<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Recommended Firewall Settings in Helpful Basics</title>
    <link>https://community.sinch.com/t5/Helpful-Basics/Recommended-Firewall-Settings/ta-p/16697</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;H3&gt;Recommended settings for Non-managed//Home Users//BYOB customers&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Options 1.) DNS 1 = USE Customer's ISP&lt;BR /&gt;Options 2.) DNS 1 = USE Customer's ISP&lt;BR /&gt;&lt;BR /&gt;For fully redundant services it is required to utilize a DNS resolver that will resolve SRV/NAPTR records. All FQDNs are Geo-Redundant between our north and south servers. They resolve to more than one IP/port.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;Hosted customers should whitelist the following FQDNs:&lt;/H4&gt;
&lt;P&gt;south1.hosted.sip.global&lt;BR /&gt;south2.hosted.sip.global&lt;BR /&gt;blf-south1.hosted.sip.global&lt;BR /&gt;blf-south2.hosted.sip.global&lt;BR /&gt;&lt;BR /&gt;north1.hosted.sip.global&lt;BR /&gt;north2.hosted.sip.global&lt;BR /&gt;blf-north1.hosted.sip.global&lt;BR /&gt;blf-north2.hosted.sip.global&lt;BR /&gt;&lt;BR /&gt;generic-south.hosted.sip.global&lt;BR /&gt;generic-north.hosted.sip.global&lt;BR /&gt;&lt;BR /&gt;mobile.hosted.sip.global&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;tls-south1.hosted.sip.global&lt;/P&gt;
&lt;P&gt;tls-north1.hosted.sip.global&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;Hosted phones should also include the following:&lt;/H4&gt;
&lt;P&gt;prov.anpi.com&lt;/P&gt;
&lt;P&gt;Polycom/Poly/HP-Poly: allow&amp;nbsp;&lt;A class="c-link c-link--underline" href="https://ztp.polycom.com/" target="_blank" rel="noopener noreferrer" data-stringify-link="http://ztp.polycom.com/" data-sk="tooltip_parent"&gt;https://ztp.polycom.com/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Grandstream: allow&amp;nbsp;&lt;A href="https://acs.gdms.cloud" target="_blank" rel="noopener"&gt;https://acs.gdms.cloud&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;officeXtend, nCommand Plus and homeXtend Plus customers should include the following:&lt;/H4&gt;
&lt;P&gt;&lt;A href="https://faq.acrobits.net/ip-sipis" target="_blank" rel="noopener"&gt;https://faq.acrobits.net/ip-sipis&lt;/A&gt;&lt;/P&gt;
&lt;H4&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4&gt;&lt;BR /&gt;SIP Trunking customers should whitelist the following FQDN:&lt;/H4&gt;
&lt;P&gt;reg-gw.hosted.sip.global&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;Webex customers should include the following as specified by Cisco Webex:&lt;/H4&gt;
&lt;P&gt;&lt;A href="https://help.webex.com/en-us/article/WBX000028782/Network-Requirements-for-Webex-Services#id_134132" target="_blank" rel="noopener"&gt;https://help.webex.com/en-us/article/WBX000028782/Network-Requirements-for-Webex-Services#id_134132&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;Microsoft Teams customers should include the following as specified by Microsoft:&lt;/H4&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/enterprise/urls-and-ip-address-ranges?view=o365-worldwide" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/en-us/microsoft-365/enterprise/urls-and-ip-address-ranges?view=o365-worldwide&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;General network settings&lt;/H4&gt;
&lt;P&gt;DNS service like OpenDNS or your ISP's DNS can be used if you are not managing your own DNS server.&lt;BR /&gt;&lt;BR /&gt;If you do manage your own DNS Server then please make sure it is SRV/NAPTR capable.&lt;BR /&gt;&lt;BR /&gt;We want to make sure the following (however it references it is OFF)&lt;BR /&gt;SIP INSPECTION, SIP Transformations, SIP Aware, SIP ALG, SIP/Session Helper, or SIP PASSIVE (disable any version of this)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;UPNP should be disabled&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;NTP Servers:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;ntp.voyant.com&lt;/LI&gt;
