ThousandEyes uses a cloud‑hosted dashboard and agent‑initiated communication model. All communication between the ThousandEyes Agent and the ThousandEyes Dashboard is outbound from the agent side. The dashboard never initiates inbound connections into customer networks, making it a firewall‑friendly SaaS solution.
This design significantly reduces security exposure and simplifies firewall approvals, especially in environments with strict inbound access controls.
Traffic Direction and Communication Model
The ThousandEyes Agent always initiates the connection to the ThousandEyes cloud platform. There is no requirement for inbound firewall rules on the customer side. This applies to all agent types, including Enterprise Agents, Enterprise Cluster Agents, Endpoint Agents, and Cloud Agents.
From a network security perspective, this means ThousandEyes behaves like any other trusted SaaS application that uses outbound HTTPS for control and telemetry.
Mandatory Firewall Ports and Protocols
The core communication between the ThousandEyes Agent and the ThousandEyes Dashboard relies on a single mandatory port.
The required details are as follows.
Protocol: TCP
Port: 443
Purpose: Secure agent registration, control traffic, telemetry upload, test results, and heartbeat communication
Direction: Outbound only from agent to ThousandEyes cloud
This single outbound HTTPS connection is sufficient for the ThousandEyes Agent to register, receive test configurations, and send monitoring data.
DNS Requirements
In addition to HTTPS connectivity, agents must be able to resolve ThousandEyes cloud endpoints using DNS.
Protocol: UDP and TCP
Port: 53
Purpose: DNS resolution for ThousandEyes cloud services
DNS resolution is required to reach domain names under the ThousandEyes service namespace.
Allowed Domains (FQDN‑Based Rules)
Cisco recommends allowing outbound connectivity using fully qualified domain names (FQDNs) rather than static IP addresses, because ThousandEyes is a global, scalable SaaS platform.
The following domain pattern should be allowed.
*.thousandeyes.com
This includes dashboard access, agent registration endpoints, and regional service nodes automatically selected by ThousandEyes.
Using FQDN‑based firewall rules or proxy allow‑lists is considered a best practice.
TLS and Encryption Details
All communication between the ThousandEyes Agent and the Dashboard is protected using industry‑standard encryption.
TLS version: TLS 1.2 or higher
Authentication: Agent tokens and certificates
Encryption: End‑to‑end encrypted HTTPS
SSL or TLS inspection is not recommended, as certificate interception can interfere with agent authentication and stability.
Proxy and NAT Behavior
ThousandEyes Agents support operation behind enterprise firewalls, NAT, and proxies.
Supported scenarios include:
- Outbound NAT or PAT
- Explicit HTTP or HTTPS proxy
- Secure internet gateways and SD‑WAN egress points
The agent configuration can be adjusted to use a proxy if required by corporate policy, as long as outbound TCP port 443 is allowed.
What Firewall Access Is NOT Required
One of the most important clarification points for security teams is what is not needed.
No inbound firewall rules are required
No UDP control ports are required
No east‑west agent‑to‑agent communication is required
No direct dashboard‑to‑agent connectivity is required
This makes ThousandEyes significantly easier to deploy than legacy monitoring tools that require inbound access.
Test Traffic Generated by ThousandEyes Agents
While agent‑to‑dashboard communication uses only TCP 443, ThousandEyes agents also generate test traffic toward monitored destinations as part of synthetic tests.
Examples include:
- ICMP echo requests for network latency tests
- TCP connections for application reachability tests
- HTTP or HTTPS probes for web monitoring
- DNS queries for DNS performance tests
This traffic is outbound from the agent to the test target, not to the dashboard, and should be considered separately when designing firewall rules.
Firewall Rule Summary (Security‑Team Friendly)
For most enterprise environments, the minimum required firewall configuration is:
Allow outbound TCP port 443 from ThousandEyes Agent to *.thousandeyes.com
Allow outbound TCP and UDP port 53 from ThousandEyes Agent to configured DNS servers
This minimal rule set is usually sufficient for full ThousandEyes functionality.
Common Firewall‑Related Issues
Typical issues seen during deployment include blocking outbound HTTPS to unknown SaaS domains, enforcing SSL inspection on agent traffic, or restricting access using static IPs instead of domain names. These often cause agent registration failures or intermittent connectivity issues.
Final Takeaway
ThousandEyes follows a secure, outbound‑only communication model that aligns well with modern zero‑trust and enterprise firewall designs. By allowing outbound HTTPS connectivity to the ThousandEyes cloud, organizations can deploy advanced digital experience monitoring without exposing their networks to inbound access risks.
One‑Line Summary
ThousandEyes agents require only outbound TCP 443 connectivity to the ThousandEyes cloud over HTTPS, with no inbound firewall rules needed.