Whitelisting Implementation for Teams: CyberEscape Online
Review the technical implementation steps that should take before launching the Teams experience to your company, a new region or to users on a different network.
This guide covers the technical implementation steps your IT team should complete before launching the Teams experience to your company, a new region, or users on a different network.
After completing the integration steps below, use the network test (https://networktest.livingsecurity.com) to verify everything is working correctly. We also recommend launching a short experience to various users throughout the organization to identify bandwidth, browser, and authentication issues unique to your environment.
๐จ IMPORTANT FOR CHINA: Some services are blocked in China. See our China compatibility documentation.
๐บ VIDEO WALKTHROUGH: Watch our technical implementation specialist walk through these steps here.
โ ๏ธ CRITICAL: Understanding Firewall Configuration Types
Simply "whitelisting" domains is NOT enough. Most corporate firewalls and security tools have two levels of configuration:
1. Domain Whitelisting (Basic - Often Not Sufficient)
- Allows traffic to/from the domain
- BUT may still apply deep packet inspection, SSL interception, or connection throttling
- โ Result: CyberEscape will connect but run extremely slowly or timeout
2. SSL Bypass / Trust Configuration (Required for Real-Time Services)
- Allows traffic WITHOUT inspection, interception, or throttling
- Traffic passes through without modification
- โ Result: CyberEscape runs at full speed with real-time features working
Why this matters: CyberEscape uses real-time database connections that maintain open HTTPS connections for 60+ seconds. If your firewall inspects or throttles these connections, users will experience:
- 60+ second loading times
- Frozen screens during gameplay
- Timeout errors
- Video buffering
๐ SSL Bypass Configuration (DO THIS FIRST)
If you use any of these security tools, SSL bypass configuration is REQUIRED:
- Zscaler
- Forcepoint
- Netskope
- Palo Alto Networks
- Cisco Umbrella
- Any firewall with "SSL Inspection" or "SSL Decryption" enabled
Required SSL Bypass Domains
Add these domains to your SSL bypass / no-decrypt / trust list:
CRITICAL (must bypass SSL inspection):
- firestore.googleapis.com
- *.firebasedatabase.app
- *.twilio.com
RECOMMENDED (may need bypass if videos/puzzles load slowly):
- *.livingsecurity.com
- cdn.cyberescape.livingsecurity.com
Platform-Specific Instructions
Zscaler
- Follow ZScaler's SSL Inspection Policy guide
- Configure Certificate Pinning for Google Shared Services
- Add bypass rules for domains listed above
- See also: Controlling access to Google Consumer Apps
Other Network Security Software
Follow the same principles as Zscaler's documentation:
- Identify your SSL inspection / decryption settings
- Create bypass rules for the domains above
- Ensure the bypass applies to all users who will access CyberEscape
๐ Domain Whitelisting Requirements
After configuring SSL bypass, add the following domains to your whitelist:
Session Calendar Invites and Authentication (Email)
From Address: training@app.livingsecurity.com
Sending IPs:
198.37.157.57
198.37.157.99
167.89.96.129
149.72.82.76
Living Security General
*.livingsecurity.com
*.vitally.io
Websocket & Database Connection (REQUIRES SSL BYPASS)
firestore.googleapis.com
firebaseio.com
For international customers (EU/APAC):
*.europe-west1.firebasedatabase.app (port 443)
*.asia-southeast1.firebasedatabase.app (port 443)
โ ๏ธ CONNECTION REQUIREMENTS: These domains need special handling beyond basic whitelisting:
- โ Allow long-lived HTTPS connections (90+ seconds)
- โ Disable deep packet inspection (DPI)
- โ Disable SSL/TLS interception
- โ No bandwidth throttling on sustained connections
- โ Allow HTTP/2 server push
- โ No idle timeout limits under 120 seconds
Participant Audio & Video Conferencing
Twilio RTC (Real-Time Communication) has two components that must be whitelisted:
1. Signaling Plane (control information)
- Port: 443 WSS
- From this table, whitelist Global Low Latency (default) and your operational regions
2. Media Plane (audio/video transport)
- From this table, whitelist your regions using ONE of these port methods:
- Option A: 10,000 - 60,000 UDP/SRTP/SRTCP (recommended)
- Option B: TLS/443 (if UDP is blocked)
- Option C: UDP/3478
Example Configuration
Akaromi BioCorp is headquartered in Japan with offices in Los Angeles and Hamburg. They can only use TLS/443 for media servers.
