Monitoring - The performance in the Sydney (GAUSY) data center is now stabilized. We continue to monitor the data center performance. We will provide additional updates as new information becomes available
Mar 4, 14:14 UTC
Update - We have engaged with our platform provider and are working together to identify the underlying cause. Customers may continue to experience degraded performance or disconnects from the Sydney (GAUSY) Data Center.

We will provide an update as soon as new information is available.
Mar 4, 11:08 UTC
Investigating - Customer connections to the Sydney (GAUSY) data center may experience decreased performance or disconnects from the service. We are currently investigating the issue and will provide additional updates as new information becomes available.
Mar 4, 06:52 UTC
In progress - Scheduled maintenance is currently in progress. We will provide updates as necessary.
Mar 4, 09:00 UTC
Scheduled - The Osaka (GJPOS) WSS site will undergo maintenance beginning on March 4, 2021 starting at 09:00 UTC, lasting for a duration of up to 12 hours.

• IP address changes will occur so it is imperative to adjust access control lists appropriately.
• Carefully review the information below to avoid disruption of service.

Ingress IP Addresses
The IP addresses you forward traffic to for filtering. The IP address must match the connection method. For example, do not connect IPsec tunnels to the IP address for WSS Agent.
IPsec / Proxy-forwarding / Explicit / SEP Agent (Explicit Mode):

• 98.158.245.164 - NO CHANGE

WSS Agent / Unified Agent / SEP Agent:

• 98.158.246.164 - NO CHANGE
• 98.158.247.164 - CAN BE RETIRED AFTER THE MAINTENANCE

Egress IP Addresses
The IP addresses WSS will use to access content on your behalf and to deliver filtered content to your users. If you use application or firewall access control lists, update those lists prior to the maintenance.

• 98.158.245.0/24 - NO CHANGE
• 98.158.246.0/24 - NO CHANGE
• 103.9.96.0/24 - NO CHANGE
• 103.9.97.0/24 - NO CHANGE
• 103.9.98.0/24 - NO CHANGE
• 98.158.247.0/24 - CAN BE RETIRED AFTER THE MAINTENANCE

Impact
No impact to WSS traffic is expected during the maintenance window. However, it is important to make sure that your connection method aligns to the correct ingress IP address to avoid loss of connectivity. For example, following this maintenance IPsec connections will no longer be allowed to connect to IP addresses designated for WSS Agent (see ingress IP address detail above).

Required Action
Failure to make these changes could prevent users from connecting to WSS, accessing third party web applications, or authenticating against the service using the Auth Connector (where applicable).
• Firewall rules regulating connectivity to/from your network to WSS should be adjusted to allow traffic to pass to the IP networks listed above.
• Third party applications that regulate connections by source IP address should be updated to accept connections from the egress IP networks listed above to ensure traffic proxied through WSS can reach the application.
• Auth Connector must be able to communicate with all egress ranges listed above on TCP 443, where applicable.

Guidance by Connection Method:
• IPsec: No action is needed unless your tunnel is connecting to the incorrect ingress IP address (see Impact section above).
• WSS Agent, Unified Agent, SEP Agent: User traffic will be automatically redirected by the service to the nearest alternate site during the maintenance window.
• SEP Agent (Explicit Mode): No action is needed unless your traffic is directed to the incorrect ingress IP address (see Impact section above).
• Explicit proxy and proxy forwarding: No action is needed unless your traffic is directed to the incorrect ingress IP address (see Impact section above).

WARNING:
Any customer, regardless of connection method, with a configuration pointing to a specific site or IP address must manually failover to a secondary site during the migration window to avoid an outage. Explicit redirection should never point to an IP address. Only IPsec connections should be directed to IP addresses.

Support
Questions? Contact technical support by visiting: https://support.broadcom.com/security.

For service status and maintenance updates visit and subscribe to Broadcom Service Status: https://wss.status.broadcom.com.
In progress - Scheduled maintenance is currently in progress. We will provide updates as necessary.
Mar 3, 18:01 UTC
Scheduled - The Middlesex (GGBLO) WSS site will undergo maintenance beginning on March 3rd, 2021 starting at 18:00 UTC, lasting for a duration of up to 48 hours.

