PLT Connectivity

PLTs rely on secured connectivity with the PLTcloud cloud backend, used for:

  • Receiving firmware, test plans from PLTcloud

  • Executing webhooks during tests execution

  • Sending test reports to PLTcloud

All communication between the PLT and AWS endpoints is encrypted with TLS, with authentication based on a private key securely managed by a hardware-based cryptographic element that prevents key extraction.

References

Network Requirements

The Ethernet port of the PLT should be connected to a network with (outbound) Internet access.

Firewall Settings

TCP (outbound) and UDP traffic should be allowed to these AWS API endpoints:

Service

Endpoint

Ports

PLTcloud

*.pltcloud.com

443

AWS IoT

a347l7e88enrtv-ats.iot.us-west-2.amazonaws.com

80, 443, 8883

AWS S3

s3.us-west-2.amazonaws.com

80, 443

AWS S3

plt-asset-production.s3.us-west-2.amazonaws.com

80, 443

Note

Ports 80 and 8883 are not actively used, but may be accessed in error handling of failed AWS IoT or S3 interactions.

NTP

UDP NTP traffic (port 123) should be allowed for these NTP Time servers:

Service

Protocol

NTP Time server

Port

NTP

UDP

0.pool.ntp.org

123

NTP

UDP

1.pool.ntp.org

123

NTP

UDP

2.pool.ntp.org

123

NTP

UDP

3.pool.ntp.org

123

NTP

UDP

0.cn.pool.ntp.org

123

NTP

UDP

1.cn.pool.ntp.org

123

NTP

UDP

2.cn.pool.ntp.org

123

NTP

UDP

3.cn.pool.ntp.org

123

Tip

Specify a set of NTP servers in the DHCP server that can be accessed by the PLT, if access to the default NTP servers is not available.

DNS

The DNS server specified by the DHCP server should be able to resolve:

  • *.pltcloud.com

  • *.amazonaws.com

  • *.ntp.org

Service

Protocol

Ports

DNS

UDP, TCP (used for larger responses)

53