PLT Connectivity
PLTs rely on secured connectivity with the PLTcloud cloud backend, used for:
Receiving firmware, test plans from PLTcloud
Executing webhooks during tests execution
Sending test reports to PLTcloud
All communication between the PLT and AWS endpoints is encrypted with TLS, with authentication based on a private key securely managed by a hardware-based cryptographic element that prevents key extraction.
References
See also
Network Requirements
The Ethernet port of the PLT should be connected to a network with (outbound) Internet access.
Firewall Settings
TCP (outbound) and UDP traffic should be allowed to these AWS API endpoints:
Service |
Endpoint |
Ports |
---|---|---|
PLTcloud |
|
443 |
AWS IoT |
|
80, 443, 8883 |
AWS S3 |
|
80, 443 |
AWS S3 |
|
80, 443 |
Note
Ports 80 and 8883 are not actively used, but may be accessed in error handling of failed AWS IoT or S3 interactions.
NTP
UDP NTP traffic (port 123) should be allowed for these NTP Time servers:
Service |
Protocol |
NTP Time server |
Port |
---|---|---|---|
NTP |
UDP |
|
123 |
NTP |
UDP |
|
123 |
NTP |
UDP |
|
123 |
NTP |
UDP |
|
123 |
NTP |
UDP |
|
123 |
NTP |
UDP |
|
123 |
NTP |
UDP |
|
123 |
NTP |
UDP |
|
123 |
Tip
Specify a set of NTP servers in the DHCP server that can be accessed by the PLT, if access to the default NTP servers is not available.
DNS
The DNS server specified by the DHCP server should be able to resolve:
*.pltcloud.com
*.amazonaws.com
*.ntp.org
Service |
Protocol |
Ports |
---|---|---|
DNS |
UDP, TCP (used for larger responses) |
53 |