Help us to improve our website!

We want to inspire you for our UCC solution! To do this, we use cookies to provide you with an optimal and personalised website experience. Clicking on "Accept all" allows us to process this data and share it with third-party providers in accordance with our privacy policy. Here you can also adjust the cookie settings at any time.
Technically necessary cookies
Accept all
Save selection

Certificates and ports under XPhone Connect


Communication between the Connect Servers inside and outside the DMZ is automatically encrypted and no certificates are required for this.

In the DMZ scenario, only the Connect Server in the DMZ must be allowed to establish outbound TCP connections to ports 443, 2195, and 2196 if push notifications are to be used.

Connection IIS (WebServer) <-> XPhone Connect Server
All connections to the server are encrypted. The necessary certificates are temporarily created randomly at each start, so that the probability that certificates can be "stolen" is extremely low. This is possible because the certificates are only used for encryption and not for authentication, as is the case with UC2011.

The web application logs on to the server like an ordinary user, and also uses the intended authentication for this, i.e. integrated Windows logon or username/password. This is somewhat different to the Edge server in UC2011, which has authenticated itself with this certificate in order to be able to connect to the UC2011 server at all.

The only port currently relevant is 2230.

Subscribe to our Newsletter


Thank you for subscribing. To confirm your subscription, please click the link in your registration email.


An error occured. Please try again.