Firewall
Playback of videos hosted on the 3Q platform does not require any special firewall configuration. Video and media delivery is handled via standard HTTP(S) and works without additional port releases.
If content uploads or live stream ingestion are performed from a restricted or secured network, additional firewall rules may be required as described below.
Video Player Requirements (Web SDK)
To ensure successful video playback using the 3Q Web SDK, the following conditions must be met:
Domain Accessibility
The following domains must be reachable via HTTP and HTTPS on standard ports (80/443), including all subdomains:
3qsdn.com3q.video
Browser Support
The browser in use must be a vendor-supported, up-to-date version of a common web browser. Only officially supported browsers are recommended for production use.
Content Ingest
On-Demand Uploads
On-demand video content is uploaded exclusively via HTTPS. No additional protocols or ports are required beyond standard HTTPS connectivity.
Livestream Ingest
For livestream delivery to the 3Q platform, the following protocols are supported:
RTMP
RTMPS
SRT
The corresponding protocols and ports must be allowed in the firewall configuration of the encoder or ingesting system.
RTMP
Protocol: TCP
Destination Port: 1935
Destination Hosts:
de-origin-ingest-live.3qsdn.comde-origin-ingest-live-02.3qsdn.comat-origin-ingest-live.3qsdn.comus-origin-live-nyk-01.3qsdn.com
RTMPS
Protocol: TCP
Destination Port: 443
Destination Hosts:
de-origin-ingest-live.3qsdn.comde-origin-ingest-live-02.3qsdn.comat-origin-ingest-live.3qsdn.comus-origin-live-nyk-01.3qsdn.com
SRT
Protocol: UDP
Destination Port:
Individually assigned per livestream
Port range: 1024–65535
Destination Hosts:
de-origin-ingest-live.3qsdn.comde-origin-ingest-live-02.3qsdn.comat-origin-ingest-live.3qsdn.comus-origin-live-nyk-01.3qsdn.com
Firewall Configuration Using IP Addresses
If DNS-based firewall rules are not supported in your environment, it is recommended to allow outbound connections for the required destination ports without restricting the destination address.
If your corporate security policies require explicit destination addresses, the following IP ranges may be used.
IPv4 Address Ranges
31.7.178.128/2731.7.180.96/2831.7.180.128/2731.7.185.0/2831.7.187.0/2735.231.219.190/3237.58.30.0/2391.242.173.0/24167.235.244.250/32185.175.64.0/24
IPv6 Address Ranges
2a14:30c0::/322a14:30c1::/322001:67c:6d8::/482a01:4a0:5::/48
Important: These address ranges include all possible IPs used for livestream ingest. HTTP and HTTPS access cannot be reliably restricted by IP address and must always be permitted based on domain names.
Recommendation
Based on operational experience, maintaining manual IP-based firewall rules carries a significant risk of service disruption due to infrastructure changes.
For this reason, it is strongly recommended to:
Use DNS-based firewall rules whenever possible, or
Allow the encoder system unrestricted outbound connections on the required destination ports
This approach ensures long-term stability and uninterrupted content delivery.
Last updated