Skip to main content

Troubleshoot Connections to Calxa

Calxa Connection Requirements & Troubleshooting WebSocket Issues

Written by Shem Bogusz
Updated this week

Calxa uses two secure domains to deliver the full application experience. If one of these connections is blocked or modified by your network, some features may not work as expected.

Domains Calxa Uses

cloud.calxa.com

This domain is responsible for:

  • The main Calxa web application

  • Loading dashboards and general navigation

  • API requests to backend

This domain must be reachable over standard HTTPS.

https://cloud.calxa.com

login.calxa.com

This domain is responsible for:

  • User authentication

  • Multi‑factor authentication

  • Password resets and account recovery

  • Redirecting you back to Calxa once sign‑in is complete

This domain must be reachable over standard HTTPS.

https://login.calxa.com 

internal.calxa.com

This domain is responsible for:

  • Real‑time communication

  • Handling long running tasks and processes

    • Generating reports

    • Organisation sync

    • Data imports

  • Notifications and other background task updates

This connection uses WebSockets over WSS (encrypted, similar to HTTPS).

This domain must therefore be reachable over standard HTTPS and WSS.

https://internal.calxa.com
wss://internal.calxa.com

Troubleshooting Steps (for IT Teams)

Tip 💡blocks or re-writes over wss://internal.calxa.com is the most common error

Even when the firewall appears to allow the domain, WebSocket traffic can still be blocked or altered by:

  • Antivirus or endpoint protection (e.g., Datto Antivirus, Web Shield, HTTPS scanning)

  • SSL/HTTPS inspection

  • Transparent proxies

  • Content filtering or traffic‑inspection layers

  • VPNs or corporate network routing rules

These tools may not show a “block” in logs — instead, they silently interrupt or rewrite the WebSocket handshake.

1. Confirm the basics

  • Ensure the user has an active internet connection

  • Test in another browser (Chrome, Edge)

  • Try from a different network (mobile hotspot) to isolate local network effects

  • Try from an alternate device (another PC) to isolate the devices settings

2. Check antivirus / endpoint protection

Look for:

  • Real‑time protection events

  • Web protection / safe browsing logs

  • HTTPS scanning or certificate rewriting

  • Blocked or modified WebSocket traffic

3. Check for SSL/HTTPS inspection

WebSockets over wss: will fail if:

  • Certificates are being intercepted

  • Traffic is being decrypted and re‑encrypted

  • The inspection layer doesn’t support WebSockets properly

4. Confirm firewall and proxy behaviour

Even if rules appear open, verify:

  • No transparent proxy is rewriting headers

  • No content filter is modifying the request

  • WebSocket upgrades (HTTP 101 Switching Protocols) are allowed end‑to‑end

Testing WebSockets with Browser Developer Tools

Chrome / Edge

  1. Open Developer Tools (F12)

  2. Go to the Network tab

  3. At the top, you’ll see a row of filters: All Fetch/XHR JS CSS Img Media etc....

  4. Click Socket or WS — this filters the list to only WebSocket connections

  5. Reload the Calxa page while DevTools is open

  6. You should see an entry for something like:
    NotificationHub?id=....

    OrganisationUpdateHub?id=...
    ReportingStatusHub?id=...

  7. Click it to see:

  • Headers (including the WebSocket upgrade request)

    • Status Code (e.g., “101 Switching Protocols”, “200 OK”, “pending”)

  • Messages (messages sent/received)

What you're looking for?

If the WebSocket connection:

  • never appears -> something is blocking the request before it reaches the browser

  • shows “empty” or “failed”

    • The browser never received an HTTP response

    • Something blocked or intercepted the request before it reached the server

  • appears but status “200 OK” or “Pending”

    • Select the Messages tab

      • If you see {"error":"Handshake was canceled."} a proxy or antivirus is interfering

  • shows “101 Switching Protocols”

    • Connection succeeded

This is one of the quickest ways to confirm whether the issue is local, network‑level, or endpoint‑security‑related.

Did this answer your question?