Network Security Diagram
Simplified Rules
If *.vsee.com
can be whitelisted, please add this into your firewall rules with the following ports:
Purpose | Protocol: Port | Detail Servers |
VSee Directory, Relay, Call management, Diagnostics, etc. Required for VSee Messenger authentication, address book services, establishing video calls, video packets relay, VSee Messenger chat communication. Measure bandwidth for video quality adjustment |
|
|
Call presence and reporting Update VSee user’s status, e.g. Offline, Online, In a call, Busy, etc. |
|
|
Cloud recording service (Optional, depends on contract) Record video calls performed via VSee Messenger and/or in-browser calls. The calls will be recorded on the server side and will be available via a cloud link. |
|
|
Detailed Rules (US Customers)
Please note the servers listed below are for calls within the United States only.
If *.vsee.com
cannot be whitelisted, the following subdomains and ports are required.
Purpose | Protocol: Port | Servers | IP Addresses | |
---|---|---|---|---|
MESSENGER SERVICE | ||||
VSee Directory |
|
|
|
|
US TURN Servers |
|
|
|
|
Region Identification Service |
|
|
| |
Video Bridge |
|
|
| |
Messenger update service Automated check for new versions of VSee Messenger |
|
| ||
Profile management Managing VSee user profile, changing password, etc. |
|
| ||
|
| |||
Messenger diagnostics Diagnostic information gathered by VSee Messenger |
|
|
| |
CLINIC SERVICE | ||||
Clinic web and API cluster Basic Clinic functionality |
|
|
| |
Call presence and reporting Update VSee users' presence status. |
|
| ||
| ||||
|
| |||
OPTIONAL FIREWALL RULES | ||||
MFA / SSO (Depends on contract) Enables login with MFA or using an SSO identity provider. | TCP: 443 |
| See https://auth0.com/docs/secure/security-guidance/data-security/allowlist | |
Cloud recording (Depends on contract) Record video calls performed via VSee Messenger and/or in-browser calls. The calls will be recorded on the server side and will be available via a cloud link. |
|
| ||
Connectivity Testing Service A set of test tools to define if the VSee user’s network conditions are good enough for video calls, checking the reachability of critical VSee infrastructure. |
|
|
|
Detailed Rules (International Customers)
For international customers, please apply all rules in the US Customers section as well as the following:
Purpose | Protocol: Port | Detail Servers | ||
---|---|---|---|---|
International TURN servers |
|
|
|
|
Video Bridge |
|
|
|
Proxy Servers
Many organizations utilize proxy servers with their networks. However, as VSee network traffic is already encrypted, passing this traffic through a proxy server does not make it any more secure. On the other hand, proxy servers can introduce performance problems. Proxy servers can introduce latency and packet loss, which can degrade audio and video quality where real-time streams are essential. Thus, bypassing proxies for VSee traffic is recommended as routing through all traffic through a proxy server might impact connectivity and A/V performance.
If proxy servers can not be bypassed, VSee services can connect to the above hosts via a proxy server. We recommend the following for better performance with a proxy server:
Proxy servers should allow persistent TCP connections.
Proxy servers should be configured to allow UDP traffic to the VSee TURN Servers at port 3478 and the Video Bridges at port 10000 to proceed directly.
Testing VSee Connectivity
VSee provides a suite of tools to help test that firewall rules are configured appropriately. Please note that only a subset of the requirements listed above are tested by these tools. It is important to ensure that the firewall rules listed above are followed, even if these tests pass. Failing to follow the firewall configuration requirements may cause issues such as intermittent bad call quality or dropped calls.
Test | URL |
---|---|
Basic VSee connectivity | |
TURN connectivity | |
Video Bridge connectivity | |
Other tools |
Outbound Connections
VSee services may occasionally need to connect with your systems for webhooks and callbacks, or to securely transfer patient / encounter data through SFTP, etc. Here are the lists of IP addresses that should be whitelisted.
Messenger Service
Expand | ||
---|---|---|
| ||
|
Clinic Service
Expand | ||
---|---|---|
| ||
|
Updates
Update on 21 Jun 2022:
Removed International Relays
sg01-rel.vsee.com, euw01-rel.vsee.com
Update on 15 Jun 2022:
Removed US Relays
use01-rel.vsee.com, use02-rel.vsee.com
This page is also available here https://vsee.com/firewall