• Expect the site to be completely unavailable for the first 12 hours of the maintenance window.
• IP address changes will occur so it is imperative to adjust access control lists appropriately.
• Carefully review the information below to avoid disruption of service.

Ingress IP Addresses
The IP addresses you forward traffic to for filtering. The IP address must match the connection method. For example, do not connect IPsec tunnels to the IP address for WSS Agent.

IPsec / Proxy-forwarding / Explicit / SEP Agent:

• 148.64.26.164 - NO CHANGE

WSS Agent / Unified Agent:

• 148.64.28.164 - NO CHANGE

Egress IP Addresses
The IP addresses WSS will use to access content on your behalf and to deliver filtered content to your users. If you use application or firewall access control lists, update those lists prior to the maintenance.

• 148.64.9.0/24 - NEW
• 148.64.30.0/24 - NEW
• 148.64.26.0/24 - NO CHANGE
• 148.64.27.0/24 - NO CHANGE
• 148.64.28.0/24 - NO CHANGE
• 148.64.29.0/24 - NO CHANGE

Impact
Expect the site to be completely unavailable on March 3rd, 2021 starting at 18:00 UTC, for a duration of up to 12 hours.

Required Action
Failure to make these changes could prevent users from connecting to WSS, accessing third party web applications, or authenticating against the service using the Auth Connector (where applicable).

• Firewall rules regulating connectivity to/from your network to WSS should be adjusted to allow traffic to pass to the ingress IP networks listed above.
• Third party applications that regulate connections by source IP address should be updated to accept connections from the egress IP networks listed above to ensure traffic proxied through WSS can reach the application.
• Auth Connector must be able to communicate with all egress ranges listed above on TCP 443, where applicable.

Guidance for specific connection methods:
• IPsec: Switch to your secondary tunnel prior to the maintenance window.
• WSS Agent and Unified Agent: User traffic will be automatically redirected by the service to the nearest alternate site during the maintenance window.
• SEP Agent: User traffic will be automatically redirected by the service to the nearest alternate site during the maintenance window.
• Explicit proxy and proxy forwarding: Customers directing traffic to proxy.threatpulse.net will be automatically redirected by the service to the nearest alternate site during the maintenance window.

WARNING:
Any customer, regardless of connection method, with a configuration pointing to a specific site or IP address must manually failover to a secondary site during the migration window to avoid an outage. Explicit redirection should never point to an IP address. Only IPsec connections should be directed to IP addresses.

Support
Questions? Contact technical support by visiting: https://support.broadcom.com/security.

For service status and maintenance updates visit and subscribe to Broadcom Service Status: https://wss.status.broadcom.com.
In progress - Scheduled maintenance is currently in progress. We will provide updates as necessary.
Mar 2, 03:00 UTC
Scheduled - The Miami (GUSMI) WSS site will undergo maintenance beginning on March 2, 2021 at 03:00 UTC, lasting for a duration of up to 72 hours.

• For the first 12 hours of the maintenance window, expect the site to be completely unavailable. The site will be available for the remaining duration of the maintenance window.
• IP address changes will occur so it is imperative to adjust access control lists appropriately.
• Carefully review the information below to avoid disruption of service.

Ingress IP Addresses
The IP addresses you forward traffic to for filtering. The IP address must match the connection method. For example, do not connect IPsec tunnels to the IP address for WSS Agent.
IPsec / Proxy-forwarding / Explicit / SEP Agent (Explicit Mode):

• 168.149.137.164 - NO CHANGE

WSS Agent / Unified Agent:

• 168.149.138.164 - NO CHANGE
• 168.149.140.164 - NO CHANGE
• 168.149.139.164 - CAN BE RETIRED AFTER MAINTENANCE
• 168.149.141.164 - CAN BE RETIRED AFTER MAINTENANCE

Egress IP Ranges
The IP addresses WSS will use to access content on your behalf and to deliver filtered content to your users. If you use application or firewall access control lists, add new IP ranges prior to the maintenance:

• 168.149.137.0/24 - NO CHANGE
• 168.149.138.0/24 - NO CHANGE
• 168.149.139.0/24 - NO CHANGE
• 168.149.140.0/24 - NO CHANGE
• 168.149.141.0/24 - NO CHANGE
• 168.149.135.0/24 - NEW

Impact
Expect the site to be completely unavailable on March 2nd 2021, starting at 03:00 UTC, for a duration of up to 12 hours.

