Allowlist requirements for IP addresses and URLs
To allow seamless connectivity to the Datto RMM web interface and between Agents, you must open TCP port 443 outbound through your firewall.
If your company has a more aggressive security posture for outbound traffic (for example, port blocking and IP address access lists), then you may need to add a number of IP addresses to the allowlist as well as open up port 443 to allow Datto RMM to make the required connections. The IP addresses you must add to the allowlist are specific to your platform, and you only need to add those associated with your platform.
NOTE For information about the platform your site is hosted on, refer to Datto RMM platforms.
IMPORTANT In order to reduce security false positives, improve monitoring and automation reliability, and make our Agent’s allowlisting more comprehensive, we now make use of a temporary directory underneath the Datto RMM Agent’s installation path rather than the %TEMP% folder.
This change affects all supported operating systems (Windows, macOS, and Linux). The new paths are as follows:
• Windows: %ProgramData%\CentraStage\Temp, %ProgramData%\CentraStage\AEMAgent\Temp
• macOS and Linux: usr/local/share/CentraStage/Temp, usr/local/share/CentraStage/AEMAgent/Temp
The following operations no longer create or modify files in the %TEMP% folder:
- Script files
- Downloading of Agent Modules packages
- CagService update
- Agent update
- Downloading of Windows Updater file
- Vine VNC setup script file (macOS)
- Screen Capture (macOS)
- Web Remote file transfer
NOTE If the CagService, Agent, or Web Remote operations are not able to create or use their own Temp directory, all operations above will fallback to using the default %TEMP% folder.
For partners managing devices in environments with rigorous network security, note that port 13300 (UDP) is used for Agent discovery.
The initial connection between browser and Agent is initialized via WebRTC servers. Refer to WebRTC. Depending on the firewall configuration, the connection will resolve via STUN server (when P2P connection is possible) or TURN server (when Relay connection would be chosen). The WebRTC servers are located in several regions. Refer to DNS A records.
The minimum requirements for Web Remote are as follows: outbound port 3478 and ports between 49152 - 65535 should be open (both TCP and UDP) for the tunnel server DNS A record. Refer to DNS A records. In addition, make sure to add the following URLs to the allowlist:
Software | Operating System | URL |
---|---|---|
Microsoft .NET | Windows | https://dotnet.microsoft.com |
N/A | Windows and macOS | http://tunnel.rmm.datto.com |
N/A |
Windows and macOS |
http://webrtc.rmm.datto.com |
For partners using Advanced Software Management, the following URL and IP addresses must not be blocked for the feature to function correctly:
URL:
- smpm.kaseya.com
IP addresses:
- 3.12.226.125
- 3.140.114.91
- 3.142.162.228
IMPORTANT Advanced Software Management does not currently support proxy-configured Datto RMM agents.
Refer to Advanced Software Management.
Unless a peer-to-peer connection can be established between devices, Agent to Agent connectivity and remote takeover are managed by a tunnel server over an encrypted connection. Tunnel servers are connection relays located around the globe to provide maximum coverage and the best performance depending on your location. They are automatically available to all users.
When a remote takeover session is initiated:
- The admin device performs a DNS query to find the nearest tunnel server. The tunnel server is picked based on the proximity to the admin device.
NOTE When connecting to a device via Web Remote, the tunnel server is picked based on proximity to the remote device instead of the admin device.
- A connection is made to a load-balanced tunnel server cluster.
- Finally, a connection is established to the remote device.
To make the most of the tunnel server grid, please ensure that the IP addresses relevant to your geographic location are added to the allowlist and outbound traffic on port 443 is open on your own and your endpoints' firewalls.
The following rules are configured for all local and remote ports:
Rule Name | Protocol | Description | Inbound | Outbound |
---|---|---|---|---|
AEMAgent | ANY | Datto RMM Agent Process | ||
CentraStage_monitor | TCP/UDP | Datto RMM Monitoring Agent | ||
CentraStage_service | TCP/UDP | Datto RMM Agent Service | ||
RMM RTC Proxy | ANY | Datto RMM Web Remote RTC Proxy Service | ||
RMM RTO Proxy | ANY | Datto RMM Web Remote RTO Proxy Service | ||
RMM Web Remote | ANY | Datto RMM Web Remote Process | ||
uVNC_Service | TCP/UDP | uVNC Service for VNC Connections |
The Datto RMM Agent communicates with the platform using the IPv4 protocol.
