2.4 Firewall Settings: CollabOS
Below you will find all the information needed to set up your firewall to allow software updates for the CollabOS devices on your firewall secured network.
Protocol
Ports
Destination/FQDN
Usage of the endpoint
Is it needed for device functionality
HTTPS
443
Device updates service domain
Mandatory for Zoom Rooms, Go To Meetings, RingCentral, Pexip, Tencent appliance mode devices to update to the latest release.
Recommended but optional for Microsoft Teams Rooms on Android.
HTTPS
443
Release note for device updates
Recommended, but optional.
HTTPS
443
Release note for device updates
Recommended, but optional.
HTTP,Ā HTTPSĀ
80, 443
Ping server
Recommended, but optional.
SNTP/UDP
123
Default time server used
Optional. Devices can be configured to use custom NTP servers.
MQTT/TCP
443,(8883 for SOCKS proxy)
Sync serversĀ
Only mandatory. When devices are managed using Logitech Sync.
HTTP
8443, 443
LNA
Mandatory to use LNA
Sync on CollabOS Devices
With the CollabOS 1.7 release, Sync on CollabOS devices are proxy aware on PAC proxy configurations only. Click here for Sync firewall setup: Firewall and Proxy Setup Information for Sync.Ā
Note: SOCKS proxy (which is different from HTTP proxy) is required for mqtt proxy to work.
Two URLs that need to be proxied with SOCKS proxy, port 8883 needs to also be allowed along with port 443.
Ports
MQTT: 8883
HTTPS: 443
Port 443 is used when there is no proxy involved. When a proxy is required, the device uses 8883 instead of 443.Ā
URL
Refer to the example below for the PAC file entry:
if(localHostOrDomainIs(host,āa3fejkt9utwjk2-ats.iot.us-west-2.amazonaws.comā) ||
localHostOrDomainIs(host,āraiden.iot.us-west-2.vc.logitech.comā) {
return āSOCKS <PROXY SERVER HOST>:<PORT>ā;
}
FAQs
Q: Is it possible to inspect the Sync data traffic on CollabOS based devices?
A: The traffic between CollabOS and Logitech servers cannot be inspected using a proxy.