Skip to main content

Firewall Requirements for Using Swif.ai

Updated over a week ago

To ensure proper functionality of the Swif.ai platform, devices must be able to communicate with Swif services over HTTPS. This article outlines the required domains, ports, and network configurations needed for successful deployment and ongoing operation.


Overview

Swif.ai requires outbound HTTPS access to specific domains for:

  • Device enrollment

  • Policy synchronization

  • Command execution

  • Software updates

  • Agent downloads

  • Compliance reporting

  • Remote support features

All communication is initiated outbound from the device. No inbound firewall rules are required.


Required Domains

Your firewall or network security appliance must allow outbound HTTPS traffic to the following domains:

Primary Application Domains

*.swif.ai 
*.swifteam.com
  • Protocol: HTTPS

  • Port: 443

  • Direction: Outbound

These domains handle:

  • Device check-ins

  • Policy updates

  • Security reporting

  • Dashboard communication

  • API interactions


Agent Download (AWS S3)

The Swif agent installer and certain updates are delivered via AWS S3.

Required Endpoint

st-agent.s3.us-west-2.amazonaws.com

Port Requirements

  • Protocol: HTTPS

  • Port: Dynamic high ports (typically 60000–69999 range)

  • Direction: Outbound

Because AWS S3 uses load-balanced infrastructure, the exact port may vary. Ensure outbound HTTPS traffic to this domain is allowed without strict port restrictions.

Important: If your firewall enforces strict port controls, allow ephemeral outbound ports in the 6xxxx range for this S3 endpoint.


Summary of Network Requirements

Purpose

Domain

Protocol

Port

Direction

APIs

*.swif.ai

HTTPS

443

Outbound

APIs

*.swifteam.com

HTTPS

443

Outbound

Agent Download (S3)

st-agent.s3.us-west-2.amazonaws.com

HTTPS

60000–69999 (dynamic)

Outbound


Additional Notes

  • Swif does not require inbound firewall rules.

  • TLS inspection or SSL interception may interfere with agent communication. If issues occur, consider excluding Swif domains from SSL inspection.

  • If using a proxy, ensure system-level services can access the allowed domains.

  • IP allowlisting is not recommended due to AWS dynamic infrastructure. Domain-based allowlisting is preferred.


Troubleshooting

If devices cannot enroll or check in:

  1. Verify outbound HTTPS access to *.swif.ai and *.swifteam.com

  2. Confirm access to st-agent.s3.us-west-2.amazonaws.com

  3. Check that SSL inspection is not blocking traffic

  4. Ensure no egress filtering blocks high-numbered ephemeral ports

If issues persist, contact support@swif.ai with firewall logs and device details.

Did this answer your question?