NOTE IPv6 connections are not supported at this time.
It is strongly recommended that any Stateful Packet Inspection be turned off for access to any centrastage.net address, and that all attempts possible are made to guarantee that TCP connections to the cc.centrastage.net addresses are not terminated in cases of inactivity (these connections may be inactive for up to 180 seconds at a time if no client activity is detected).
To help ease the burden of administration and reduce human error when managing allowlists across multiple firewalls, a series of DNS A records that will return every IP address applicable for a given platform is available. These records are as follows:
- concord-ips.centrastage.net
- vidal-ips.centrastage.net
- zinfandel-ips.centrastage.net
- merlot-ips.centrastage.net
- pinotage-ips.centrastage.net
- syrah-ips.centrastage.net
We also provide a secondary DNS A record at tunnel-ips.centrastage.net which can be used in the same way as the platform records to provide allowlisting services to the Datto RMM tunnel server infrastructure. Combining these two records allows administrators to provide complete coverage of the Datto RMM solution without needing to add IP addresses manually.
Querying the DNS A records
NOTE There may be some cases where the individual IP addresses to which the above DNS A records direct need to be understood. In this instance, all major operating systems offer tools which can query the records and return a list of IP addresses. Bear in mind that these IP addresses will only be accurate as of the time of the list's production, with the addresses liable to change over time.
To query the DNS A records, use the following commands depending on your operating system:
- Windows: nslookup <platform>-ips.centrastage.net
- Linux: dig <platform>-ips.centrastage.net, host <platform>-ips.centrastage.net, or nslookup <platform>-ips.centrastage.net
- macOS: host <platform>-ips.centrastage.net
For more information, refer to this Kaseya Community post.
Using DNS A Records
These DNS A records can be added as hosts to any firewall configuration. The IP addresses to which the records point may change over time but the DNS will remain consistent, ensuring connection stability.
In a case where the IP addresses to which the records direct are required, the above section on querying DNS A records can be consulted. Bear in mind that due to the infrastructure on which Datto RMM is built these IPs are liable to change over time.
Some countries are not permitted access to the Datto RMM web interface. For more information, refer to Blocklist.
Add the following IP addresses and URLS to the allowlist
IMPORTANT Aside from the following IP addresses listed, additional IPs may be used to access various Amazon Web Services (AWS) infrastructure. The list gets updated as AWS makes changes. For more information, refer to AWS IP Address Ranges.
IMPORTANT If your antivirus product has flagged the Datto RMM Agent installer as malicious, speak to your antivirus provider and request that they mark the installer as a false positive to allow it through.
Inbound and Tunnel Server IPs for Datto RMM
For information on how to obtain a list of inbound and tunnel server IP addresses for Datto RMM, refer to DNS A records.
IP addresses per platform (Outbound)
Add the following IP addresses to the allowlist for outbound communication if either of these scenarios apply to your Datto RMM account:
- You are using the ConnectWise PSA Integration and are connecting to an on-premise Connectwise PSA server.
- You are using the IT Glue Integration, and IP Access Control in your instance of IT Glue is restricted to certain IP addresses. For details, refer to Allow the IP address of your Datto RMM platform access to IT Glue.
Concord (US East) | Vidal (US East) NEW | Zinfandel (US West) | Merlot (EU) | Pinotage (EU) | Syrah (APAC) |
---|---|---|---|---|---|
54.90.30.238 18.210.141.219 34.206.106.100 52.72.137.122 |
107.22.0.143 34.231.104.171 34.232.253.178 |
52.33.150.151 44.237.4.153 52.41.95.147 |
18.202.215.160 3.251.48.174 |
52.31.46.222 NEW 52.210.155.229 52.212.169.223 54.155.36.8 |
3.104.103.44 52.62.188.240 |
URLs
In addition to IP addresses, some firewalls, proxies, or security appliances may require access to the URL of the service as well as the IP address.
If you are using a proxy or security appliance, we recommend that you add the centrastage.net and the rmm.datto.com domains to the allowlist in their entirety if possible or, at a minimum, ensure that the relevant URLs to your platform are added to the allowlist.
