If the Intra2net System is not used directly on the Internet, but behind a firewall, some connections have to be allowed on it.
Intra2net has the right to change the IP addresses behind the DNS names at any time and without prior notice. Only changes to the DNS name will be announced in advance. If your firewall does not accept DNS names and cannot update them regularly, it is advisable to either check the DNS names on a regular basis or to release all connections from the Intra2net system to the corresponding ports.
Intra2net systems must be able to establish connections (outgoing connections) to the following targets:
|Target Port / Packet Type
|System updates, anti-spam updates, licenses, coordination of antivirus updates
|Antivirus Update Data
|Antivirus cloud for real-time scanning of virus checksums
|Antivirus cloud for real-time queries of false positives
|*.intra2net.pool.ntp.ntp.org or NTP server of choice
|TCP and UDP
|5000 to 5050
|Manufacturer Remote Maintenance
|Your DNS Server
|TCP and UDP
|Razor Spam Detection
Other possible services to be activated are email (POP3 and SMTP) as well as HTTP, HTTPS and FTP for the Intra2net system proxy.
If you want to use the services listed below, you must open the corresponding ports for incoming connections from the Internet:
Web groupware, Activesync, remote maintenance
Note: The port number used for web groupware and remote maintenance can be changed. Activesync works on port 443 only.
|Issuing and renewing certificates via Let's Encrypt
|Receive incoming emails via SMTP (MX record points to external IP)
|Sending emails by external users
|Retrieval of emails and groupware data by external users
|500 and 4500
|Incoming VPN connections