This site is for AVG Business products only. For articles on Avast Business products, see Avast Business Help. If you are in the right place but cannot find what you are looking for, please contact AVG Business Support for further assistance.

Firewall Requirements

This Article Applies to:

  • AVG Business Cloud Console
  • AVG Business On-Premise Console
  • AVG Business Antivirus

 

For overall functionality, and to enable the Antivirus client and/or the management console to authenticate/update, you must allow certain ports and URL addresses through your firewall or proxy server.

 

Cloud Console, On-Premise Console, and Managed Local Clients

Ports

  • TCP 80 – Internet vulnerability checks and feature updates
  • TCP/UDP 443* – Encrypted communication
  • TCP 8080*, 8090* – Communication between console and clients within local network (only for On-Premise Console)
  • TCP 4158 – Mirror, for local updates within local network
  • TCP 7074 – Remote Deployment within local network
  • TCP 7500 - For push notification services

*These are the default ports, which the administrator can modify during or after setup if needed. Note that any changes should be reflected in the firewall configuration.

URLs

  • *.avast.com
  • *.avg.com
  • *.avcdn.net
  • URLs required by application vendors - Patch Management will download the necessary patches directly from the vendors; therefore, the connections must be allowed in order for the service to operate correctly.

Unmanaged Local Clients

Ports

  • TCP 80 – Internet Vulnerability Checks and Feature Updates
  • TCP/UDP 443 – Encrypted communication
  • TCP 7500 - For push notification services

URLs

  • *.avast.com
  • *.avg.com
  • *.avcdn.net

Geoblocking

AVG web services are hosted in many countries around the world. Therefore, we do not recommend geoblocking in your firewall settings. If geoblocking is necessary, we recommend setting URL Allow rules to supersede geoblocking, so AVG traffic can still be allowed.