Hi Sean,
The Laserfiche Cloud inbound endpoints are documented here:
https://doc.laserfiche.com/laserfiche.documentation/en-us/Default.htm#Software_Requirements.htm
The Remote Agent endpoints for each Laserfiche Cloud region are:
- USA: bpm1.laserfiche.com
- Canada: bpm1.laserfiche.ca
- EU: bpm1.eu.laserfiche.com
We aim to have the Software Requirements documentation page updated with those soon.
The Laserfiche Cloud Server Endpoints section specifies the URLs for traffic initiated inbound to Laserfiche Cloud from clients. Remote Agents initiate an HTTPS connection to Laserfiche Cloud and then keep the connection open.
- The lf-cloud-production-*-webaccess-datastore.s3.$region.amazonaws.com URLs are for Amazon's S3 object storage service. S3 is a shared service made up of thousands of underlying nodes. Laserfiche has no control over the S3 IP addresses Amazon uses. As these S3 endpoints are used with the Laserfiche Web Client (and thus interactive end users), they are not relevant to Remote Agents.
- The *.lfxstatic.com entry covers CDN endpoints that serve various static assets, like web application HTML/CSS/image files. They are not relevant to Remote Agents.
- The public-laserfichelocalhost-certificate.s3-us-west-1.amazonaws.com/lflocalhost.pfx entry covers a TLS certificate we provide that's required for the end user Laserfiche WebTools Agent / Scanning / Microsoft Office Integration utilities. These utilities fetch the latest available certificate file (1-year validity period) from that URI. They are not relevant to Remote Agents.
The Laserfiche Cloud IP Addresses section defines the IPs that Laserfiche Cloud uses for outbound connections through the Web Request Rule and Application Connections features. These are not applicable to Remote Agent communications because Laserfiche Cloud does not initiate outbound calls to Remote Agents.
These two categories are completely different and unrelated from a networking perspective.
Currently, IP addresses for inbound endpoints, including those Remote Agents communicate with, are subject to change. Inbound connectivity requirements are expressed in terms of hosts/domains that must be allowed, such as "*.laserfiche.com". Restricting your outbound network traffic based on destination hostname generally requires either:
- A more advanced firewall with FQDN filtering capabilities, such as Azure Firewall.
- A forward (outbound) HTTP proxy like Squid Proxy (a popular option) or this new Azure Firewall Explicit Proxy feature that you configure allowed hosts/domains for and route your outbound traffic through.
We understanding that not having static IPs (or at least a consistent IP range) for Laserfiche Cloud's inbound Remote Agent endpoint makes network security configuration more complicated for our customers. We're discussing internally and will at minimum strive to make our documentation more clear on recommended practices and requirements.
As an alternative option, you could write a PowerShell script that checks the public DNS entry for the Remote Agent endpoint (bpm.laserfiche.com? - not 100% sure offhand) and using the Azure PowerShell modules programmatically updates the relevant Azure Network Security Group firewall rule if/when the IP address changes. Have that run every five minute schedule somewhere, like via Windows Task Scheduler on the Remote Agent VM or through Azure Automation.