What are the in-country specific hostnames for explicit proxy, SEP Web and Cloud Access protection and/or proxy forwarding redirection methods?
What are the additional Cloud SWG endpoints to avoid port exhaustion issues using explicit or proxy forwarding access methods?
Explicit, SEP Web and Cloud Access protection and Proxy Forwarding Access methods
Users accessing Cloud SWG via SEP Web and Cloud Access protection, Explicit or Proxy Forwarding access methods GEO located to wrong Cloud SWG datacenter
Port exhaustion causing users to experience TCP connection and performance problems going through Cloud SWG service from on-premise NAT gateways, or on-premise ProxySG servers.
The following guide offers Cloud SWG administrators the ability to
and/or
WARNING*: These options should only be used by experienced individuals who understand the implications of manual traffic redirection. Manual data center selection may result in poor performance, reduced fault tolerance, and invalidation of relevant SLA claims.
Alternate Options for Explicit Redirection
The table below provides country-specific hostnames for explicit traffic redirection, allowing customers to force traffic to a specific data center or set of data centers within a country, where applicable. This method of redirection is not recommended because it limits the number of available data centers for fault tolerance, removes Symantec’s ability to control which data centers users connect to compensate for outages and maintenance events, and may result in poor performance for roaming users. In the unlikely event that all data centers within a country are simultaneously unavailable, the service will redirect traffic to the nearest alternate data center outside of the country.
Multiple hostnames for Proxy Forwarding
Customers experiencing port exhaustion issues with explicit or proxy forwarding access method described above, have the option to redirect explicit and proxy forwarding traffic to up to six hostnames per data center; each resolving to a unique IP address, per this naming convention:
[data center codename]-vip[1-6].threatpulse.net
Where:
Using the Tokyo (GJPTK) data center as an example, the available hostnames, each resolving to a different public ingress IP address, are:
CHINESE HOSTNAMES:
Hostnames in China will use a different format. They will use <hostname>.wss.broadcom.cn instead of <hostname>.threatpulse.net. This hostname change is necessary due to Chinese regulations which Symantec/Broadcom must abide by. The Chinese hosts will also have the six different VIPs as explained in the example above for Tokyo (gjptk).
Cloud SWG hostnames
AMERICAS | ||
Location (Codename) | Ingress Hostname* (explicit and proxy forwarding) | Country-specific ingress hostname |
Bogota, Columbia (GCOBO) | gcobo1-vip1.threatpulse.net | co.proxy.threatpulse.net |
Buenos Aires, Argentina (GARBA) | garba1-vip1.threatpulse.net | ar.proxy.threatpulse.net |
Columbia, South Carolina (GUSCO) | gusco1-vip1.threatpulse.net | us.proxy.threatpulse.net |
Dallas, Texas (GUSDA) | gusda1-vip1.threatpulse.net | us.proxy.threatpulse.net |
Des Moines, Iowa (GUSDM) | gusdm1-vip1.threatpulse.net | us.proxy.threatpulse.net |
Las Vegas, Nevada (GUSLV) | guslv1-vip1.threatpulse.net | us.proxy.threatpulse.net |
Los Angeles, California (GUSLA) | gusla1-vip1.threatpulse.net | us.proxy.threatpulse.net |
Mexico City, Mexico (GMXMC) | gmxmc1-vip1.threatpulse.net | mx.proxy.threatpulse.net |
Montreal, Canada (GCAMO) | gcamo1-vip1.threatpulse.net | ca.proxy.threatpulse.net |
Portland, Oregon (GUSPO) | guspo1-vip1.threatpulse.net | us.proxy.threatpulse.net |
