F5 Distributed Cloud Network Cloud Public IP Addresses

We strongly recommend verifying that your network allows connections to the IP addresses or domains listed in this document. If your application remains stuck in the ‘connecting’ mode or encounters network errors, review your firewall or proxy settings and update the allowlist configuration to permit connections to F5 Distributed Cloud network and associated locations such as docker registry. For automation purposes, you can download the subnet ranges and domains to be included in your network configuration by clicking here.

Public IPv4 Subnet Ranges

Configure your network firewall to allow connections from or to the IP address ranges specified in the following table:

Geography Protocol Ports IP Address Notes
Americas TCP 80, 443 5.182.215.0/25
84.54.61.0/25
23.158.32.0/25
84.54.62.0/25
185.94.142.0/25
185.94.143.0/25
159.60.190.0/24
159.60.168.0/24
UDP 4500 5.182.215.0/25
84.54.61.0/25
23.158.32.0/25
84.54.62.0/25
185.94.142.0/25
185.94.143.0/25
159.60.190.0/24
IPSec/UDP 4500 is optional as SSL for tunneling to global network is supported.
Europe TCP 80, 443 5.182.213.0/25
5.182.212.0/25
5.182.213.128/25
5.182.214.0/25
84.54.60.0/25
185.56.154.0/25
159.60.160.0/24
159.60.162.0/24
159.60.188.0/24
UDP 4500 5.182.213.0/25
5.182.212.0/25
5.182.213.128/25
5.182.214.0/25
84.54.60.0/25
185.56.154.0/25
159.60.160.0/24
159.60.162.0/24
159.60.188.0/24
IPSec/UDP 4500 is optional as SSL for tunneling to global network is supported.
Asia TCP 80, 443 103.135.56.0/25
103.135.57.0/25
103.135.56.128/25
103.135.59.0/25
103.135.58.128/25
103.135.58.0/25
159.60.189.0/24
159.60.166.0/24
159.60.164.0/24
UDP 4500 103.135.56.0/25
103.135.57.0/25
103.135.56.128/25
103.135.59.0/25
103.135.58.128/25
103.135.58.0/25
159.60.189.0/24
159.60.166.0/24
159.60.164.0/24
IPSec/UDP 4500 is optional as SSL for tunneling to global network is supported.

 

Public IPs for Secondary DNS zone transfer

Allow the following IP addresses for successful zone transfers if you use the F5 Distributed Cloud DNS zone management service:

  • 52.14.213.208
  • 3.140.118.214

Public IPs for Global Log Receiver

Allow the following IP ranges for successful functioning of the global log receiver:

  • 193.16.236.68/32
  • 185.160.8.156/32

Public IPs for DNSLB Health Checks

  • 18.142.173.13
  • 13.214.108.35
  • 13.215.164.186
  • 3.72.163.92
  • 3.123.183.172
  • 3.67.212.129
  • 35.176.105.69
  • 18.168.190.181
  • 35.176.214.241
  • 54.146.175.34
  • 52.0.217.222
  • 34.239.223.87
  • 52.34.2.190
  • 44.227.27.164
  • 35.84.99.9

Public IPs for Container Registries

Also, ensure that you allow the following ranges to enable access to the various container registries:

  • 23.158.32.48/29
  • 84.54.60.0/29
  • 84.54.61.48/29
  • 84.54.62.48/29
  • 103.135.56.48/29
  • 103.135.56.176/29
  • 103.135.57.48/29
  • 103.135.58.0/29
  • 103.135.58.128/29
  • 103.135.59.0/29
  • 159.60.164.0/29
  • 159.60.166.0/29
  • 185.56.154.0/29
  • 185.94.142.0/29
  • 185.94.143.0/29
  • 185.160.8.152/29
  • 185.160.8.160/29
  • 185.160.8.168/29
  • 185.160.8.176/29
  • 193.16.236.64/29
  • 193.16.236.88/29
  • 193.16.236.104/29

Allowed Domains

Add the following domains to your allowlist to enable firewall or proxy to allow connections from or to the domains:

Location Protocol Port Address Notes
F5 Distributed Cloud TCP 80, 443 *.ves.volterra.io
downloads.volterra.io
This specifies the F5 Distributed Cloud domain.
F5 Distributed Cloud AI Model Updates TCP 80, 443 *.blob.core.windows.net This specifies the domain for obtaining the AI model updates.
Azure Registry TCP 80, 443 volterra.azurecr.io
vesio.azureedge.net
*.azure.com
This specifies the domain for the Azure Registry.
Microsoft TCP 80, 443 *.microsoftonline.com This specifies the Microsoft domains.
AWS TCP 80, 443 *.amazonaws.com This specifies AWS domains.
Docker Registry TCP 80, 443 docker.io
docker.com
This specifies the domain for the Docker Registry.
Google Registry TCP 80, 443 *.gcr.io
gcr.io
storage.googleapi.com
This specifies the domain for the Google Registry.
Redhat Registry TCP 80, 443 update.release.core-os.net
quay.io
This specifies the domain for the Redhat Registry.
Webroot URL Classification Database TCP 80, 443 api.bcti.brightcloud.com This specifies the domain for webroot URL classification database.
CDN Domains UDP 53 traffic-router-0.cdn-gc.ves.volterra.io
traffic-router-1.cdn-gc.ves.volterra.io
cdn.ves.volterra.io
Domains for F5 Distributed Cloud Content Delivery Network.

IP Addresses for Site Provisioning

If your firewall does not support domain-based permissions, you can use the following list of outbound IPs that the Customer Edge (CE) Site needs to communicate with for initial provisioning. A DNS server is required for a Site to function correctly in resolving queries. Additionally, note that port 65500 is reserved for local UI and API access, so you may want to consider blocking or allowing this port as needed.

Note: IPs have the potential to change without F5 being aware of it. For this reason, using domain-based permissions is the preferred method rather than using this list.

  • 20.33.0.0/16
  • 74.125.0.0/16
  • 18.64.0.0/10
  • 52.223.128.0/18
  • 20.152.0.0/15
  • 13.107.238.0/24
  • 142.250.0.0/15
  • 20.34.0.0/15
  • 52.192.0.0/12
  • 52.208.0.0/13
  • 52.223.0.0/17
  • 18.32.0.0/11
  • 3.208.0.0/12
  • 13.107.237.0/24
  • 20.36.0.0/14
  • 52.222.0.0/16
  • 52.220.0.0/15
  • 3.0.0.0/9
  • 100.64.0.0/10
  • 54.88.0.0/16
  • 52.216.0.0/14
  • 108.177.0.0/17
  • 20.40.0.0/13
  • 54.64.0.0/11
  • 172.253.0.0/16
  • 20.64.0.0/10
  • 20.128.0.0/16
  • 172.217.0.0/16
  • 173.194.0.0/16
  • 20.150.0.0/15
  • 20.48.0.0/12
  • 72.19.3.0/24
  • 18.128.0.0/9
  • 23.20.0.0/14
  • 13.104.0.0/14
  • 13.96.0.0/13
  • 13.64.0.0/11
  • 13.249.0.0/16
  • 34.192.0.0/10
  • 3.224.0.0/12
  • 54.208.0.0/13
  • 54.216.0.0/14
  • 108.156.0.0/14
  • 54.144.0.0/12
  • 54.220.0.0/15
  • 54.192.0.0/12
  • 54.160.0.0/11

 

 

 

Source:
https://docs.cloud.f5.com/docs/reference/network-cloud-ref