There are no special Network Requirements, so more secure networks may want to read through the following document and whitelist all relevant addresses and open the specified ports.