The Zoom Community is here!
We welcome all Zoom customers to come together on the Zoom Community to ask questions, find solutions,
and collaborate with peers. Login with your Zoom account credentials and start collaborating!

Zoom Support Maintenance: 9/18/2021

Date and time: 9/18/2021 at 1PM PST for 10 hrs 30 min

We will be performing routine maintenance for Zoom Support. During this time, users may experience system delays or longer than expected wait times when contacting Zoom Support via phone, chat or web submission. All other request methods, based on your plan, will be available during this time. Please refer to for available contact options.

Affected components: Zoom Support Center

Frequently asked questions about web proxy servers for Zoom Phone Follow


Companies often have web proxies that are deployed in their corporate environment to secure outbound internet traffic. Administrators may also have remote workers connect to their corporate workloads using a web proxy to secure their work terminal. Web proxies are additional network components that inspect traffic and may cause performance-related issues to real-time applications like introducing latency, jitter, and packet loss in network congestion scenarios.

Zoom recommends that any real time traffic be whitelisted on a web proxy to ensure that the traffic flows directly from the client through a corporate firewall to the Zoom data centers. If you're unable to whitelist the Zoom traffic, it is recommended to allow UDP traffic through the web proxy however this may introduce latency and jitter and may deteriorate the user experience.

Here are common questions about web proxy servers for Zoom Phone.

This article covers:

Do I need a web proxy server for Zoom Phone?

Due to the real time nature of Zoom Phone, web proxies may provide a sub optimal experience to the end user. Also, in the case of Zoom Phone, all traffic is already encrypted so web proxies do not make it more secure. With this in mind, the best practice is to bypass web proxies when deploying and using Zoom Phone.

Why is it best practice to avoid web proxy servers when using Zoom Phone?

Utilizing standards-based Voice over Internet Protocol (VoIP) to deliver best in class voice services, Zoom Phone delivers a secure and reliable alternative to traditional on-premise PBX solutions. Signaling, call setup and in-call features are delivered via Session Initiation Protocol (SIP) and encrypted using TLS1.2 and PKI Certificates issued by a trusted commercial certificate authority. Zoom uses UDP to route voice traffic which is encrypted using Secure Real-Time Transport Protocol (SRTP) with Advanced Encryption Standard (AES) 256-GCM profiles to ensure that unauthorized parties cannot eavesdrop on phone conversations. For more information on Zoom Phone’s security capabilities, visit the Zoom Trust Center.

How can I secure my Zoom Phone traffic without a web proxy server?

To ensure that Zoom users have an optimal experience, Zoom recommends whitelisting traffic destined to Zoom data centers, i.e. routed directly without a web proxy.

Zoom takes the following steps to ensure that data that is being whitelisted is protected:

  • Zoom clients generate three kinds of traffic:
    • Configuration - download firmware and provisioning files
    • Signaling - used for call setups and teardown
    • Media - actual voice stream which is part of the conversation
  • All traffic from the Zoom clients are encrypted with industry standard encryption technology. To ensure privacy of the traffic, the signaling traffic is encrypted with TLS version 1.2 which limits the possibility of eavesdropping, tampering or forging of this data.
  • The media traffic is encrypted with Secure Real-Time Transport Protocol which provides confidentiality, message authentication and replay protection to the RTP traffic.
  • Configuration and firmware files are downloaded over a HTTPS channel. Since this traffic is not considered real time, this can traverse a web proxy.
  • Traffic from Zoom clients can be whitelisted to known IP addresses and ports. Traffic is typically initiated from the Zoom clients outbound to the Zoom data center limiting any firewall ports that need to be opened for inbound traffic. To ensure that you have the most up to date list of IP addresses, see the list of IP ranges.
  • Zoom maintains a high security standard within our datacenter. Our security postures are documented in our SOC2 reports that are available on request. Third party audits are conducted to ensure that we maintain this high security posture. See detailed reports around our security compliance.