Network Requirements

JFrog Connect is based on client-server architecture. This page provides a high-level overview of the network specifications for JFrog Connect operating in cloud SaaS mode.

If you have questions about additional requirements, please contact us to discuss.

Protocols

As one method of enhancing network security, there are no open ports or running servers on the edge devices. Communication with Connect Agent works via outbound requests to ensure zero attack surfaces for attackers.

  • The edge device uses UDP and port 53 to resolve hostnames and connect with the JFrog Connect servers.

  • The Connect Agent and servers communicate on TCP as follows:

    • Remote Terminal uses SSH protocol on port 442 or 443

    • Remote access using port tunneling uses SSH protocol on port 22

    • All other client-server communication uses HTTPS TLS encryption on port 443

Server Allowed List

To use JFrog Connect, ensure that the following Outbound domains and IP addresses are on your allowed list:

JFrog Connect Domains
Static IP

api.connect.jfrog.io

3.127.6.122,

35.159.42.141

connect.jfrog.io

3.127.6.122,

35.159.42.141

remote.connect.jfrog.io

3.66.25.214

forwarding.connect.jfrog.io

18.158.25.22

Artifactory Cloud NATed IPs

To pull from JFrog Artifactory, ensure the following Outbound domains and IP addresses are on your Allowed List.

Remote Control & Remote Access

Remote access features enable you to easily connect to the edge device. All requests are outbound from the device to JFrog Connect servers. If there are strict network policies, allow outbound requests as described below.

Remote Terminal

  • Domain: remote.connect.jfrog.io

  • Static IP: 3.66.25.214

  • Ports: 442, 443

Port Tunneling

  • Domain: forwarding.connect.jfrog.io

  • Static IP: 18.158.25.22

  • Ports: Will try 22 first, then 443, then 80

What’s Next?

Last updated