Network Diagrams

Network diagrams illustrate how information flows across CXone applications. The arrows in the diagrams represent the flow of information and not the source of the request. Almost all of the flows appear bi-directional, even though the connection may always originate from one location. For example, most API flows are RESTful and always originate with the client. However, data passed through the API may be put into the system, extracted from the system or both. That's why the arrow is shown as bi-directional.

There are several types of divisions, or boundaries, in the diagrams. A primary boundary is between public and private networks. Private networks may include another boundary between internal and DMZ networks. The DMZ provides a way to interact with public networks while protecting sensitive internal networks.

Public cloud systems introduce a combined network which is not entirely public or private. This is referred to as an edge network, since boundary devices and services usually terminate encryption at the edge of the public network.

The diagrams indicate changes in encryption by solid and dashed lines. Depending on the cloud infrastructure, this may result in unencrypted traffic going over edge networks.

Unless otherwise stated, all customer data is encrypted in transit and at rest.

High-Level Components

This diagram shows high-level components of CXone and their relationships with one another. The CXone Cloud container encompasses all CXone infrastructure for both FedRAMP and non-FedRAMP production systems. CXone is hosted in both private and public clouds, and is divided into application infrastructure and voice infrastructure. Voice Infrastructure is hosted almost exclusively through the private cloud.

The containers on the left side are external networks and are essential for product functionality. These external services include:

  • NICE CXone
  • Partners
  • External Services
  • Tenant

In all cases, both personal and non-personal information is being transmitted. Non-encrypted traffic is almost always related to voice or other channelClosed A way for contacts to interact with agents or bots. A channel can be voice, email, chat, social media, and so on. traffic and may not be fully encrypted.

Common Flows

This diagram illustrates how users interact with CXone using the application infrastructure and the following applications:

  • Auto Attendant
  • CXone web portal apps like ACD, Admin, and so on (except FTP)
  • Direct Data Access

Most user interactions occur between a browser and the application infrastructure using standard web protocols and ports (443 and 80). Some CXone suite applications require other services and additional portsClosed Where information transfers, over a network, between a computer and a server. from your environment must be opened. There are three basic services shown in the application infrastructure container:

Each of these are technically web servers but their functions and endpoints are distinct. All endpoints live in a DMZ using a standard tiered-application model. API and web server communication may contain personal information. Authentication flows may contain personal data in token responses.

External Service Integrations

Partners and other providers can create applications that integrate with CXone. This diagram illustrates how users interact with Performance Management using the application infrastructure and external integrations. Partner and external services components are combined to simplify the diagram, but the service could be provided by either.

Partner integrations can include their own authentication or they may integrate through various menus. They will always open in a separate browser instance and integrate through various APIsClosed APIs allow you to automate certain functionality by connecting your CXone system with other software your organization uses.. In very few cases, an integration may consume content from CXone web servers. Customer chat interface is an example of this.

IVR Integrations

This diagram illustrates how IVRClosed Automated phone menu that allows callers to interact through voice commands, key inputs, or both, to obtain information, route an inbound voice call, or both. interacts with tenants and external services. IVR often incorporates data from external sources which may be managed by you or by a third party. In these cases, the traffic always originates from internal servers.

Agent Connectivity

Agents can interact with CXone using several different methods:

These options can use either a physical phone or softphone.

MAX

This diagram illustrates agent connectivity for MAX using a physical phone or softphone. MAX integrates with the application infrastructure. The phone primarily interfaces with the voice infrastructure. There is also some application communication and, for softphones, a dependence on external service integrations.

Salesforce Agent

This diagram illustrates agent connectivity for Salesforce Agent using a physical phone or softphone. These phones are excluded from the diagram for simplicity.

Both agent applications depend on external service resources. However, they also communicate directly with the application infrastructure and are part of the CXone product suite. In some cases, the products may communicate with the authentication server to provide authentication and interact with endpoints.

Channel Connectivity

The following diagrams illustrate the data flow of sensitive information.

