Atmos Agent Device Prerequisites

The Atmos Agent allows you to seamlessly navigate traffic through Axis Security. The Atmos Agent takes all traffic to applications configured in the Management Console, and routes it through the Axis Cloud.

The update frequency is determined by the organization's policy.

End User Access (Firewall Rules)

Agent Access: agent-geo.axisapps.io (udp 443)

108.137.87.166  
13.115.151.121  
13.239.90.116  
13.245.59.57  
13.246.143.205  
13.41.40.26  
15.207.5.150  
18.100.22.117  
18.100.98.46  
18.162.34.22  
18.182.168.62  
18.205.11.255  
184.72.42.45  
3.0.105.216  
3.123.165.7  
3.218.242.122  
3.24.60.39  
3.29.209.45  
3.29.46.136  
3.8.107.216  
34.195.38.11  
43.198.8.41  
43.204.206.75  
43.218.75.113  
51.16.136.210  
51.17.45.126  
52.202.240.174  
52.28.203.234  
52.77.86.133  
54.207.51.119  
54.241.87.236  
54.94.160.154

TLS Fallback for agent access: agent-geo-gw.axisapps.io (tcp+udp 443)

In case the Atmos agent cannot establish a connection using udp, it will fallback to tls using the "agent-geo-gw.axisapps.io" addresses below. It may be required to pause and restart the agent in case the tls fallback does not apply automatically.

15.197.208.139
20.165.33.254
3.33.219.65
34.165.65.50
4.204.211.61
51.16.220.10
51.17.6.119
52.173.247.116
52.2.165.225
52.202.6.226

Agent Authentication: *.axissecurity.com

  • 52.223.54.170 (TCP:443)
  • 35.71.180.65 (TCP:443)

Windows

Windows 10, windows 8.1, windows 7 and above.
2 GB RAM

macOS

mac OS Catalina and above
2GB RAM

iOS

iOS 14.1 and above.

Identity and Authentication

The Atmos Agent authenticates through the default Identity Provider (IdP) that is configured in the tenant. This means that all of the network range applications authenticate through the default IdP.
Users logged in to the Atmos Agent are automatically logged in to the User Portal and web applications. The applications log the user in with the same authentication as the Atmos Agent.