Optimal Firewall Configuration - GoToTraining - LogMeIn

Find an Answer

Search GoToTraining articles, videos and user guides   Your search term must have 2 or more characters.

Browse Articles

Optimal Firewall Configuration

This page covers information involving the servers used for our GoTo products (GoToMeeting, GoToWebinar, GoToTraining, GoToAssist, GoToMyPC, and OpenVoice). Also see Whitelisting and LogMeIn for additional information on our other LogMeIn products.

Note: Also see our Customer Community to subscribe to notifications when firewall information is updated (click Follow to subscribe).

Our GoTo products are configured to work through outbound TCP ports 8200, 443 and 80, as well as UDP ports 8200 and 1853. Our products do not require any inbound connections. Outbound TCP port 443 is required in all cases. Connections via outbound TCP port 8200 are optimal for in-session communication, although TCP ports 443 and 80 can also be used. Optimal audio and video require that the UDP ports also be open.

Integrated Voice over IP (VoIP) connections are configured to work outbound through UDP port 8200. Integrated webcam video support is configured through UDP port 1853.

For InRoom Link video conference systems, configure your corporate firewall to enable the following send ports - 1720 TCP, 3000-4000 TCP, and 3000-4000 UDP. You can keep these ports closed when you are not using InRoom Link.

For most firewall or proxy systems, we recommend specifying a whitelist of DNS names for GoTo services so outbound connections can be made. The list of GoTo domains currently includes (but is not limited to) the following:

DomainDescription/Purpose
*.assist.com Product domain used by GoToAssist
api.filepicker.io

Third-party file-hosting service used by multiple GoTo products

Note: This will soon change to *.filestackapi.com.

*.citrixonline.com Corporate domain used by multiple GoTo products (until 12/4/17)
*.citrixonlinecdn.com Content delivery network (CDN) used by multiple GoTo products (until 12/4/17)
*.cloudfront.net Third-party CDN used by multiple GoTo products
*.expertcity.com Corporate domain used by multiple GoTo products
*.fastsupport.com Product domain used by GoToAssist
*.filestackapi.com

Third-party file-hosting service used by multiple GoTo products

(NEW! FilePicker has changed their name)

*.getgo.com Product domain used by multiple GoTo products
*.getgocdn.com CDN used by multiple GoTo products
*.getgoservices.com Product domain used by multiple GoTo products
*.getgoservices.net Product domain used by multiple GoTo products
*.go2assist.me Product domain used by GoToAssist
*.gofastchat.com Product domain used by GoToAssist
*.goto-rtc.com Real-time communication service used by multiple GoTo products
*.gotoassist.com Product domain used by GoToAssist
*.gotoassist.at Product domain used by GoToAssist
*.gotoassist.me Product domain used by GoToAssist
*.gotomeet.at Product domain used by GoToMeeting
*.gotomeet.me Product domain used by GoToMeeting
*.gotomeeting.com Product domain used by GoToMeeting
*.gotomypc.com Product domain used by GoToMyPC
*.gototraining.com Product domain used by GoToTraining
*.gotowebinar.com Product domain used by GoToWebinar
*.helpme.net Product domain used by GoToAssist
*.joingotomeeting.com Product domain used by GoToMeeting
*.jointraining.com Product domain used by GoToTraining
*.joinwebinar.com Product domain used by GoToWebinar
*.logmein.com Product domain used by LogMeIn (product)
*.logmeininc.com Corporate domain used by multiple GoTo products
*.openvoice.com Product domain used by OpenVoice, GoToMeeting and join.me
*.osdimg.com CDN used by multiple GoTo products (until 12/4/17)
*.raas.io Real-time communication service used by multiple GoTo products
*.webinar.com Product domain used by GoToWebinar

Important Note: Changes to the firewall configuration are discouraged unless absolutely necessary because our IP ranges and those of our provider networks need to be periodically audited and modified, creating additional maintenance to your network. These changes are necessary to continue to provide the maximum performance for our GoTo products. Maintenance and failover events may cause you to connect to servers within any of the ranges.

If your firewall includes a content or application data scanning filter, this may cause blocking or latency, which would be indicated in the log files for the filter. To address this problem, verify the below IP ranges will not be scanned or filtered by specifying exception IP ranges that will not be filtered. If your security policy requires you to specify explicit IP ranges, then configure your firewall to limit port 8200 or 80 or 443 destination, UDP ports 8200 and 1853 and IP addresses to only the LogMeIn ranges and those of our provider networks given below.

GoTo server / Datacenter IP addresses for use in firewall configurations

Equivalent specifications in 3 common formats

Assigned
Range by Block
Numeric IP
Address Range
Netmask NotationCIDR Notation
Block 1216.115.208.0 - 216.115.223.255216.115.208.0 255.255.240.0216.115.208.0/20
Block 2216.219.112.0 - 216.219.127.255 216.219.112.0 255.255.240.0 216.219.112.0/20
Block 366.151.158.0 - 66.151.158.255 66.151.158.0 255.255.255.0 66.151.158.0/24
Block 466.151.150.160 - 66.151.150.191 66.151.150.160 255.255.255.224 66.151.150.160/27
Block 566.151.115.128 - 66.151.115.191 66.151.115.128 255.255.255.192 66.151.115.128/26
Block 664.74.80.0 - 64.74.80.255 64.74.80.0 255.255.255.0 64.74.80.0/24
Block 7202.173.24.0 - 202.173.31.255 202.173.24.0 255.255.248.0 202.173.24.0/21
Block 867.217.64.0 - 67.217.95.255 67.217.64.0 255.255.224.0 67.217.64.0/19
Block 978.108.112.0 - 78.108.127.255 78.108.112.0 255.255.240.0 78.108.112.0/20
Block 1068.64.0.0 - 68.64.31.255 68.64.0.0 255.255.224.0 68.64.0.0/19
Block 11206.183.100.0 - 206.183.103.255 206.183.100.0 255.255.252.0 206.183.100.0/22
Block 12173.199.0.0 - 173.199.63.255 173.199.0.0 255.255.192.0 173.199.0.0/18
Block 13103.15.16.0 - 103.15.19.255 103.15.16.0 255.255.252.0 103.15.16.0/22
Block 14180.153.30.0 - 180.153.31.255 180.153.30.0 255.255.254.0 180.153.30.0/23
Block 1523.239.224.0 - 23.239.255.25523.239.224.0 255.255.224.023.239.224.0/19
Block 16185.36.20.0 - 185.36.23.255185.36.20.0 255.255.252.0185.36.20.0/22

 

IPv6 addresses space

Assigned
Range by Block
Classless Inter-Domain Routing (CIDR) format
Block 12620:0:c70::/48
Block 22a04:6660::/30

We scale our services into third-party cloud and carrier networks for improved performance. To ensure continuous up-time, we also maintain data centers in the following regions:

  • U.S.: Nevada, Georgia, Virginia
  • Global: Netherlands, Germany, India, China
  • Global Public Cloud (including, but not limited to): California, Oregon, Virginia, Singapore, Australia, Japan
  • Content Delivery Public Cloud (including, but not limited to): California, Washington, Texas, Indiana, Missouri, New Jersey, Brazil, United Kingdom, Amsterdam, Germany, France, Italy Hong Kong, Japan, Singapore

IP ranges for the content delivery network (CDN)

IP ranges for other services (audio, video and screen sharing)

IP ranges for Cloudflare (specific to GoToMyPC)