access to cloud controller

For the sake of fortifying the network, and opening up to the path to the cloud controller, what is the best practice to define outbound firewall rules in the UI according to https://help.alta.inc/hc/en-us/articles/29110607244571-Outbound-Firewall-Rules-Required? From what I can see the system does not allow for hostnames, but rather only explicitly entering the IPs.

I don’t think (personally) I have ever seen a firewall support hostnames for firewall rules as it would be a lot slower.

The hostnames just mean they need to be allowed (if you do blocking based on domains using say proxy)

1 Like

The instruction is probably targetted at scenarios where Route 10 is installed in an enviroment with a dedicated firewall infront. FQDN allow/block lists may be used so in specfic cases you;d need to ALLOW access to the Alta domians/ports/

WAN <—> FIREWALL <—> Route 10 <——>.Network

Unless you have something infront of the Route 10 , nothing more to do.

In most use cases not an issue.

1 Like

Ah, I see. :slightly_smiling_face: I don’t have definitive need for this, just playing around and was pondering on if and how one would be able to tighten the firewall while still ensuring access to the cloud controller in a dynamic way with the Route10. I will not bang my head for this :joy:

1 Like