Network Requirements

Firewall allowlist and network configuration for Vrex

Vrex is a cloud-connected desktop application. Corporate firewalls, VPNs, and proxies can block it if the destinations below are not permitted.

Allowlist table

All entries use the client network as the source. Copy this table directly into your firewall policy.

DestinationPort / ProtocolPurpose
app.vrex.noTCP 443Account administration
api.vrex.noTCP 443Device authentication; Issues
eu1.com.vrex.vixel.no (IP: 18.194.34.130)UDP 5055, UDP 5056Audio and real-time visual sync
cognito-idp.eu-central-1.amazonaws.comTCP 443User authentication (AWS Cognito)
2uhv8tme94.execute-api.eu-central-1.amazonaws.comTCP 443API — Vrex content
5n4hoaxzr1.execute-api.eu-central-1.amazonaws.comTCP 443API — User preferences
8uslevf82e.execute-api.eu-central-1.amazonaws.comTCP 443API — Web sockets (notifications / status)
szpdew7g70.execute-api.eu-central-1.amazonaws.comTCP 443API — Analytics
qcymfi5l22.execute-api.eu-central-1.amazonaws.comTCP 443API — Integrations (Issues / models)
uvn1nqbtvh.execute-api.eu-central-1.amazonaws.comTCP 443API — Google Speech to Text relay
speech.googleapis.comTCP 443Speech to text (optional feature)
vrex-projects-production.s3.eu-central-1.amazonaws.comTCP 4433D data buffer during sessions
vrex-projects-release.s3.eu-central-1.amazonaws.comTCP 443Application version check and update download

Tip: If your policy supports wildcards, *.vrex.no covers the three Vrex-owned domains.

What can block Vrex

  • Firewall — outbound TCP 443 and UDP 5055/5056 must be permitted to the destinations above
  • VPN — split-tunnel configurations may drop UDP traffic; ensure the Vrex destinations are excluded from inspection or routed correctly
  • Proxy — HTTPS proxies that perform SSL inspection can break Vrex authentication; add the Vrex domains to SSL/TLS scan exceptions

Security note

No original CAD files are distributed to meeting participants. Vrex streams model geometry from cloud storage (AWS S3, eu-central-1). Authentication is handled via AWS Cognito. Vrex does not require inbound connections from the internet.

Streaming (CloudXR / VR devices)

If your deployment includes VR headsets using cloud streaming, additional ports are required. Destination IPs are dynamic and drawn from Azure, AWS, and Google cloud ranges. Fixed IPs are available on request.

DescriptionDirectionProtocolPort(s)
CloudXR ControlOutboundUDP47999
CloudXR AudioOutboundUDP48000
CloudXR VideoOutboundUDP47998, 48005
CloudXR MicrophoneOutboundUDP48002
CloudXR RTSPInboundUDP48010
CloudXR AudioInboundUDP49006, 49003
CloudXR MicrophoneInboundUDP49005, 50000–55000
CloudXR RTSPInboundTCP49004
Interactive SpectatorOutboundUDP48020–48119
WebRTC STUN/TURNOutboundUDP, TCP3478, 80 (IPs: 162.55.53.5, 157.90.22.86)

Dynamic IP ranges: Azure · AWS · Google

Test your connection

After applying allowlist changes:

  1. Open Vrex Launcher and click Launch Vrex
  2. Log in — a successful login confirms authentication endpoints are reachable
  3. Open a project — models loading confirms S3 access is permitted
  4. Join or start a session with another user — audio working confirms UDP 5055/5056 is open
  5. If any step fails, check your firewall logs for blocked connections to the destinations above

Still blocked?

See Troubleshooting or email support@vixel.no