What are the in-country specific hostnames for explicit proxy, SEP WTR and/or proxy forwarding redirection methods?
What are the additional WSS endpoints to avoid port exhaustion issues using explicit or proxy forwarding access methods?
Users accessing WSS via SEP WTR, Explicit or Proxy Forwarding access methods GEO located to wrong WSS datacenter
Port exhaustion causing users to experience TCP connection and performance problems going through WSS service from on-premise NAT gateways, or on-premise ProxySG servers.
Explicit, SEP WTR and Proxy Forwarding Access methods
The following guide offers WSS administrators the ability to
- Add custom entries into PAC files to force traffic to country specific WSS data centers (Alternate Options for Explicit Redirection), and/or
- Point to multiple WSS explicit endpoints to balance traffic across multiple WSS pods and avoid port exhaustion issues with WSS (Multiple hostnames for Proxy Forwarding).
WARNING: These options should only be used by experienced individuals who understand the implications of manual traffic redirection. Manual data center selection may result in poor performance, reduced fault tolerance, and invalidation of relevant SLA claims.
Alternate Options for Explicit Redirection
The table below provides country-specific hostnames for explicit traffic redirection, allowing customers to force traffic to a specific data center or set of data centers within a country, where applicable. This method of redirection is not recommended because it limits the number of available data centers for fault tolerance, removes Symantec’s ability to control which data centers users connect to compensate for outages and maintenance events, and may result in poor performance for roaming users. In the unlikely event that all data centers within a country are simultaneously unavailable, the service will redirect traffic to the nearest alternate data center outside of the country.
Multiple hostnames for Proxy Forwarding
CHINESE HOSTNAMES:
Hostnames in China will use a different format. They will use <hostname>.wss.broadcom.cn instead of <hostname>.threatpulse.net. This hostname change is necessary due to Chinese regulations which Symantec/Broadcom must abide by. The Chinese hosts will also have the six different VIPs as explained in the example above for Tokyo (gjptk1).
WSS hostnames
AMERICAS | ||
Location (Codename) | Ingress Hostname* (explicit and proxy forwarding) | Country-specific ingress hostname |
Buenos Aires, Argentina (GARBA1) | garba1-vip1.threatpulse.net | ar.proxy.threatpulse.net |
Columbia, South Carolina (GUSCO1) | gusco1-vip1.threatpulse.net | us.proxy.threatpulse.net |
Des Moines, Iowa (GUSDM1) | gusdm1-vip1.threatpulse.net | us.proxy.threatpulse.net |
Las Vegas, Nevada (GUSLV1) | guslv1-vip1.threatpulse.net | us.proxy.threatpulse.net |
Los Angeles, California (GUSLA1) | gusla1-vip1.threatpulse.net | us.proxy.threatpulse.net |
Mexico City, Mexico (GMXMC1) | gmxmc1-vip1.threatpulse.net | mx.proxy.threatpulse.net |
Montreal, Canada (GCAMO1) | gcamo1-vip1.threatpulse.net | ca.proxy.threatpulse.net |
Portland, Oregon (GUSPO1) | guspo1-vip1.threatpulse.net | us.proxy.threatpulse.net |
Sao Paolo, Brazil (GBRSP1) | gbrsp1-vip1.threatpulse.net | br.proxy.threatpulse.net |
