Firewall Whitelisting

To ensure full access to the app and to meet the security requirements, the following IP addresses/domains should be whitelisted in the firewall:

IPv4:

  • 20.52.214.40
  • 20.170.3.149
  • 20.113.162.111 (from 08/19/23)

TCP/80 (only for redirects) TCP/443 (HTTP 1.1 and HTTP 2!)

  • .flipcorp.de
  • .flip-app.com
  • .flipcms.de

  • *.getflip.com
  • *.getflip.email
  • *.getflip.cloud
  • *.getflip.dev
  • *.getflip.link

If you use your own domain for Flip, you must whitelist it as well.

 

Open ports 5228, 5229, 5230 for Firebase communication.
Opened communication at proxy level between the source server and following URLs:

Apple APNs:

Source IP: <intern>
Destination HOST/IP : meet.flipapp.de / IPv4: 142.132.155.149 and IPv6: 2a01:4f8:261:2b5a::f0
TCP/80
TCP/443
TCP/5349
UDP/10000
UDP/3478

 

Push-Notifications

 

Mobile Apps

Our Android and iOS app uses certificate pinning. Please ensure that the SSL certificates for operating the mobile apps with VPN/MDM are not manipulated.

Certificate pinning is a security mechanism used in the authentication of client-server connections, especially for secure communication via HTTPS (Hypertext Transfer Protocol Secure) or other TLS (Transport Layer Security) protocols. Its main purpose is to increase the security of the connection by reducing the risk of man-in-the-middle (MITM) attacks. This ensures that the client only communicates with a trusted server. 

Was this article helpful?

1 out of 1 found this helpful

Have more questions? Submit a request

Comments

0 comments

Please sign in to leave a comment.