Skip to main content

Network Configuration for Terminal Device Connectivity

Allow access to required domains, IPs, and ports to ensure proper terminal device connectivity and system performance.

Updated over a week ago

To ensure that all connected terminal devices work properly within your environment, you must allow network access to specific domains, IP addresses and ports.

This guide outlines the necessary endpoints and services that must be permitted through your firewall and network settings.


Ventrata Services

The following domains must be accessible to ensure proper operation of the Ventrata terminal app:

https://api.ventrata.com

Terminal API for booking and data communication

https://cdn.ventrata.com

Content Delivery Network (CDN) for static assets such as images, fonts, and application resources.

https://app.ventrata.com

Endpoint for app updates and health checks.


Adyen Payment Processing

For payment terminals managed via Adyen, the following network rules must be in place:

*.adyen.com

Primary domain for Adyen payment processing services.

*.adyenpayments.com

Secondary domain for Adyen's payment-related operations

Local port 8443

Required for secure local communication between Adyen payment terminals and connected devices.

📒 NOTE

The asterisk (*) means that all subdomains must be allowed under the specified domain.


Elo Device Management

EloView 3 (EV3)

Elo devices managed through EloView 3 require the following network configuration and whitelisting to ensure full communication.

io.eloview.com

API endpoint for device communication

manage.eloview.com

Management portal for device configuration and administration

content.eloview.com

Content delivery for digital signage

device.eloview.com

Endpoint for device-specific operations and firmware updates.

dsq.eloview.com

Data synchronisation queue handling

74.120.218.144

Elo server IP Address

74.120.218.143

Elo server IP Address

*.cloudflare.com

Content Delivery Network and security services utilised by Elo systems

EloView 4 (EV4)

Elo devices managed through EloView 4 require the following URLs whitelisted to ensure full communication.

secure-api.eloview.com/prod

API endpoint for token management, OTA updates, and OS360 warranty checks

secure-provisioning.eloview.com/prod

Provisioning service for device setup and enrollment

secure-broker.eloview.com/

MQTT Broker for real-time device communication

secure-logs.eloview.com/

Endpoint for log uploads, OTA builds, and private content transfer

secure-content.eloview.com/

Content delivery service for device icons and assets

secure-auth.eloview.com/

OAuth service for device authentication and login

cognito-identity.us-west-2.amazonaws.com/

Recommended

AWS Cognito identity service for device management

cognito-idp.us-west-2.amazonaws.com/

Recommended

AWS Cognito user pool service for authentication

polaris-promote-prod.s3.us-west-2.amazonaws.com/

Recommended

S3 bucket for promotional content delivery

polaris-scan-prod.s3.us-west-2.amazonaws.com/

Recommended

S3 bucket for scanning and related content delivery

pool.ntp.org/

NTP service for device time synchronisation

time.android.org/

Alternative NTP service for device time synchronisation

*teamviewer.com

Remote support and device access service used for troubleshooting

*.cloudflare.com

Content Delivery Network and security services utilised by Elo systems

📒 NOTE

The asterisk (*) means that all subdomains must be allowed under the specified domain.


Logging and Monitoring Services

To ensure proper error tracking and logging functionality, the following services must be reachable:

cloud.google.com

Main domain for Google Cloud services

*.googleapis.com

Google APIs required for operational and logging purposes

*.sentry.io

Sentry services for real-time error reporting and monitoring

📒 NOTE

The asterisk (*) means that all subdomains must be allowed under the specified domain.


Additional Recommendations

  • Whitelist vs Open Access: It is highly recommended to specifically whitelist the above domains and IPs rather than broadly opening internet access.

  • SSL Inspection Considerations: If your network uses SSL inspection (HTTPS decryption), ensure that these domains are exempt to avoid connection disruptions.

  • Network Stability: Periodically verify connectivity to these endpoints, especially after firewall updates or changes to your network security policies.

Did this answer your question?