Toronto, Canada (GCATO2) | gcato2-vip1.threatpulse.net | ca.proxy.threatpulse.net |
Washington, DC (GUSAS1) | gusas1-vip1.threatpulse.net | us.proxy.threatpulse.net |
APAC | ||
Auckland, New Zealand (GNZAU1) | gnzau1-vip1.threatpulse.net | nz.proxy.threatpulse.net |
Beijing, China (PEK1) |
pek1-vip1.threatpulse.net** |
cn.proxy.threatpulse.net** cn.proxy.wss.broadcom.cn** |
Delhi, India (GINDE1) | ginde1-vip1.threatpulse.net | in.proxy.threatpulse.net |
Hong Kong, China (GCNHK1) | gcnhk1-vip1.threatpulse.net | hk.proxy.threatpulse.net |
Melbourne, Australia (GAUME1) | gaume1-vip1.threatpulse.net | au.proxy.threatpulse.net |
Mumbai, India (GINMU1) | ginmu1-vip1.threatpulse.net | in.proxy.threatpulse.net |
Osaka, Japan (GJPOS1) | gjpos1-vip1.threatpulse.net | jp.proxy.threatpulse.net |
Seoul, South Korea (GKRSE1) | gkrse1-vip1.threatpulse.net | kr.proxy.threatpulse.net |
Shanghai, China (SHA1) | sha1-vip1.threatpulse.net** sha-vip1.wss.broadcom.cn** |
cn.proxy.threatpulse.net** cn.proxy.wss.broadcom.cn** |
Singapore (GSGRS1) | gsgrs1-vip1.threatpulse.net | sg.proxy.threatpulse.net |
Sidney, Australia (GAUSY1) | gausy1-vip1.threatpulse.net | au.proxy.threatpulse.net |
Taipei, Taiwan (GTWTA1) | gtwta1-vip1.threatpulse.net | tw.proxy.threatpulse.net |
Tokyo, Japan (GJPTK1) | gjptk1-vip1.threatpulse.net | jp.proxy.threatpulse.net |
EMEA | ||
Abu Dhabi, UAE (GAEAD1) | gaead1-vip1.threatpulse.net | ae.proxy.threatpulse.net |
Amsterdam, the Netherlands (GNLAM1) | gnlam1-vip1.threatpulse.net | nl.proxy.threatpulse.net |
Bucharest, Romania (GROBU1) | grobu1-vip1.threatpulse.net | ro.proxy.threatpulse.net |
Copenhagen, Denmark (GDKCP1) | gdkcp1-vip1.threatpulse.net | dk.proxy.threatpulse.net |
Dubai, UAE (GAEDX1) | gaedx1-vip1.threatpulse.net | ae.proxy.threatpulse.net |
Dublin, Ireland (GIEDU1) | giedu1-vip1.threatpulse.net | ie.proxy.threatpulse.net |
Frankfurt, Germany (GDEFR1) | gdefr1-vip1.threatpulse.net | de.proxy.threatpulse.net |
Helsinki, Finland (GFIHE1) | gfihe1-vip1.threatpulse.net | fi.proxy.threatpulse.net |
Johannesburg, South Africa (GZAJB1) | gzajb1-vip1.threatpulse.net | za.proxy.threatpulse.net |
London, England (GGBLO1 | ggblo1-vip1.threatpulse.net | uk.proxy.threatpulse.net |
Madrid, Spain (GESMA1) | gesma1-vip1.threatpulse.net | es.proxy.threatpulse.net |
Milan, Italy (GITMI1) | gitmi1-vip1.threatpulse.net | it.proxy.threatpulse.net |
Oslo, Norway (GNOOS1) | gnoos1-vip1.threatpulse.net | no.proxy.threatpulse.net |
Paris, France (GFRPA1) | gfrpa1-vip1.threatpulse.net | fr.proxy.threatpulse.net |
Stockholm, Sweden (GSESK1) | gsesk1-vip1.threatpulse.net | se.proxy.threatpulse.net |
Tel Aviv, Israel (GILTA1) | gilta1-vip1.threatpulse.net | il.proxy.threatpulse.net |
Zurich, Switzerland (GCHZU1) | gchzu1-vip1.threatpulse.net | ch.proxy.threatpulse.net |
* Before redirecting explicit or proxy-forwarding traffic to POP or country-specific hostnames, be sure to review the information at the top of this article to avoid performance and fault tolerance issues. IPsec connections must use the IPsec ingress IP address. Please see article 167174 for details.
** (August 10, 2022) The new hostname is effective immediately. The old hostname may be deprecated at any time. Please adopt the new name as soon as possible.