Setting up DNS records and firewalls for Connect app connectivity

To ensure that Connect apps can successfully locate and connect to Pexip Infinity you must set up appropriate DNS records and ensure your firewalls are configured correctly.

DNS records

You must set up DNS records so that the Connect apps know which host to contact when placing calls or registering to Pexip Infinity.

The host will typically be a public-facing Conferencing Node (for on-premises deployments where your Transcoding Conferencing Nodes are located within a private network we recommend that you deploy public-facing Proxying Edge Nodes).

To enable access from the Connect desktop apps and Connect mobile apps, each domain used in aliases in your deployment must either have a DNS SRV record for _pexapp._tcp.<domain>, or resolve directly to the IP address of a public-facing Conferencing Node.

The SRV records for _pexapp._tcp.<domain> should always:

  • point to an FQDN which must be valid for the TLS certificate on the target Conferencing Nodes
  • reference port 443 on the host.

Note that SRV records are not required for the Connect web app — the web app connects to Conferencing Nodes directly via DNS A-records, so no SRV lookup is required.

Ultimately it is the responsibility of your network administrator to set up SRV records correctly so that the Connect desktop app and Connect mobile app know which system to connect to.

You can use the tool at http://dns.pexip.com to lookup and check SRV records for a domain.

Firewall configuration

Connect apps connect to a Conferencing Node, so you must ensure that any firewalls between the two permit the following connections:

  • Connect mobile app > Conferencing Node port 443 TCP
  • Connect app (all clients) > Conferencing Node ports 40000–49999 TCP/UDP
  • Conferencing Node ports 40000–49999 TCP/UDP > Connect app (all clients)

For more information, see Pexip Infinity port usage and firewall guidance.

Using the Connect app from outside your network

In many cases, your Pexip Infinity deployment will be located inside a private network. If this is the case and you want to allow Connect app users who are located outside your network (for example on another organization's network, from their home network, or the public internet) to connect to your deployment, you need to provide a way for those users to access those private nodes.

Since version 16 of Pexip Infinity, we recommend that you deploy Proxying Edge Nodes instead of a reverse proxy and TURN server if you want to allow externally-located clients to communicate with internally-located Conferencing Nodes. A Proxying Edge Node handles all media and signaling connections with an endpoint or external device, but does not host any conferences — instead it forwards the media on to a Transcoding Conferencing Node for processing.

Further information and connectivity examples

Information on how each of the Connect apps attempt to locate a Conferencing Node when placing a call is described in the following sections. Within each section is an example of the lookup process for that client. The example uses the following records:

Assume that the following _pexapp._tcp.vc.example.com DNS SRV records have been created:

_pexapp._tcp.vc.example.com. 86400 IN SRV 10 100 443 px01.vc.example.com.
_pexapp._tcp.vc.example.com. 86400 IN SRV 20 100 443 px02.vc.example.com.

These point to the DNS A‑records px01.vc.example.com, port 443 (HTTPS), with a priority of 10 and a weight of 100, and px02.vc.example.com, port 443, with a relatively lower priority of 20 and a weight of 100.

This tells the Connect desktop apps and Connect mobile apps to initially send their HTTP requests to host px01.vc.example.com (our primary node) on TCP port 443. The Connect apps will also try to use host px02.vc.example.com (our fallback node) if they cannot contact px01.