Firewall & Proxy Rules
A web proxy bypass rule or firewall rule with the following information may be required in your environment to use Endor Labs successfully.
| Description | DNS | Direction / IP Address CIDR | Port |
|---|---|---|---|
| User access to Endor Labs UI | app.endorlabs.com |
Outbound (Egress) 32.133.71.122/32, 52.224.62.85/32 |
443 |
| CI system and user access to Endor Labs API and CLI downloads | api.endorlabs.com |
Outbound (Egress) 34.96.123.220/32, 52.234.140.241/32 |
443 |
| Access to The Endor Labs OSS API | api.oss.endorlabs.com |
Outbound (Egress) 52.170.129.128/32 |
443 |
| User access to Endor Labs documentation | docs.endorlabs.com |
Outbound (Egress) 34.123.199.118/32, 52.224.70.63/32 |
443 |
| Access to Endor Patches | factory.endorlabs.com |
Outbound (Egress) 52.224.70.62/32 |
443 |
| Access to Endor Patches | elprodoss.blob.core.windows.net |
N/A | 443 |
If you have configured integrations with third-party applications like Jira, you may need to configure additional egress rules to complete that integration. Consult the documentation for those applications to add the required rules.
endorctl, may attempt to connect to dynamically managed Endor Labs cloud resources not listed above. Egress restrictions that prevent such connections will not limit Endor Labs’ functionality.
Ingress rules for restricted environments
Endor Labs scans use dynamic IP addresses by default. If your environment requires IP allowlisting for firewall rules, contact Endor Labs’ support to enable Network Address Translation (NAT), which assigns a dedicated static IP address.
NAT IP allowlisting is required for:
- Self-hosted source code management systems: Bitbucket Data Center or self-hosted GitLab instances behind a firewall that Endor Labs needs to access for organization sync and repository cloning.
- IP-restricted cloud SCMs: Cloud-based source code management systems that enforce IP allowlisting for app installations and API access.
- Self-hosted artifact registries: Private artifact repositories that Endor Labs needs to access during dependency resolution in monitoring scans.
Configure NAT IP allowlisting
To enable NAT IP allowlisting for your tenant:
- Contact Endor Labs support to enable NATed network requests for your tenant and obtain the NAT IP address.
- Configure firewall ingress rules to allow HTTPS (port 443) traffic from the provided Endor Labs NAT IP address to your internal resources.
Feedback
Was this page helpful?
Thanks for the feedback. Write to us at support@endor.ai to tell us more.
Thanks for the feedback. Write to us at support@endor.ai to tell us more.