Platform | Service | URLs | TCP Port | Direction |
---|---|---|---|---|
EU (Pinotage) | Web Service | https://01ws.centrastage.net https://agent-gateway.pinotage.rmm.datto.com/ https://pinotage-agent.centrastage.net https://pinotage-audit.centrastage.net https://pinotage-monitoring.centrastage.net https://pinotage-agent-notifications.centrastage.net https://pinotage-agent-comms.centrastage.net |
HTTPS / 443 | Outbound |
Agent Updates | https://update.centrastage.net https://storage.rmm.datto.com https://download.visualstudio.microsoft.com |
|||
Web Interface | https://pinotage.centrastage.net https://pinotage-realtime.centrastage.net https://pinotage.rmm.datto.com https://pinotagermm.centrastage.net |
|||
Control Channel | 01cc.centrastage.net | |||
Tunnel Server | ts.centrastage.net | |||
Component Library | https://cpt.centrastage.net https://cpt.centrastage.net.s3.amazonaws.com |
|||
EU (Merlot) | Web Service | https://02ws.centrastage.net https://agent-gateway.merlot.rmm.datto.com/ https://merlot-agent.centrastage.net https://merlot-audit.centrastage.net https://merlot-monitoring.centrastage.net https://merlot-agent-notifications.centrastage.net https://merlot-agent-comms.centrastage.net |
HTTPS / 443 | Outbound |
Agent Updates | https://update-merlot.centrastage.net https://update.centrastage.net https://storage.rmm.datto.com https://download.visualstudio.microsoft.com |
|||
Web Interface | https://merlot.centrastage.net https://merlot-realtime.centrastage.net https://merlot.rmm.datto.com https://merlotrmm.centrastage.net |
|||
Control Channel | 02cc.centrastage.net | |||
Tunnel Server | ts.centrastage.net | |||
Component Library | https://cpt-merlot.centrastage.net https://cpt-merlot.centrastage.net.s3.amazonaws.com |
|||
US East (Concord) | Web Service | https://01concordws.centrastage.net https://agent-gateway.concord.rmm.datto.com/ https://concord-agent.centrastage.net https://concord-audit.centrastage.net https://concord-monitoring.centrastage.net https://concord-agent-notifications.centrastage.net https://concord-agent-comms.centrastage.net |
HTTPS / 443 | Outbound |
Agent Updates | https://update-concord.centrastage.net https://update.centrastage.net https://storage.rmm.datto.com https://download.visualstudio.microsoft.com |
|||
Web Interface | https://concord.centrastage.net https://concord-realtime.centrastage.net https://concord.rmm.datto.com https://concordrmm.centrastage.net |
|||
Control Channel | concordcc.centrastage.net 01concordcc.centrastage.net |
|||
Tunnel Server | ts.centrastage.net | |||
Component Library | https://cpt-concord.centrastage.net https://cpt-concord.centrastage.net.s3.amazonaws.com https://s3.amazonaws.com/cpt-concord.centrastage.net |
|||
US East (Vidal) NEW | Web Service | https://01vidalws.centrastage.net https://agent-gateway.vidal.rmm.datto.com/ https://vidal-agent.centrastage.net https://vidal-audit.centrastage.net https://vidal-monitoring.centrastage.net https://vidal-agent-notifications.centrastage.net https://vidal-agent-comms.centrastage.net |
HTTPS / 443 | Outbound |
Agent Updates | https://update-vidal.centrastage.net https://update.centrastage.net https://storage.rmm.datto.com https://download.visualstudio.microsoft.com |
|||
Web Interface | https://vidal.centrastage.net https://vidal-realtime.centrastage.net https://vidal.rmm.datto.com https://vidalrmm.centrastage.net |
|||
Control Channel | vidalcc.centrastage.net 01vidalcc.centrastage.net |
|||
Tunnel Server | ts.centrastage.net | |||
Component Library | https://cpt-vidal.centrastage.net https://cpt-vidal.centrastage.net.s3.amazonaws.com https://s3.amazonaws.com/cpt-vidal.centrastage.net |
|||
US West (Zinfandel) | Web Service | https://03ws.centrastage.net https://agent-gateway.zinfandel.rmm.datto.com/ https://zinfandel-agent.centrastage.net https://zinfandel-audit.centrastage.net https://zinfandel-monitoring.centrastage.net https://zinfandel-agent-notifications.centrastage.net https://zinfandel-agent-comms.centrastage.net |
HTTPS / 443 | Outbound |
