Firewall Ports Configuration


Overview

Softdrive uses a combination of TCP and UDP traffic to deliver secure, high-performance remote desktop sessions. These ports support session establishment, encrypted media streaming, and management communications.

Firewalls on both the local client and cloud desktop must allow this traffic to ensure successful connections.

This guide walks you through configuring the necessary firewall and port settings for proper communication between the Softdrive Remote Desktop Client and Server.


Index

1. Security and Encryption
2. Server Configuration
3. Client Configuration
4. STUN Service
5. Testing Connectivity
6. Final Notes


Content


1. Security and Encryption

All traffic is encrypted using secure protocols:

TransportProtocolEncryption MethodCipher
TCPTLSPre-Shared KeyChaCha20-Poly1305
TCPHTTPSCertificate-BasedAES
UDPSRTPPre-Shared KeyAES


2. Server Configuration

Ensure the following firewall rules are applied on the server:

ProtocolDirectionPort RangeDescription
UDPInbound9250–9254Softstream application data (SRTP + AES)
TCPInbound9260Softstream application data (TLS + ChaCha)
TCPInboundEphemeral (OS default)Communications with Softnet (HTTPS)
UDPOutbound58000–59000Sends data to client

Add SoftdriveServer.exe to Windows Firewall as allowed.


3. Client Configuration

Apply the following firewall rules on the client:

ProtocolDirectionPort RangeDescription
UDPOutbound9250–9254Sends data to server
TCPOutbound9260Softstream application data (TLS + ChaCha)
TCPOutbound443Communications with Softnet (HTTPS)
UDPInbound58000–59000Receives data from server

Add SoftdriveClient.exe to Windows Firewall as allowed.


4. STUN Service

Whitelist the four STUN Server IP’s shown below and ensure the required ports listed below are open on a bidirectional basis for all your firewall and network security devices.


Outbound from the Cloud Desktop

ItemDNSRequiredTo STUN server IP'sNetwork
Protocol
Source
Port
Destination
Port
1stun.softdrive.coYes141.148.25.156UDP92563478, 3479
2NoneYes129.80.6.68
3NoneYes157.151.203.176
4NoneYes129.213.189.177


Inbound to the Cloud Desktop

ItemDNSRequiredFrom STUN server IP'sNetwork
Protocol
Source
Port
Destination
Port
5stun.softdrive.coYes141.148.25.156UDP3478, 34799256
6NoneYes129.80.6.68
7NoneYes157.151.203.176
8NoneYes129.213.189.177


5. Testing Connectivity

After configuring the firewall:

  • Verify that the client can connect to the remote session.
  • Use tools like Test-NetConnection or telnet to validate TCP connectivity.
  • Use packet capture (Wireshark) to verify encrypted traffic over correct ports.


6. Final Notes

  • Ephemeral ports are assigned dynamically by the OS and must be open for responses.
  • All communication is encrypted for confidentiality and integrity.
  • Always test with the firewall enabled to confirm ports are functioning correctly.


Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons

Feedback sent

We appreciate your effort and will try to fix the article