Cloud SWG Announcement London, England (GGBLO) POP Failover Testing February 11, 2025

1 day and 12 hours
Scheduled
Scheduled

The London, England (GGBLO) Cloud SWG site will undergo a data center failover test beginning on February 11, 2025 starting at 20:00 UTC, lasting for a duration of up to 36 hours. Failover testing is conducted on a regular basis to ensure the platform can gracefully handle a real outage. Carefully review the information below to avoid disruption of service.

Timing

  • Failover : February 11, 2025 at 20:00 UTC
  • Failback : February 12, 2025 at 20:00 UTC

Impact

The following describes what happens to connected clients during the testing window, based on access method:

  • WSS Agent and SEP Agent: The service automatically redirects connections to alternate infrastructure within the same geographic location during the testing window.
  • No other connection methods will be impacted.
  • WSS Agent status window will display the data center name as UNK (ip_address) by design. Browsing to pod.threatpulse.com will display the data center name.

Cloud SWG London, England (GGBLO) egress IP ranges (provided for convenience; there are no changes):

  • 148.64.28.0/24
  • 148.64.29.0/24
  • 148.64.9.0/24
  • 148.64.30.0/24

Cloud SWG Dover, England (GGBDO) egress IP ranges (provided for convenience; there are no changes):

  • 109.68.59.0/24
  • 109.68.60.0/24
  • 109.68.61.0/24
  • 109.68.62.0/24

Please reference this KB article for all Cloud SWG data center IP ranges.

Required Action

Prior to February 11 ,2025, please ensure that your agents can connect to any Cloud SWG data center to maximize failover opportunities. Although most agents will fail over to Dover, some may failover to other data centers for various reasons. Failure to make these changes could prevent users from connecting to Cloud SWG, accessing third party web applications, or authenticating against the service using the Auth Connector (where applicable).

  • Firewall rules regulating connectivity to/from your network to Cloud SWG should be adjusted to allow traffic to pass to the IP networks listed in the KB article above.
  • Third party applications that regulate connections by source IP address should be updated to accept connections from the IP networks in the KB article above to ensure traffic proxied through Cloud SWG can reach the applications.
  • Auth Connector must be able to communicate with all IP ranges listed in the KB article above, on TCP 443, where applicable.

Technical Support

Experiencing issues? Contact technical support by visiting here.

For service status and maintenance updates visit and subscribe to Broadcom Service Status.

Affected components