Firewall Configuration

Ingress Requirements for direct SIEM push

Firewall Allowlist for External Logging

Event logs configured through the Keeper Admin Console are pushed from Keeper's backend logging system through a static set of IP addresses. For added security, you can lock down your SIEM HTTP collector to the specific IP/ports listed below.

Inbound Requests (SIEM Events and Automator)

For customers who are receiving inbound requests from the Keeper production environment, use the below IP addresses. This applies to SIEM event reporting and SSO Cloud Automator.

US / Global

  • 34.194.242.137/32

  • 18.235.39.229/32

  • 54.208.20.102/32 (Connection verification only)

  • 34.203.159.189/32 (Connection verification only)

EU / Dublin

  • 54.246.149.209/32

  • 34.250.37.43/32

  • 52.210.163.45/32 (Connection verification only)

  • 54.246.185.95/32 (Connection verification only)

AU / Sydney

  • 54.206.253.126/32

  • 52.64.85.78/32

  • 3.106.40.41/32 (Connection verification only)

  • 54.206.208.132/32 (Connection verification only)

US / GovCloud

  • 18.253.101.55/32

  • 18.253.102.58/32

  • 18.252.135.74/32 (Connection verification only)

  • 18.253.212.59/32 (Connection verification only)

CA / Canada Hosted Customers

  • 35.182.155.224/32

  • 35.182.216.11/32 (Connection verification only)

  • 15.223.136.134/32 (Connection verification only)

JP / Tokyo Hosted Customers

  • 35.74.131.237/32

  • 54.150.11.204/32 (Connection verification only)

  • 52.68.53.105/32 (Connection verification only)

After external logging is established, it might be automatically put on pause if the external system becomes unavailable and the number of the events in the queue reaches a threshold of 50. If this happens, you will have to manually resume the external logging after correcting the issue. We recommend setting up an alert for the "Paused Audit log Sync" event so you get notified if the external logging is paused.

Last updated