To ensure that all connected terminal devices work properly within your environment, you must allow network access to specific domains, IP addresses and ports.
This guide outlines the necessary endpoints and services that must be permitted through your firewall and network settings.
Ventrata Services
The following domains must be accessible to ensure proper operation of the Ventrata terminal app:
| Terminal API for booking and data communication |
| Content Delivery Network (CDN) for static assets such as images, fonts, and application resources. |
| Endpoint for app updates and health checks. |
Adyen Payment Processing
For payment terminals managed via Adyen, the following network rules must be in place:
| Primary domain for Adyen payment processing services. |
| Secondary domain for Adyen's payment-related operations |
Local port | Required for secure local communication between Adyen payment terminals and connected devices. |
π NOTE
The asterisk (*) means that all subdomains must be allowed under the specified domain.
Elo Device Management
Elo devices require access to the following endpoints for device management, content updates, and synchronisation:
| API endpoint for device communication |
| Management portal for device configuration and administration |
| Content delivery for digital signage |
| Endpoint for device-specific operations and firmware updates. |
| Data synchronisation queue handling |
| Elo server IP Address |
| Elo server IP Address |
| Content Delivery Network and security services utilised by Elo systems |
π NOTE
The asterisk (*) means that all subdomains must be allowed under the specified domain.
Logging and Monitoring Services
To ensure proper error tracking and logging functionality, the following services must be reachable:
| Main domain for Google Cloud services |
| Google APIs required for operational and logging purposes |
| Sentry services for real-time error reporting and monitoring |
π NOTE
The asterisk (*) means that all subdomains must be allowed under the specified domain.
Additional Recommendations
Whitelist vs Open Access: It is highly recommended to specifically whitelist the above domains and IPs rather than broadly opening internet access.
SSL Inspection Considerations: If your network uses SSL inspection (HTTPS decryption), ensure that these domains are exempt to avoid connection disruptions.
Network Stability: Periodically verify connectivity to these endpoints, especially after firewall updates or changes to your network security policies.