Signaling Exceptions:
| Region ID | Location | Host Name | Port/Protocol |
|---|---|---|---|
| gll | Global Low Latency | global.vss.twilio.com | 443 WSS |
| jp1 | Japan | jp1.vss.twilio.com | 443 WSS |
| de1 | Germany | de1.vss.twilio.com | 443 WSS |
| us2 | US West Coast | us2.vss.twilio.com | 443 WSS |
Media Server Exceptions:
| Region | Location | IPv4 Range | Port |
|---|---|---|---|
| jp1 | Japan | 13.115.244.0/27<br>54.65.63.192/26<br>18.180.220.128/25 | TLS/443 |
| de1 | Germany | 52.59.186.0/27<br>18.195.48.224/27<br>18.156.18.128/25 | TLS/443 |
| us2 | US West | 34.216.110.128/27<br>54.244.51.0/24<br>44.234.69.0/25 | TLS/443 |
Gameplay CMS & Puzzles
cdn.contentful.com
images.ctfassets.net
assets.ctfassets.net
cdn.cyberescape.livingsecurity.com
LaunchDarkly (Feature Flags)
events.launchdarkly.com
app.launchdarkly.com
๐ง Optional but Recommended Domains
Whitelisting these domains creates the most optimal experience and enables support features:
Hubspot Chat Widget
api.hubspot.com
forms.hubspot.com
app.hubspot.com
Debugging and Error Tracking
rum-http-intake.logs.datadoghq.com
*.ingest.sentry.io
Instructions & Help Tooltips
js.userpilot.io
find.userpilot.io
analytex.userpilot.io
Living Security Support Portal
livingsecurity.com/support
Accessibility Widget
cdn.acsbapp.com
Fonts
fonts.googleapis.com
fonts.gstatic.com
oss.maxcdn.com
๐งช Testing & Troubleshooting
Network Test: Run this test to ensure allowlisting is complete.
Common Issues & Solutions
โ "Connection established but extremely slow (60+ seconds to load)"
Symptoms:
- Compatibility tests pass
- Page loads but takes 60+ seconds
- Gameplay freezes or times out
Cause: Domain is whitelisted but firewall is still inspecting/throttling connections
Solution:
- Verify SSL bypass is configured (not just whitelist)
- Check if deep packet inspection (DPI) is enabled
- Ensure no idle timeout limits < 120 seconds
- Disable SSL interception for
firestore.googleapis.com
IT Questions to Ask:
- "Is deep packet inspection enabled for whitelisted domains?"
- "Are we doing SSL/TLS interception (man-in-the-middle inspection)?"
- "Do we have connection duration limits or idle timeouts?"
- "What firewall/proxy product are we using?"
โ "Videos or puzzles load slowly"
Solution: Add *.livingsecurity.com to SSL bypass list
โ "Audio/video conferencing not working"
Solution:
- Verify both signaling AND media plane are whitelisted
- Check if UDP ports are blocked (try TLS/443 fallback)
- Ensure Twilio domains have SSL bypass
โ "Works for some users but not others"
Possible Causes:
- Users on different networks (VPN vs office vs home)
- Geographic distance to data centers
- Browser extensions blocking connections
- Antivirus software intercepting HTTPS
Solution: Test from different network locations and browsers
๐ Quick Reference Checklist
Use this checklist to ensure complete configuration:
- SSL bypass configured for
firestore.googleapis.com - SSL bypass configured for
*.twilio.com - Deep packet inspection disabled for above domains
- Connection timeouts set to 120+ seconds
- All Living Security domains whitelisted (
*.livingsecurity.com) - Firebase domains whitelisted (including regional variants)
- Twilio signaling plane whitelisted (port 443 WSS)
- Twilio media plane whitelisted (UDP or TLS/443)
- Email sending IPs whitelisted
- Compatibility tests pass
- Pilot test completed with real users
๐ Regional Considerations
China
Some services are completely blocked in China. See China-specific documentation.
EU/APAC
Ensure regional Firebase endpoints are whitelisted:
- EU:
*.europe-west1.firebasedatabase.app - APAC:
*.asia-southeast1.firebasedatabase.app