Skip to content

Connection Guide

Connect your Mirth instance to Synura over MLLPS. This takes about 10 minutes.


Before you begin, confirm you have:

  • Your Synura subdomain (e.g. acme), provided during onboarding
  • Mirth Connect installed and accessible (note your version number)
  • Outbound network access from the Mirth server to synura.io on port 443
  • A Synura dashboard account to verify message delivery

Your connection endpoint is:

Host: {subdomain}.synura.io
Port: 443
Protocol: MLLPS (MLLP wrapped in TLS 1.2+)

Replace {subdomain} with the value assigned to your organisation by Synura.


Run these two scripts on your Mirth server to confirm your version and network connectivity.

Linux / macOS:

Terminal window
./scripts/detect-version.sh

Windows (PowerShell):

Terminal window
.\scripts\detect-version.ps1

Note the version number. You’ll need it in Step 2.

Linux / macOS:

Terminal window
./scripts/test-network.sh {subdomain}.synura.io

Windows (PowerShell):

Terminal window
.\scripts\test-network.ps1 {subdomain}.synura.io

A successful run shows a completed TLS handshake. If the test fails, see Troubleshooting.


Synura requires MLLPS (MLLP wrapped in TLS) on port 443. Mirth’s open-source TCP Sender doesn’t support TLS. We provide a free TLS proxy that handles encryption for you — no plugins to buy, no licence fees.

Pick the path that matches your environment:

PathWho It’s ForWhat You Need
Path A: Synura TLS ProxyMost customersOur free installer — works on all Mirth versions
Path B: NextGen SSL ManagerCustomers with a commercial Mirth licence that includes SSL ManagerYour existing SSL Manager plugin
Path C: Zen SSL ExtensionCustomers who have purchased the Zen SSL ExtensionYour existing Zen SSL plugin
Path D: Enterprise TLS ProxyOrganisations with existing TLS infrastructure (F5, HAProxy, etc.)Your IT team configures the proxy

Not sure which path? If you are running the open-source (free) version of Mirth Connect — which most organisations are — use Path A. It takes less than a minute.


We provide a free TLS proxy that works with every Mirth version. One installer. No plugins. No licence fees.

Mirth sends plain MLLP to localhost:2575. The proxy encrypts the connection and forwards it to {subdomain}.synura.io:443.

Mirth (plain MLLP) --> localhost:2575 --> Synura TLS Proxy --> {subdomain}.synura.io:443 (MLLPS)

Option 1: Installer (recommended)

Download and run SynuraTLSProxy-Setup.exe. Enter your subdomain when prompted. The wizard handles the rest.

Installer subdomain page

Installer ready page showing configuration summary

Option 2: PowerShell script

Terminal window
.\scripts\setup-stunnel.ps1 -Subdomain acmelab
Terminal window
sudo ./scripts/setup-stunnel.sh --subdomain acmelab

Confirm the proxy is listening:

Terminal window
# Linux / macOS
netstat -tlnp | grep 2575
# Windows (PowerShell)
Get-Service stunnel

You should see a listener on 127.0.0.1:2575.

  1. Open the Mirth Connect Administrator.
  2. Create a new channel (or open your existing outbound channel). See Mirth Channel Setup for detailed steps.
  3. On the Destination tab, select TCP Sender as the connector type.
  4. Set Transmission Mode to MLLP.
  5. Set the connection settings:
    • Remote Address: localhost
    • Remote Port: 2575
  6. Do not enable TLS/SSL on the Mirth connector — the proxy handles encryption.
  7. Save and Deploy the channel.

Proceed to Step 3: Verify.


If your commercial Mirth licence includes SSL Manager, configure TLS directly on the TCP Sender. No proxy required.

SSL Manager is a paid NextGen extension (Silver/Gold/Platinum subscriptions). It is not part of the open-source Mirth download. Synura does not provide or support this plugin.

  1. Open the Mirth Connect Administrator.
  2. Create a new channel. See Mirth Channel Setup for the channel structure.
  3. On the Destination tab, select TCP Sender with MLLP transmission mode.
  4. Set the connection settings:
    • Remote Address: {subdomain}.synura.io
    • Remote Port: 443
  5. Enable TLS/SSL using the SSL Manager settings on the connector.
  6. Ensure the minimum TLS version is set to TLS 1.2.
  7. Save and Deploy the channel.

For SSL Manager configuration details, refer to the NextGen SSL Manager User Guide or contact NextGen support.

Proceed to Step 3: Verify.


If you have the Zen SSL Extension from ConsultZen, configure TLS directly on the TCP Sender.

Zen SSL is a third-party commercial plugin (annual subscription). Synura does not provide or support it. Details at https://consultzen.com/zen-ssl-extension/

  1. Open the Mirth Connect Administrator.
  2. Create a new channel. See Mirth Channel Setup for the channel structure.
  3. On the Destination tab, use the Zen SSL-enabled TCP/LLP Sender connector.
  4. Set the connection settings:
    • Remote Address: {subdomain}.synura.io
    • Remote Port: 443
  5. Enable TLS in the Zen SSL connector settings.
  6. Ensure the minimum TLS version is set to TLS 1.2.
  7. Save and Deploy the channel.

For Zen SSL configuration details, refer to the ConsultZen documentation.

Proceed to Step 3: Verify.


If your organisation runs a TLS termination proxy (F5, HAProxy, nginx, etc.), your infrastructure team can forward MLLP traffic to Synura directly.

Hand your IT team these configuration values:

SettingValue
Listen addresslocalhost (or an internal IP accessible to the Mirth server)
Listen port2575 (or any available port)
Upstream host{subdomain}.synura.io
Upstream port443
ProtocolTLS 1.2 or higher
SNIRequired — must send {subdomain}.synura.io as the SNI hostname
Client certificateNot required (server-side TLS only)

SNI is required. Without it, Synura will reject the connection. SNI is how we route traffic to your tenant.

Once the proxy is running, configure Mirth to send to localhost:2575 (or whichever address and port the proxy listens on). See Mirth Channel Setup for the Mirth channel setup — use the same settings as Path A.

Proceed to Step 3: Verify.


  1. In the Mirth Dashboard, select your deployed channel.
  2. Click Send Message.
  3. Paste a valid HL7 v2 test message (e.g. an ADT^A01) and click Process Message.
  • In Mirth: The message status should show SENT. The response should contain an AA (Application Accept) acknowledgement.
  • In Synura: Log into the Synura dashboard and confirm the message appears in your inbound message log.

Run the diagnostic bundle script on your Mirth server:

Linux / macOS:

Terminal window
./scripts/diagnostic-bundle.sh

Windows (PowerShell):

Terminal window
.\scripts\diagnostic-bundle.ps1

This collects Mirth version info, network results, stunnel status and recent logs into a single file. Send it to Synura support with your subdomain.

See Troubleshooting for common issues.


SymptomLikely CauseQuick Fix
Connection refused on localhost:2575Synura TLS Proxy (stunnel) is not runningCheck the service status and restart it. See Troubleshooting.
TLS handshake failedCertificate issue or TLS version mismatchRun diagnostic-bundle and check TLS output. Ensure TLS 1.2+ is in use.
Connection timeoutFirewall blocking outbound port 443Run test-network script. Ask your network team to allow outbound TCP 443 to synura.io.
Message sent but no ACKMirth response timeout too short, or sending facility not configured in SynuraIncrease response timeout in Mirth. Verify your sending facility is registered in the Synura dashboard.

For detailed troubleshooting steps, see Troubleshooting.


If you need help at any point, contact support@synura.io with your subdomain and the output of the diagnostic-bundle script.