
© 2022 Elemental Machines - 771-00032 rev 01 Element B, EB1 User Manual elementalmachines.com5/5
Communication through Customer Wi-Fi:
Transport Security
The system uses the established communication and security
standard, TLS, to protect data transmitted between Gateways and
the Elemental Insights Dashboard™. TLS is the web standard for
protecting sensitive data including usernames, passwords, credit
card, and banking information and it uses a combination of
asymmetric and symmetric cryptography unique for each connec-
tion to ensure security.
The Elemental Machines Sensory Network’s™ external communi-
cation is designed to work even in the strictest environments. The
communication uses an adaptive transport mechanism that is
designed to work well when confronted with proxy authorities,
firewalls, and antivirus software.
No inbound ports need to be opened. Security vulnerability using
the above configuration is prevented as follows:
1: Internet Communication over port 80, 123, and 443
2: Device must be able to transmit outward to the Internet on 443
3: Clients do not open inbound ports
4: There is no need to open the firewall to receive on port 80, 123,
or 443
5: There is no way for outside users to get into the user's network
6: We do not listen to any ports; this is the case even if the user
opens ports 80, 123, or 443 for receipt
Network Whitelist
Tablet Gateways opens connections through port 80, 123, and 443
of a customer's firewall, opening only outbound connections.
Elemental Gateways require the following outbound TCP connec-
tions to be open on your firewall for the system to work:
• *.elementalmachines.io:443, TCP – for sending data to the
dashboard
• s3.amazonaws.com:[80|443], TCP – various files
• *.awmdm.com:443, TCP – device management
• play.google.com:443, TCP – provisioning
• android.googleapis.com:443, TCP – provisioning
• android.clients.google.com:80, TCP – app management
• time.windows.com:123, UDP – time synchronization
• *.pubnub.com:443, TCP – secure IoT device messaging
• *.pubnub.net:443, TCP – secure IoT device messaging
• *.pndsn.com:443, TCP – secure IoT device messaging
• *.papertrailapp.com:443, TCP – log management
Gateway-2’s open connections through ports 80, 123, and 443 of a
customer's firewall, opening only outbound connections.
Gateway-2’s require the following outbound TCP and/or UDP
connections to be open on your firewall for the system to work:
1. *.elementalmachines.io:443, TCP – for sending data to the
Elemental Machines Insights Dashboard™
2. s3.amazonaws.com:[80|443], TCP – various files
3. *.balena-cloud.com:443, TCP – for device management
4. *.docker.com:443, TCP – for verified operating system images
5. *.docker.io:443, TCP – for verified operating system images
6. time.elementalmachines.io:123, UDP – for time synchronization
7. 8.8.8.8:443, TCP – for DNS resolution
Tablet Gateway Supplemental
Tablet Gateways are based on the Android technology and
therefore enjoy the security benefits of the Android Development
Network and Google. Sourced from the Security whitepaper from
Google, Android:
• Strives to prevent security issues from occurring through design
reviews, penetration testing and code audits
• Performs security reviews prior to releasing new versions of
Android and Google Play
• Publishes the source code for Android, thus allowing the
broader community to uncover flaws and contribute to making
Android the most secure mobile platform
• Works hard to minimize the impact of security issues with
features like the application sandbox Detects vulnerabilities and
security issues by regularly scanning Google Play applications
for malware, and removing them from devices if there’s a
potential for serious harm to the user devices or data
• Has a rapid response program in place to handle vulnerabilities
found in Android by working with hardware and carrier partners
to quickly resolve security issues and push security patches
Network Requirements:
Wireless Requirements:
• SSID: Not hidden
• Security: WEP, WPA, or WPA2
• IP Assignment: Dynamic Preferred
• Number of Unique Devices: Sum of all Gateways and other
Element-D/C/U devices¹
• Captive Portal: Not Supported
Element-B User Manual
Model EB1