&lt;LI&gt;ntp.bwvoip.net&lt;/LI&gt;
&lt;LI&gt;ntp1.anpi.com&lt;/LI&gt;
&lt;LI&gt;0.pool.ntp.org&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;Networks QOS (quality of service) should be configured to prioritize the traffic for your phones over data traffic. Specifically we use DSCP Value 46 also known as EF (expedited forwarding).&lt;BR /&gt;&lt;BR /&gt;Enabling and opening the following UDP and TCP Ports and IP ranges:&lt;BR /&gt;80&lt;BR /&gt;443&lt;BR /&gt;XMPP port: 5222&lt;BR /&gt;&lt;BR /&gt;Note: The following ports need to not only be open for UDP and TCP, but also Pinhole Timeout Value needs updated from 30 to 300.&lt;BR /&gt;&lt;BR /&gt;5060&lt;BR /&gt;5061&lt;BR /&gt;5075&lt;BR /&gt;5077&lt;BR /&gt;4444&lt;BR /&gt;44444&lt;BR /&gt;&lt;BR /&gt;The following ports are used at random to set up RTP streams for audio/media/voice paths:&lt;BR /&gt;&lt;BR /&gt;RTP Port Range: 1024 to 65535 (random)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;SSL deep packet inspection should be turned off&lt;BR /&gt;&lt;BR /&gt;All of these IP ranges need to be open as well for services provided by Inteliquent/Voyant to function properly:&lt;/P&gt;
&lt;DIV class="hs-table-align-center" data-hs-responsive-table="true"&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;STRONG&gt;Network&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Pop&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Usage&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;198.174.211.0/24&lt;/TD&gt;
&lt;TD&gt;Plymouth&lt;/TD&gt;
&lt;TD&gt;ATLAS and Provisioning&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;104.18.38.51&lt;BR /&gt;172.64.149.205&lt;/TD&gt;
&lt;TD&gt;Cloudflare&lt;/TD&gt;
&lt;TD&gt;Atlas phone provisioning (prov.anpi.com)&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;137.192.1.0/24&lt;/TD&gt;
&lt;TD&gt;Plymouth&lt;/TD&gt;
&lt;TD&gt;DMZ can include USS/UMS, XSPs for Device management and Clients, etc&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;137.192.76.0/24&lt;/TD&gt;
&lt;TD&gt;Dallas&lt;/TD&gt;
&lt;TD&gt;DMZ can include USS/UMS, XSPs for Device management and Clients, etc&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;137.192.77.0/24&lt;/TD&gt;
&lt;TD&gt;Dallas&lt;/TD&gt;
&lt;TD&gt;DMZ can include USS/UMS, XSPs for Device management and Clients, etc&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;204.220.52.0/24&lt;/TD&gt;
&lt;TD&gt;Plymouth&lt;/TD&gt;
&lt;TD&gt;DMZ can include USS/UMS, XSPs for Device management and Clients, etc&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;204.220.62.0/24&lt;/TD&gt;
&lt;TD&gt;Dallas&lt;/TD&gt;
&lt;TD&gt;DMZ can include USS/UMS, XSPs for Device management and Clients, etc&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;206.144.2.0/24&lt;/TD&gt;
&lt;TD&gt;Plymouth&lt;/TD&gt;
&lt;TD&gt;DMZ can include USS/UMS, XSPs for Device management and Clients, etc&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;206.144.244.0/24&lt;/TD&gt;
&lt;TD&gt;Dallas&lt;/TD&gt;
&lt;TD&gt;DMZ can include USS/UMS, XSPs for Device management and Clients, etc&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;137.192.78.0/24&lt;/TD&gt;
&lt;TD&gt;Dallas&lt;/TD&gt;
&lt;TD&gt;SBC 6300 Carrier and Access&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;137.192.80.0/24&lt;/TD&gt;
&lt;TD&gt;Plymouth&lt;/TD&gt;
&lt;TD&gt;SBC 6300 Carrier and Access&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;subnet:&lt;BR /&gt;255.255.255.240 = /28&lt;BR /&gt;255.255.255.0 = /24&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Mon, 06 Apr 2026 14:35:07 GMT</pubDate>
    <dc:creator>Alexander_Mair</dc:creator>
    <dc:date>2026-04-06T14:35:07Z</dc:date>
    <item>
      <title>Recommended Firewall Settings</title>