Agent Updates | https://update-zinfandel.centrastage.net https://update.centrastage.net https://storage.rmm.datto.com https://download.visualstudio.microsoft.com |
|||
Web Interface | https://zinfandel.centrastage.net https://zinfandel-realtime.centrastage.net https://zinfandel.rmm.datto.com https://zinfandelrmm.centrastage.net |
|||
Control Channel | 03cc.centrastage.net |
|||
Tunnel Server | ts.centrastage.net | |||
Component Library | https://cpt-zinfandel.centrastage.net https://cpt-zinfandel.centrastage.net.s3.amazonaws.com |
|||
APAC (Syrah) | Web Service | https://agent-gateway.syrah.rmm.datto.com/ https://syrahws.centrastage.net https://syrah-agent.centrastage.net https://syrah-audit.centrastage.net https://syrah-monitoring.centrastage.net https://syrah-agent-notifications.centrastage.net https://syrah-agent-comms.centrastage.net |
HTTPS / 443 | Outbound |
Agent Updates | https://update-syrah.centrastage.net https://update.centrastage.net https://storage.rmm.datto.com https://download.visualstudio.microsoft.com |
|||
Web Interface | https://syrah.centrastage.net https://syrah-realtime.centrastage.net https://syrah.rmm.datto.com https://syrahrmm.centrastage.net |
|||
Control Channel | syrahcc.centrastage.net 01syrahcc.centrastage.net |
|||
Tunnel Server | ts.centrastage.net | |||
Component Library | https://cpt-syrah.centrastage.net https://cpt-syrah.centrastage.net.s3.amazonaws.com |
ComStore component and Software Management URLs
If you are downloading and running components from the ComStore, we recommend that you add storage.centrastage.net and storage.rmm.datto.com to the allowlist. Additionally, if you use any of the following software applications either as a ComStore component or via Software Management, make sure to add the relevant URL(s) to the allowlist:
Software | Operating System | URL |
---|---|---|
7-Zip | Windows | https://www.7-zip.org |
Adobe Acrobat Reader DC | Windows, macOS | https://ardownload2.adobe.com |
Bitdefender Endpoint Security Tools | Windows | http://download.bitdefender.com and https://cloudgz.gravityzone.bitdefender.com |
BitDefender GravityZone - Deployment/Management | Windows, macOS, Linux | http://download.bitdefender.com |
Citrix Workspace | Windows, macOS | https://downloads.citrix.com |
Datto Secure Edge |
Windows |
https://cf-dl.datto.com |
Deploy F-Secure Computer Protection | Windows | https://download.sp.f-secure.com |
ESET Direct Endpoint Management - Deployment | Windows, macOS | https://update.esetusa.com |
FileZilla Client | Windows | https://filezilla-project.org |
Foxit Reader | Windows | https://www.foxitsoftware.com |
Google Chrome | Windows, macOS | http://dl.google.com |
Huntress Agent Deployment | Windows | https://huntress.io |
Java Runtime Environment 8 (latest update) | Windows | https://javadl.oracle.com and https://sdlc-esd.oracle.com |
Liongard Roar Agent | Windows | https://agents.static.liongard.com |
Microsoft Office 365 (Current and Semi-Annual Channels) | Windows | http://dl.delivery.mp.microsoft.com and https://download.microsoft.com https://clients.config.office.net |
Microsoft Teams | Windows | https://aka.ms and https://teams.microsoft.com |
Mozilla Firefox | Windows, macOS | https://download.mozilla.org |
Mozilla Thunderbird | Windows, macOS | https://download.mozilla.org and https://download-installer.cdn.mozilla.net |
Notepad++ | Windows | https://notepad-plus-plus.org |
Paint.NET x86/x64 | Windows | https://www.dotpdn.com |
PuTTY | Windows | https://the.earth.li (official mirror) |
Skype | Windows, macOS | https://get.skype.com |
Trend Micro Worry-Free Services - Deployment | Windows | https://wfbs-svc-nabu-aal.trendmicro.com or https://wfbs-svc-emea-aal.trendmicro.com (depending on geographical region) |
VLC Media Player | Windows | https://www.mirrorservice.org https://download.videolan.org |
VMWare Tools | Windows | https://packages.vmware.com |
Webroot SecureAnywhere Endpoint Protection | Windows | https://anywhere.webrootcloudav.com |
Windows 10 Upgrade - Professional x86/x64 | Windows | http://dl.delivery.mp.microsoft.com and https://download.microsoft.com |
Zoom | Windows, macOS |
https://www.zoom.us https://cdn.zoom.us |