Sao Paolo, Brazil (GBRSP) | gbrsp1-vip1.threatpulse.net | br.proxy.threatpulse.net |
Toronto, Canada (GCATO) | gcato2-vip1.threatpulse.net | ca.proxy.threatpulse.net |
Washington, DC (GUSAS) | gusas1-vip1.threatpulse.net | us.proxy.threatpulse.net |
APAC | ||
Auckland, New Zealand (GNZAU) | gnzau1-vip1.threatpulse.net | nz.proxy.threatpulse.net |
Beijing, China (ACNBJ) | acnbj2-vip1.wss.broadcom.cn | cn.proxy.wss.broadcom.cn |
Delhi, India (GINDE) | ginde1-vip1.threatpulse.net | in.proxy.threatpulse.net |
Hong Kong, China (GCNHK) | gcnhk1-vip1.threatpulse.net | hk.proxy.threatpulse.net |
Jakarta, Indonesia (GIDJK) | gidjk1-vip1.threatpulse.net | id.proxy.threatpulse.net |
Melbourne, Australia (GAUME) | gaume1-vip1.threatpulse.net | au.proxy.threatpulse.net |
Mumbai, India (GINMU) | ginmu1-vip1.threatpulse.net | in.proxy.threatpulse.net |
Osaka, Japan (GJPOS) | gjpos1-vip1.threatpulse.net | jp.proxy.threatpulse.net |
Seoul, South Korea (GKRSE) | gkrse1-vip1.threatpulse.net | kr.proxy.threatpulse.net |
Shanghai, China (ACNSH) | acnsh2-vip1.wss.broadcom.cn | cn.proxy.wss.broadcom.cn |
Singapore (GSGRS) | gsgrs1-vip1.threatpulse.net | sg.proxy.threatpulse.net |
Sidney, Australia (GAUSY) | gausy1-vip1.threatpulse.net | au.proxy.threatpulse.net |
Taipei, Taiwan (GTWTA) | gtwta1-vip1.threatpulse.net | tw.proxy.threatpulse.net |
Tokyo, Japan (GJPTK) | gjptk1-vip1.threatpulse.net | jp.proxy.threatpulse.net |
EMEA | ||
Abu Dhabi, UAE (GAEAD) | gaead1-vip1.threatpulse.net | ae.proxy.threatpulse.net |
Amsterdam, the Netherlands (GNLAM) | gnlam1-vip1.threatpulse.net | nl.proxy.threatpulse.net |
Ankara, Turkey (GTRAN) | gtran1-vip1.threatpulse.net | tr.proxy.threatpulse.net |
Brussels, Belgium (GBEBR) | gbebr1-vip1.threatpulse.net | be.proxy.threatpulse.net |
Bucharest, Romania (GROBU) | grobu1-vip1.threatpulse.net | ro.proxy.threatpulse.net |
Copenhagen, Denmark (GDKCP) | gdkcp1-vip1.threatpulse.net | dk.proxy.threatpulse.net |
Dammam, Saudi Arabia (GSADA) | gsada1-vip1.threatpulse.net | sa.proxy.threatpulse.net |
Dover, England (GGBDO) | ggbdo1-vip1.threatpulse.net | uk.proxy.threatpulse.net |
Dubai, UAE (GAEDX) | gaedx1-vip1.threatpulse.net | ae.proxy.threatpulse.net |
Dublin, Ireland (GIEDU) | giedu1-vip1.threatpulse.net | ie.proxy.threatpulse.net |
Frankfurt, Germany (GDEFR) | gdefr1-vip1.threatpulse.net | de.proxy.threatpulse.net |
Helsinki, Finland (GFIHE) | gfihe1-vip1.threatpulse.net | fi.proxy.threatpulse.net |
Johannesburg, South Africa (GZASO) | gzaso1-vip1.threatpulse.net | za.proxy.threatpulse.net |
London, England (GGBLO) | ggblo1-vip1.threatpulse.net | uk.proxy.threatpulse.net |
Madrid, Spain (GESTO) | gesto1-vip1.threatpulse.net | es.proxy.threatpulse.net |
Milan, Italy (GITMO) | gitmo1-vip.threatpulse.net | it.proxy.threatpulse.net |
Oslo, Norway (GNOOS) | gnoos1-vip1.threatpulse.net | no.proxy.threatpulse.net |
Paris, France (GFRVE) | gfrve1-vip1.threatpulse.net | fr.proxy.threatpulse.net |
Stockholm, Sweden (GSESK) | gsesk1-vip1.threatpulse.net | se.proxy.threatpulse.net |
Tel Aviv, Israel (GILTA) | gilta2-vip1.threatpulse.net | il.proxy.threatpulse.net |
Warsaw, Poland (GPOWA) | gpowa1-vip1.threatpulse.net | pl.proxy.threatpulse.net |
Zurich, Switzerland (GCHZU) | gchzu1-vip1.threatpulse.net | ch.proxy.threatpulse.net |
* Before redirecting explicit or proxy-forwarding traffic to POP or country-specific hostnames, be sure to review the information at the top of this article to avoid performance and fault tolerance issues. IPsec connections must use the IPsec ingress IP address. Please see article 167174 for details.