      <link>https://community.sinch.com/t5/Helpful-Basics/Recommended-Firewall-Settings/ta-p/16697</link>
      <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;H3&gt;Recommended settings for Non-managed//Home Users//BYOB customers&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Options 1.) DNS 1 = USE Customer's ISP&lt;BR /&gt;Options 2.) DNS 1 = USE Customer's ISP&lt;BR /&gt;&lt;BR /&gt;For fully redundant services it is required to utilize a DNS resolver that will resolve SRV/NAPTR records. All FQDNs are Geo-Redundant between our north and south servers. They resolve to more than one IP/port.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;Hosted customers should whitelist the following FQDNs:&lt;/H4&gt;
&lt;P&gt;south1.hosted.sip.global&lt;BR /&gt;south2.hosted.sip.global&lt;BR /&gt;blf-south1.hosted.sip.global&lt;BR /&gt;blf-south2.hosted.sip.global&lt;BR /&gt;&lt;BR /&gt;north1.hosted.sip.global&lt;BR /&gt;north2.hosted.sip.global&lt;BR /&gt;blf-north1.hosted.sip.global&lt;BR /&gt;blf-north2.hosted.sip.global&lt;BR /&gt;&lt;BR /&gt;generic-south.hosted.sip.global&lt;BR /&gt;generic-north.hosted.sip.global&lt;BR /&gt;&lt;BR /&gt;mobile.hosted.sip.global&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;tls-south1.hosted.sip.global&lt;/P&gt;
&lt;P&gt;tls-north1.hosted.sip.global&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;Hosted phones should also include the following:&lt;/H4&gt;
&lt;P&gt;prov.anpi.com&lt;/P&gt;
&lt;P&gt;Polycom/Poly/HP-Poly: allow&amp;nbsp;&lt;A class="c-link c-link--underline" href="https://ztp.polycom.com/" target="_blank" rel="noopener noreferrer" data-stringify-link="http://ztp.polycom.com/" data-sk="tooltip_parent"&gt;https://ztp.polycom.com/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Grandstream: allow&amp;nbsp;&lt;A href="https://acs.gdms.cloud" target="_blank" rel="noopener"&gt;https://acs.gdms.cloud&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;officeXtend, nCommand Plus and homeXtend Plus customers should include the following:&lt;/H4&gt;
&lt;P&gt;&lt;A href="https://faq.acrobits.net/ip-sipis" target="_blank" rel="noopener"&gt;https://faq.acrobits.net/ip-sipis&lt;/A&gt;&lt;/P&gt;
&lt;H4&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4&gt;&lt;BR /&gt;SIP Trunking customers should whitelist the following FQDN:&lt;/H4&gt;
&lt;P&gt;reg-gw.hosted.sip.global&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;Webex customers should include the following as specified by Cisco Webex:&lt;/H4&gt;
&lt;P&gt;&lt;A href="https://help.webex.com/en-us/article/WBX000028782/Network-Requirements-for-Webex-Services#id_134132" target="_blank" rel="noopener"&gt;https://help.webex.com/en-us/article/WBX000028782/Network-Requirements-for-Webex-Services#id_134132&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;Microsoft Teams customers should include the following as specified by Microsoft:&lt;/H4&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/enterprise/urls-and-ip-address-ranges?view=o365-worldwide" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/en-us/microsoft-365/enterprise/urls-and-ip-address-ranges?view=o365-worldwide&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;General network settings&lt;/H4&gt;
&lt;P&gt;DNS service like OpenDNS or your ISP's DNS can be used if you are not managing your own DNS server.&lt;BR /&gt;&lt;BR /&gt;If you do manage your own DNS Server then please make sure it is SRV/NAPTR capable.&lt;BR /&gt;&lt;BR /&gt;We want to make sure the following (however it references it is OFF)&lt;BR /&gt;SIP INSPECTION, SIP Transformations, SIP Aware, SIP ALG, SIP/Session Helper, or SIP PASSIVE (disable any version of this)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;UPNP should be disabled&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;NTP Servers:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;ntp.voyant.com&lt;/LI&gt;