Required Action
Failure to make these changes could prevent users from connecting to WSS, accessing third party web applications, or authenticating against the service using the Auth Connector (where applicable).

• Firewall rules regulating connectivity to/from your network to WSS should be adjusted to allow traffic to pass to the ingress IP networks listed above.
• Third party applications that regulate connections by source IP address should be updated to accept connections from the egress IP networks listed above to ensure traffic proxied through WSS can reach the application.
• Auth Connector must be able to communicate with all egress ranges listed above on TCP 443, where applicable.

Guidance for specific connection methods:
• IPsec: Switch to your secondary tunnel prior to the maintenance window.
• WSS Agent and Unified Agent: User traffic will be automatically redirected by the service to the nearest alternate site during the maintenance window.
• SEP Agent: User traffic will be automatically redirected by the service to the nearest alternate site during the maintenance window.
• Explicit proxy and proxy forwarding: Customers directing traffic to proxy.threatpulse.net will be automatically redirected by the service to the nearest alternate site during the maintenance window.

WARNING:
Any customer, regardless of connection method, with a configuration pointing to a specific site or IP address must manually failover to a secondary site during the migration window to avoid an outage. Explicit redirection should never point to an IP address. Only IPsec connections should be directed to IP addresses.

Support
Questions? Contact technical support by visiting: https://support.broadcom.com/security.

For service status and maintenance updates visit and subscribe to Broadcom Service Status: https://wss.status.broadcom.com.
In progress - Scheduled maintenance is currently in progress. We will provide updates as necessary.
Feb 25, 00:01 UTC
Update - Please take a note of the changes made to the Impact section:

Impact
During this maintenance window, end-users may stop receiving WSS Agent notifications for CASB blocks until the next Agent reconnect. No connection methods will be affected. CASB Gateway Interconnect scanning will continue without interruption. All other aspects of our services are expected to function as normal.
Scheduled - Symantec, a division of Broadcom, will be conducting maintenance on the CASB Gateway Interconnect components in each datacenter. During this maintenance event all services will remain operational and available.

Impact
No customer impact is expected. No connection methods will be affected. CASB Gateway Interconnect scanning will continue without interruption.

