HELP FILE

What are the optimal firewall configurations?

    If you or your company uses firewall allowlist to restrict network access to only specific websites or software, then you can use the information below to ensure that your service can connect.

    Also see our Customer Community to subscribe to notifications when firewall information is updated (click Follow to subscribe).

    Ports

    Our GoTo products are configured to work with the following ports.

    Port Purpose
    Outbound TCP 443 Required, used by all products
    Outbound TCP 80 Recommended, used for in-session communication
    Inbound connections Not required

    Domains

    For most firewall or proxy systems, we recommend specifying an allowlist of DNS names for GoTo services so that outbound connections can be made. The list of GoTo domains currently includes (but is not limited to) the lists below.

    Domain Description/Purpose
    api.filepicker.io
    *.filestackapi.com
    *.cloudfront.net Third-party CDN
    *.expertcity.com Product domain used by multiple GoTo products
    *.getgo.com Product domain used by multiple GoTo products
    *.getgocdn.com CDN used by multiple GoTo products
    *.getgoservices.com Product domain used by multiple GoTo products
    *.getgoservices.net Product domain used by multiple GoTo products
    *.goto-rtc.com Real-time communication service used by multiple GoTo products
    *.GoTo.com Corporate domain used by multiple GoTo products
    *.GoToinc.com Corporate domain used by multiple GoTo products
    *.GoTo.eu Corporate domain used by multiple GoTo products
    *.raas.io Real-time communication service used by multiple GoTo products
    *.accounts.logme.in Corporate domain used by multiple GoTo products
    *.internap.net Powers updates to mulitple GoTo products
    *.internapcdn.net Powers updates to mulitple GoTo products
    *.measurement-lab.org Required for session diagnostic feature during remote session

    GoToMyPC

    GoToMyPC Domains
    *.GoToMyPC.com

    Important considerations for allowlisting by IP Ranges

    It is recommended to use wildcard rules whenever possible while allowlisting or blocking any GoTo services on your network as sub-domains of the domains listed above are included. Also, the client-to-host connection uses peer-to-peer connections, encrypted within a 256-bit AES tunnel.

    Use of IP ranges instead of domain names for the firewall configuration is discouraged unless absolutely necessary because our IP ranges and those of our provider networks need to be periodically audited and modified, creating additional maintenance for your network. These changes are necessary to continue to provide the maximum performance for our GoTo products. Maintenance and failover events within our infrastructure may cause you to connect to servers within any of the ranges.

    If your firewall includes a content or application data scanning filter, this may block the connection or cause increased latency which would be indicated in the log files for the filter. To address this problem, verify that the domains or IP ranges will not be scanned or filtered by specifying exception domains or IP ranges. If your security policy requires you to specify explicit domain or IP ranges, then configure your firewall exceptions for outbound TCP ports 8200, 443, and 80 as well as UDP ports 8200 and 1853 for the GoTo domains or IP ranges, including those of our third-party provider networks.

    GoTo server / Data Center IP addresses for use in firewall configurations

    Equivalent specifications in 3 common formats

    Assigned Range by Block Numeric IP Address Range Netmask Notation CIDR Notation
    Block 1 216.115.208.0 - 216.115.223.255 216.115.208.0 255.255.240.0 216.115.208.0/20
    Block 2 216.219.112.0 - 216.219.127.255 216.219.112.0 255.255.240.0 216.219.112.0/20
    Block 3 66.151.158.0 - 66.151.158.255 66.151.158.0 255.255.255.0 66.151.158.0/24
    Block 4 202.173.24.0 - 202.173.31.255 202.173.24.0 255.255.248.0 202.173.24.0/21
    Block 5 67.217.64.0 - 67.217.95.255 67.217.64.0 255.255.224.0 67.217.64.0/19
    Block 6 78.108.112.0 - 78.108.127.255 78.108.112.0 255.255.240.0 78.108.112.0/20
    Block 7 68.64.0.0 - 68.64.31.255 68.64.0.0 255.255.224.0 68.64.0.0/19
    Block 8 206.183.100.0 - 206.183.103.255 206.183.100.0 255.255.252.0 206.183.100.0/22
    Block 9 173.199.0.0 - 173.199.63.255 173.199.0.0 255.255.192.0 173.199.0.0/18
    Block 10 180.153.30.0 - 180.153.31.255 180.153.30.0 255.255.254.0 180.153.30.0/23
    Block 11 216.219.114.0 - 216.219.115.255 216.219.114.0 255.255.254.0 216.219.114.0/23
    Block 12 (GoToMyPC only) 3.115.40.4
    Block 13 (GoToMyPC only) 3.115.108.206
    Block 14 (GoToMyPC only) 3.115.71.78

    The following IPs are for GoToMyPC only

    • 13.126.149.36
    • 15.207.122.204
    • 15.207.69.95
    • 18.208.34.42
    • 18.208.36.176
    • 18.211.250.42
    • 18.213.198.5
    • 18.213.148.95
    • 18.205.68.30
    • 18.213.12.92
    • 18.204.178.198
    • 18.205.174.74
    • 3.1.1.236
    • 35.177.17.239
    • 35.177.188.192
    • 44.231.178.11
    • 44.231.53.175
    • 44.232.175.228
    • 52.64.57.53
    • 52.64.243.203
    • 3.115.92.7
    • 3.115.108.206
    • 3.1.158.114

    Data Centers

    We scale our services into third-party cloud and carrier networks for improved performance. To ensure continuous up-time, we also maintain data centers in the following regions:

    • U.S.: Nevada, Georgia, Virginia
    • Global: Netherlands, Germany, India, China
    • Global Public Cloud (including, but not limited to): California, Oregon, Virginia, Singapore, Australia, Japan, India, England
    • Content Delivery Public Cloud (including, but not limited to): California, Washington, Texas, Indiana, Missouri, New Jersey, Brazil, United Kingdom, Amsterdam, Germany, France, Italy, Hong Kong, Japan, Singapore

    Third-party provider IP ranges