Skip to content
Merged
Show file tree
Hide file tree
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
11 changes: 6 additions & 5 deletions content/includes/nginx-one/how-to/install-nginx-agent.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,13 +8,14 @@ files:
After entering your data plane key, you'll see a `curl` command to install NGINX Agent, similar to the one below. Copy and run this command on each NGINX instance. Once installed, NGINX Agent typically registers with NGINX One within a few seconds.

{{<call-out "important" "Connecting to NGINX One" >}}
Ensure that any firewall rules you have in place for your NGINX hosts allows network traffic to port `443` for all of the following IPs:
Ensure that any firewall rules you have in place for your NGINX hosts allows network traffic to port `443` for all of the following IP ranges:

- `3.135.72.139`
- `3.133.232.50`
- `52.14.85.249`
- `3.135.72.139/32`
- `3.133.232.50/32`
- `52.14.85.249/32`
- `2600:1f16:19c8:d400::/62`

NGINX Agent must be able to establish a connection to NGINX One Console's Agent endpoint (`agent.connect.nginx.com`).
NGINX Agent must be able to establish a connection to NGINX One Console's Agent endpoint (`agent.connect.nginx.com`).
{{</call-out>}}

To install NGINX Agent on an NGINX instance:
Expand Down
7 changes: 7 additions & 0 deletions content/nginx-one/changelog.md
Original file line number Diff line number Diff line change
Expand Up @@ -30,6 +30,13 @@ h2 {

Stay up-to-date with what's new and improved in the F5 NGINX One Console.

## September 16, 2025

### IPv6 endpoints for NGINX Agent and NGINX Plus usage reporting

Your instances running in dualstack or IPv6-only environments are now able to communicate with NGINX One APIs via IPv6.
Please check the [Getting Started Guide]({{< ref "/nginx-one/getting-started.md#install-nginx-agent" >}}) for IP ranges required to be enabled in your firewalls.

## July 15, 2025

### Set up F5 NGINX App Protect WAF security policies
Expand Down
9 changes: 5 additions & 4 deletions content/nginx-one/getting-started.md
Original file line number Diff line number Diff line change
Expand Up @@ -126,11 +126,12 @@ Depending on whether this is your first time using NGINX One Console or you've u
After entering your data plane key, you'll see a `curl` command similar to the one below. Copy and run this command on each NGINX instance to install NGINX Agent. Once installed, NGINX Agent typically registers with NGINX One within a few seconds.

{{<call-out "important" "Connecting to NGINX One" >}}
NGINX Agent must be able to establish a connection to NGINX One Console's Agent endpoint (`agent.connect.nginx.com`). Ensure that any firewall rules you have in place for your NGINX hosts allows network traffic to port `443` for all of the following IPs:
NGINX Agent must be able to establish a connection to NGINX One Console's Agent endpoint (`agent.connect.nginx.com`). Ensure that any firewall rules you have in place for your NGINX hosts allows network traffic to port `443` for all of the following IP ranges:

- `3.135.72.139`
- `3.133.232.50`
- `52.14.85.249`
- `3.135.72.139/32`
- `3.133.232.50/32`
- `52.14.85.249/32`
- `2600:1f16:19c8:d400::/62`
{{</call-out>}}

To install NGINX Agent on an NGINX instance:
Expand Down
9 changes: 5 additions & 4 deletions content/solutions/about-subscription-licenses.md
Original file line number Diff line number Diff line change
Expand Up @@ -100,11 +100,12 @@ To ensure NGINX Plus R33 or later can send usage reports, follow these steps bas

### For internet-connected environments

1. Allow outbound HTTPS traffic on TCP port `443` to communicate with F5's licensing endpoint (`product.connect.nginx.com`). Ensure that the following IP addresses are allowed:
1. Allow outbound HTTPS traffic on TCP port `443` to communicate with F5's licensing endpoint (`product.connect.nginx.com`). Ensure that the following IP ranges are allowed:

- `3.135.72.139`
- `3.133.232.50`
- `52.14.85.249`
- `3.135.72.139/32`
- `3.133.232.50/32`
- `52.14.85.249/32`
- `2600:1f16:19c8:d400::/62`

2. (Optional, R34 and later) If your company enforces a strict outbound traffic policy, you can use an outbound proxy for establishing an end-to-end tunnel to the F5 licensing endpoint. On each NGINX Plus instance, update the [`proxy`](https://nginx.org/en/docs/ngx_mgmt_module.html#proxy) directive in the [`mgmt`](https://nginx.org/en/docs/ngx_mgmt_module.html) block of the NGINX configuration (`/etc/nginx/nginx.conf`) to point to the company's outbound proxy server:

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -73,11 +73,12 @@ To ensure NGINX Plus R33 can report telemetry data, follow these steps based on
#### For internet-connected environments:

1. **Open port 443**:
Allow outbound HTTPS traffic on TCP port 443 to communicate with F5's licensing endpoint (`product.connect.nginx.com`). Ensure that the following IP addresses are allowed:
Allow outbound HTTPS traffic on TCP port 443 to communicate with F5's licensing endpoint (`product.connect.nginx.com`). Ensure that the following IP ranges are allowed:

- `3.135.72.139`
- `3.133.232.50`
- `52.14.85.249`
- `3.135.72.139/32`
- `3.133.232.50/32`
- `52.14.85.249/32`
- `2600:1f16:19c8:d400::/62`

#### For partially connected environments:

Expand Down
Loading