Voice Channel

These diagrams illustrate customer-leg voice connectivity within CXone. Redundancy and failover are critical features for voice infrastructure.

Connectivity from the source to a Session Border Controller (SBC) in the voice infrastructure is not shown for simplicity. This connectivity may be a series of links involving a variety of carriers. All of this traffic ends at the SBC in the CXone environment. It is at the SBC that agent-leg connectivity is established.

This information is managed and monitored by the CXone orchestration engine and media server, which can record the conversation. In both instances of recording, CXone has the ability to mask or pause recording if sensitive information is being communicated.

Recordings made by the media server can either pass directly to the file server or they can pass through a compression server. Recordings made by the media server reside in file server storage or Cloud Storage Services.

Real-time voice is not encrypted in transit to the server. Once it is stored on either the media server or the CXone Recording server, it is encrypted at rest and in transit.

Email

Learn more about email networking requirements on the System Email page.

This diagram illustrates inbound email connectivity. Inbound email uses either AWS SES or private cloud email servers. Emails are sent to the storage service where the CXone orchestration engine handles notifications and APIClosed APIs allow you to automate certain functionality by connecting your CXone system with other software your organization uses. access to applications.

In most cases, emails are forwarded to the platform from your SMTP server because the inbound email addresses are owned and managed by your organization.

This diagram illustrates outbound email connectivity. Depending on your requirements, outbound email channels can come:

  • From your SMTP server through a private connection.
  • Through SES (preferred) or private cloud SMTP servers.

Historical information is stored in an Amazon S3 bucket.

Chat

This diagram illustrates omnichannel chat connectivity. Chat is managed through a combination of the business unitClosed High-level organizational grouping used to manage technical support, billing, and global settings for your CXone environment web server, CXone web server, and a series of authentication and API calls that store transcripts. These transcripts can then be moved into Amazon S3 and Amazon Glacier.

IEX WFM Integrated Connectivity

This diagram illustrates basic connectivity between your environment and IEX WFM Integrated.

Engage QM Integrated Connectivity

This diagram illustrates basic connectivity between your environment and Engage QM Integrated. Other architectures are also supported.

Connectivity by Hostname

CXone uses a variety of different hostnames and services depending on the type of connectivity:

Private Data Center Connectivity

The following areas refer to private data centers:

  • US Data Center
  • EU Data Center

This diagram illustrates private data center connectivity with the following hostnames:

Hostnames

agent-{cluster}
agentstats-{cluster}
api-{cluster}
api
bi
bu{tenant}
engage
getnextevent-{cluster}
home-{cluster}
incontrol-{cluster}
intouch-{cluster}
login
phonebook-{cluster}
reporter.engage
screen{num}
search
security
stream{num}
{cluster}
{custom}

Direct AWS Data Center Connectivity

The following areas refer to direct data centers:

  • US AWS
  • FedRAMP AWS
  • EU AWS
  • AUS AWS

The diagram illustrates direct AWS data center connectivity with the following hostnames:

Hostnames

agent-{cluster}
agentstats-{cluster}
analytics-{area}
analytics
api-{area}
api-{cluster}
api
auth
bi-{area}
bu{tenant}-nicewfm
getnextevent-{cluster}
home-{cluster}
incontact
incontrol-{cluster}
intouch-{cluster}
login-{area}
login
phonebook-{cluster}
security-{area}
security
{cluster}
{custom}

Indirect AWS Data Center Connectivity

The following areas refer to public data centers:

  • US AWS
  • FedRAMP AWS
  • EU AWS
  • AUS AWS

The diagram illustrates indirect AWS data center connectivity with the following hostnames:

Hostnames

{area}

Nexidia

This diagram illustrates how CXone connects to Nexidia. This connection is established through the use of these APIs:

These APIs pull recordings and metadata from CXone.

Nexidia Data Flow

This diagram illustrates how recordings and metadata from CXone are pulled into Nexidia servers for analysts to listen to and view.

Enlighten Autopilot

This diagram illustrates how CXone connects to Enlighten Autopilot.