2.4 Firewall Settings: CollabOS
Below you will find all the information needed to set up your firewall to allow software updates for the CollabOS devices on your firewall-secured network.
Protocol
Ports
Destination/FQDN
Usage of the endpoint
Is it needed for device functionality
HTTPS
443
Device CollabOS updates
Mandatory for devices USB mode and appliance mode, with the exception of devices using the service provider Microsoft Teams Rooms on Android.
Recommended but not required for devices using the service provider Microsoft Teams Rooms on Android if devices will be updated solely via Microsoft Teams Admin Center (TAC).
HTTPS
443
Release notes for device updates
Recommended, but optional.
HTTPS
443
Release notes for device updates
Recommended, but optional.
HTTP, HTTPS
80, 443
Internet connection availability detection
Recommended, but optional.
SNTP/UDP
123
Default Network Time Protocol (NTP) time server
Optional. Devices can be configured to use custom NTP servers.
MQTT/TCP
443,(8883 for SOCKS proxy)
Logitech Sync services
Mandatory for devices are managed using Logitech Sync. Otherwise recommended, but optional.
HTTP
8443, 443
The device's IP address
Local Network Access (LNA)
Mandatory to use LNA.
HTTPS
443
Content Delivery Network (CDN) used by Logitech services
Recommended, but optional.
Sync on CollabOS Devices
Beginning with the CollabOS 1.7 release, Sync on CollabOS devices is proxy aware in PAC proxy configurations only. See Firewall and Proxy Setup Information for Sync.
Space management firewall settings
Logitech space management utilizes CollabOS hardware to run its services. To ensure that you have the correct firewall settings to allow space management services to run correctly, see Firewall Settings: Space Management.