Cipafilter Support:
Support@Cipafilter.com
309 517 2022 option 2
Mon - Fri 7 AM - 6 PM CT
ACT Aspire
Posted by , Last modified by on 01 October 2014 03:56 PM

ACT Aspire is an ACT testing program that is available on multiple platforms. In order for the ACT Aspire application to successfully establish a connection, several domains will need to be added to your Cipafilter's Super Whitelist.

 

Enabling ACT Aspire

To add entries to the Super Whitelist, you will need to navigate to the Global Configuration tab of the Group Permissions page on the Cipafilter web interface and press the Super Whitelist button to pull up the Super Whitelist page. Once there, you will want to enter the following domains to your Custom Super Whitelist:

  • testnav.com
  • s3.amazonaws.com

If you are using Chromebooks, you will need to add the following to the Super Whitelist as well:

  • tn.actaspire.org

 

In addition to adding those entries to the Super Whitelist, you will need to add a couple of entries to your firewall if it is in "Drop" mode. Navigate to the Stateful Firewall page and click the blue "Insert New Rule" button. You will need to add rules to accept outbound traffic from your internal subnet to 0.0.0.0/0 (anywhere) on TCP and UDP ports 4480 and 4481. For example, for a 10.0.0.0/8 subnet, your rules should look like the following: 

 

Firewall Entries for ACT Aspire

 

 

*Please note that s3.amazonaws.com hosts a large variety of content which may not be suitable for your environment. When you are not testing, we recommend that you add a # in front of the s3.amazonaws.com entry to comment it out, or remove the entry entirely.

 

keywords: act aspire, act, ACT, testnav, aspire



Attachments 
 
 aspirefirewallfull.png (98.01 KB)
 aspirefirewallruleonly.png (26.52 KB)
(0 vote(s))
Helpful
Not helpful

Comments (0)
©Cipafilter 2017. All Rights Reserved.