Timing
The maintenance window will be between February 25th, 2021 through March 5th, 2021. All maintenance will occur between 18:00 and 06:00 local data center time.
Data Centers - Americas Under Maintenance
90 days ago
100.0 % uptime
Today
Buenos Aires (GARBA) Operational
90 days ago
100.0 % uptime
Today
Chicago (GUSCH) Operational
90 days ago
100.0 % uptime
Today
Dallas (GUSDA) Operational
90 days ago
100.0 % uptime
Today
Denver (GUSDV) Operational
90 days ago
100.0 % uptime
Today
Las Vegas (GUSLV) Operational
90 days ago
100.0 % uptime
Today
Mexico City (GMXMC) Operational
90 days ago
100.0 % uptime
Today
Miami (GUSMI) Under Maintenance
90 days ago
100.0 % uptime
Today
Montreal (GCAMO) Operational
90 days ago
100.0 % uptime
Today
New York (GUSSA) Operational
90 days ago
100.0 % uptime
Today
San Jose (GUSSC) Operational
90 days ago
100.0 % uptime
Today
Sao Paulo (GBRSP) Operational
90 days ago
100.0 % uptime
Today
Seattle (GUSSE) Operational
90 days ago
100.0 % uptime
Today
Toronto (GCATO) Operational
90 days ago
100.0 % uptime
Today
Washington, DC (GUSAS) Operational
90 days ago
100.0 % uptime
Today
Data Centers - Europe, Middle East & Africa Under Maintenance
90 days ago
99.98 % uptime
Today
Amsterdam (GNLAM) Operational
90 days ago
100.0 % uptime
Today
Bucharest (GROBU) Operational
90 days ago
100.0 % uptime
Today
Copenhagen (GDKCP) Operational
90 days ago
100.0 % uptime
Today
Dubai (GAEDX) Operational
90 days ago
100.0 % uptime
Today
Dublin (GIEDU) Operational
90 days ago
100.0 % uptime
Today
Frankfurt (GDEFR) Operational
90 days ago
100.0 % uptime
Today
Helsinki (GFIHE) Operational
90 days ago
100.0 % uptime
Today
Johannesburg (JNB2) Operational
90 days ago
99.94 % uptime
Today
London (GGBLR) Operational
90 days ago
99.92 % uptime
Today
Madrid (GESMA) Operational
90 days ago
100.0 % uptime
Today
Middlesex (GGBLO) Under Maintenance
90 days ago
99.92 % uptime
Today
Milan (GITMI) Operational
90 days ago
100.0 % uptime
Today
Munich (GDEMU) Operational
90 days ago
100.0 % uptime
Today
Oslo (GNOOS) Operational
90 days ago
100.0 % uptime
Today
Paris (GFRPA) Operational
90 days ago
100.0 % uptime
Today
Stockholm (GSESK) Operational
90 days ago
100.0 % uptime
Today
Tel Aviv (GILTA) Operational
90 days ago
99.92 % uptime
Today
Turin (GITTU) Operational
90 days ago
100.0 % uptime
Today
Zurich (GCHZU) Operational
90 days ago
100.0 % uptime
Today
Dubai (GAEDX2) Operational
90 days ago
100.0 % uptime
Today
Data Centers - Asia Pacific Under Maintenance
90 days ago
99.98 % uptime
Today
Auckland (GNZAU) Operational
90 days ago
100.0 % uptime
Today
Beijing (PEK1) Operational
90 days ago
99.74 % uptime
Today
Chennai (GINCH) Operational
90 days ago
100.0 % uptime
Today
Hong Kong (GCNHK) Operational
90 days ago
100.0 % uptime
Today
Mumbai (GINMU) Operational
90 days ago
100.0 % uptime
Today
Osaka (GJPOS) Under Maintenance
90 days ago
100.0 % uptime
Today
Seoul (GKRSE) Operational
90 days ago
100.0 % uptime
Today
Shanghai (SHA1) Operational
90 days ago
100.0 % uptime
Today
Singapore (GSGRS) Operational
90 days ago
100.0 % uptime
Today
Sydney (GAUSY) Operational
90 days ago
100.0 % uptime
Today
Taipei (GTWTA) Operational
90 days ago
100.0 % uptime
Today
Tokyo (GJPTK) Operational
90 days ago
100.0 % uptime
Today
Wellington (GNZWL) Operational
90 days ago
100.0 % uptime
Today
Portal & Reporting Operational
90 days ago
99.94 % uptime
Today
API Services Operational
90 days ago
99.98 % uptime
Today
Cloud Portal Operational
90 days ago
99.8 % uptime
Today
Log Transfer Services Operational
90 days ago
99.97 % uptime
Today
Management UI Operational
90 days ago
99.8 % uptime
Today
PAC File Management System (PFMS) Operational
90 days ago
100.0 % uptime
Today
Reporting Services and Portal Dashboards Operational
90 days ago
99.97 % uptime
Today
Symantec Secure Login Operational
90 days ago
100.0 % uptime
Today
Software Download Licensing Operational
90 days ago
100.0 % uptime
Today
Global Services Under Maintenance
90 days ago
99.99 % uptime
Today
Data Center Selection  Services Operational
90 days ago
99.99 % uptime
Today
Mobile Device Enrollment Service Operational
90 days ago
100.0 % uptime
Today
Global Intelligence Network Operational
90 days ago
100.0 % uptime
Today
Anti-Malware Scanning Operational
90 days ago
100.0 % uptime
Today
Malware Analysis Sandbox Operational
90 days ago
100.0 % uptime
Today
DLP Scan Interconnect Operational
90 days ago
100.0 % uptime
Today
CASB Gateway Interconnect Under Maintenance
90 days ago
100.0 % uptime
Today
Web-Isolation Interconnect Operational
90 days ago
100.0 % uptime
Today
WebPulse Operational
90 days ago
100.0 % uptime
Today
System for Cross-domain Identity Management Operational
90 days ago
100.0 % uptime
Today
Operational
Degraded Performance
Partial Outage
Major Outage
Maintenance
Major outage
Partial outage
No downtime recorded on this day.
No data exists for this day.
had a major outage.
had a partial outage.