&lt;LI&gt;ntp.bwvoip.net&lt;/LI&gt;
&lt;LI&gt;ntp1.anpi.com&lt;/LI&gt;
&lt;LI&gt;0.pool.ntp.org&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;Networks QOS (quality of service) should be configured to prioritize the traffic for your phones over data traffic. Specifically we use DSCP Value 46 also known as EF (expedited forwarding).&lt;BR /&gt;&lt;BR /&gt;Enabling and opening the following UDP and TCP Ports and IP ranges:&lt;BR /&gt;80&lt;BR /&gt;443&lt;BR /&gt;XMPP port: 5222&lt;BR /&gt;&lt;BR /&gt;Note: The following ports need to not only be open for UDP and TCP, but also Pinhole Timeout Value needs updated from 30 to 300.&lt;BR /&gt;&lt;BR /&gt;5060&lt;BR /&gt;5061&lt;BR /&gt;5075&lt;BR /&gt;5077&lt;BR /&gt;4444&lt;BR /&gt;44444&lt;BR /&gt;&lt;BR /&gt;The following ports are used at random to set up RTP streams for audio/media/voice paths:&lt;BR /&gt;&lt;BR /&gt;RTP Port Range: 1024 to 65535 (random)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;SSL deep packet inspection should be turned off&lt;BR /&gt;&lt;BR /&gt;All of these IP ranges need to be open as well for services provided by Inteliquent/Voyant to function properly:&lt;/P&gt;
&lt;DIV class="hs-table-align-center" data-hs-responsive-table="true"&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;STRONG&gt;Network&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Pop&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Usage&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;198.174.211.0/24&lt;/TD&gt;
&lt;TD&gt;Plymouth&lt;/TD&gt;
&lt;TD&gt;ATLAS and Provisioning&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;104.18.38.51&lt;BR /&gt;172.64.149.205&lt;/TD&gt;
&lt;TD&gt;Cloudflare&lt;/TD&gt;
&lt;TD&gt;Atlas phone provisioning (prov.anpi.com)&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;137.192.1.0/24&lt;/TD&gt;
&lt;TD&gt;Plymouth&lt;/TD&gt;
&lt;TD&gt;DMZ can include USS/UMS, XSPs for Device management and Clients, etc&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;137.192.76.0/24&lt;/TD&gt;
&lt;TD&gt;Dallas&lt;/TD&gt;
&lt;TD&gt;DMZ can include USS/UMS, XSPs for Device management and Clients, etc&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;137.192.77.0/24&lt;/TD&gt;
&lt;TD&gt;Dallas&lt;/TD&gt;
&lt;TD&gt;DMZ can include USS/UMS, XSPs for Device management and Clients, etc&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;204.220.52.0/24&lt;/TD&gt;
&lt;TD&gt;Plymouth&lt;/TD&gt;
&lt;TD&gt;DMZ can include USS/UMS, XSPs for Device management and Clients, etc&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;204.220.62.0/24&lt;/TD&gt;
&lt;TD&gt;Dallas&lt;/TD&gt;
&lt;TD&gt;DMZ can include USS/UMS, XSPs for Device management and Clients, etc&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;206.144.2.0/24&lt;/TD&gt;
&lt;TD&gt;Plymouth&lt;/TD&gt;
&lt;TD&gt;DMZ can include USS/UMS, XSPs for Device management and Clients, etc&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;206.144.244.0/24&lt;/TD&gt;
&lt;TD&gt;Dallas&lt;/TD&gt;
&lt;TD&gt;DMZ can include USS/UMS, XSPs for Device management and Clients, etc&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;137.192.78.0/24&lt;/TD&gt;
&lt;TD&gt;Dallas&lt;/TD&gt;
&lt;TD&gt;SBC 6300 Carrier and Access&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;137.192.80.0/24&lt;/TD&gt;
&lt;TD&gt;Plymouth&lt;/TD&gt;
&lt;TD&gt;SBC 6300 Carrier and Access&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;subnet:&lt;BR /&gt;255.255.255.240 = /28&lt;BR /&gt;255.255.255.0 = /24&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Mon, 06 Apr 2026 14:35:07 GMT</pubDate>
      <guid>https://community.sinch.com/t5/Helpful-Basics/Recommended-Firewall-Settings/ta-p/16697</guid>
      <dc:creator>Alexander_Mair</dc:creator>
      <dc:date>2026-04-06T14:35:07Z</dc:date>
    </item>
  </channel>
</rss>

