Skip to content

Commit 3df8439

Browse files
defanatormjang
andauthored
feat: IPv6 connectivity support in NGINX One APIs (#1135)
* feat: IPv6 connectivity support in NGINX One APIs * Also confirmed OK with NGINX Plus --------- Co-authored-by: Mike Jang <[email protected]>
1 parent 35d42b4 commit 3df8439

File tree

5 files changed

+28
-17
lines changed

5 files changed

+28
-17
lines changed

content/includes/nginx-one/how-to/install-nginx-agent.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,13 +8,14 @@ files:
88
After entering your data plane key, you'll see a `curl` command to install NGINX Agent, similar to the one below. Copy and run this command on each NGINX instance. Once installed, NGINX Agent typically registers with NGINX One within a few seconds.
99

1010
{{<call-out "important" "Connecting to NGINX One" >}}
11-
Ensure that any firewall rules you have in place for your NGINX hosts allows network traffic to port `443` for all of the following IPs:
11+
Make sure your firewall rules for NGINX hosts allow traffic to port `443` from these IP address ranges:
1212

13-
- `3.135.72.139`
14-
- `3.133.232.50`
15-
- `52.14.85.249`
13+
- `3.135.72.139/32`
14+
- `3.133.232.50/32`
15+
- `52.14.85.249/32`
16+
- `2600:1f16:19c8:d400::/62`
1617

17-
NGINX Agent must be able to establish a connection to NGINX One Console's Agent endpoint (`agent.connect.nginx.com`).
18+
NGINX Agent must be able to establish a connection to NGINX One Console's Agent endpoint (`agent.connect.nginx.com`).
1819
{{</call-out>}}
1920

2021
To install NGINX Agent on an NGINX instance:

content/nginx-one/changelog.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,13 @@ h2 {
3030

3131
Stay up-to-date with what's new and improved in the F5 NGINX One Console.
3232

33+
## September 16, 2025
34+
35+
### IPv6 endpoints for NGINX Agent and NGINX Plus usage reporting
36+
37+
Your instances which run in dual-stack or IPv6-only environments can now communicate with NGINX One Console APIs through IPv6 addresses.
38+
See the [Getting Started Guide]({{< ref "/nginx-one/getting-started.md#install-nginx-agent" >}}) for the IP address ranges you need to allow in your firewalls.
39+
3340
## July 15, 2025
3441

3542
### Set up F5 NGINX App Protect WAF security policies

content/nginx-one/getting-started.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -126,11 +126,12 @@ Depending on whether this is your first time using NGINX One Console or you've u
126126
After entering your data plane key, you'll see a `curl` command similar to the one below. Copy and run this command on each NGINX instance to install NGINX Agent. Once installed, NGINX Agent typically registers with NGINX One within a few seconds.
127127

128128
{{<call-out "important" "Connecting to NGINX One" >}}
129-
NGINX Agent must be able to establish a connection to NGINX One Console's Agent endpoint (`agent.connect.nginx.com`). Ensure that any firewall rules you have in place for your NGINX hosts allows network traffic to port `443` for all of the following IPs:
129+
NGINX Agent must be able to establish a connection to NGINX One Console's Agent endpoint (`agent.connect.nginx.com`). Ensure that any firewall rules you have in place for your NGINX hosts allows network traffic to port `443` for all of the following IP address ranges:
130130

131-
- `3.135.72.139`
132-
- `3.133.232.50`
133-
- `52.14.85.249`
131+
- `3.135.72.139/32`
132+
- `3.133.232.50/32`
133+
- `52.14.85.249/32`
134+
- `2600:1f16:19c8:d400::/62`
134135
{{</call-out>}}
135136

136137
To install NGINX Agent on an NGINX instance:

content/solutions/about-subscription-licenses.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -100,11 +100,12 @@ To ensure NGINX Plus R33 or later can send usage reports, follow these steps bas
100100

101101
### For internet-connected environments
102102

103-
1. Allow outbound HTTPS traffic on TCP port `443` to communicate with F5's licensing endpoint (`product.connect.nginx.com`). Ensure that the following IP addresses are allowed:
103+
1. Allow outbound HTTPS traffic on TCP port `443` to communicate with F5's licensing endpoint (`product.connect.nginx.com`). Ensure that the following IP address ranges are allowed:
104104

105-
- `3.135.72.139`
106-
- `3.133.232.50`
107-
- `52.14.85.249`
105+
- `3.135.72.139/32`
106+
- `3.133.232.50/32`
107+
- `52.14.85.249/32`
108+
- `2600:1f16:19c8:d400::/62`
108109

109110
2. (Optional, R34 and later) If your company enforces a strict outbound traffic policy, you can use an outbound proxy for establishing an end-to-end tunnel to the F5 licensing endpoint. On each NGINX Plus instance, update the [`proxy`](https://nginx.org/en/docs/ngx_mgmt_module.html#proxy) directive in the [`mgmt`](https://nginx.org/en/docs/ngx_mgmt_module.html) block of the NGINX configuration (`/etc/nginx/nginx.conf`) to point to the company's outbound proxy server:
110111

content/solutions/r33-pre-release-guidance-for-automatic-upgrades.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -73,11 +73,12 @@ To ensure NGINX Plus R33 can report telemetry data, follow these steps based on
7373
#### For internet-connected environments:
7474

7575
1. **Open port 443**:
76-
Allow outbound HTTPS traffic on TCP port 443 to communicate with F5's licensing endpoint (`product.connect.nginx.com`). Ensure that the following IP addresses are allowed:
76+
Allow outbound HTTPS traffic on TCP port 443 to communicate with F5's licensing endpoint (`product.connect.nginx.com`). Ensure that the following IP address ranges are allowed:
7777

78-
- `3.135.72.139`
79-
- `3.133.232.50`
80-
- `52.14.85.249`
78+
- `3.135.72.139/32`
79+
- `3.133.232.50/32`
80+
- `52.14.85.249/32`
81+
- `2600:1f16:19c8:d400::/62`
8182

8283
#### For partially connected environments:
8384

0 commit comments

Comments
 (0)