2.4 Firewall Settings: CollabOS

Below you will find all the information needed to set up your firewall to allow software updates for the CollabOS devices on your firewall secured network.

Protocol

Ports

Destination/FQDN

Usage of the endpoint

Is it needed for device functionality

HTTPS

443

updates.vc.logitech.com

Device updates service domain

Mandatory for Zoom Rooms, Go To Meetings, RingCentral, Pexip, Tencent appliance mode devices to update to the latest release.

Recommended but optional for Microsoft Teams Rooms on Android.

HTTPS

443

releasenotes.vc.logitech.com

Release note for device updates

Recommended, but optional.

HTTPS

443

svcs.vc.logitech.com

Release note for device updates

Recommended, but optional.

HTTP,Ā  HTTPSĀ 

80, 443

ping.vc.logitech.com

Ping server

Recommended, but optional.

SNTP/UDP

123

time.android.com

Default time server used

Optional. Devices can be configured to use custom NTP servers.

MQTT/TCP

443,(8883 for SOCKS proxy)

a3fejkt9utwjk2-ats.iot.us-west-2.amazonaws.com

raiden.iot.us-west-2.vc.logitech.com

Sync serversĀ 

Only mandatory. When devices are managed using Logitech Sync.

HTTP

8443, 443

LNA

Mandatory to use LNA

Sync on CollabOS Devices

With the CollabOS 1.7 release, Sync on CollabOS devices are proxy aware on PAC proxy configurations only. Click here for Sync firewall setup: Firewall and Proxy Setup Information for Sync.Ā 

Note: SOCKS proxy (which is different from HTTP proxy) is required for mqtt proxy to work.

Two URLs that need to be proxied with SOCKS proxy, port 8883 needs to also be allowed along with port 443.

if(localHostOrDomainIs(host,ā€œa3fejkt9utwjk2-ats.iot.us-west-2.amazonaws.comā€) || 
localHostOrDomainIs(host,ā€œraiden.iot.us-west-2.vc.logitech.comā€) {

return ā€œSOCKS <PROXY SERVER HOST>:<PORT>ā€œ;
}

FAQs

Q: Is it possible to inspect the Sync data traffic on CollabOS based devices?

A: The traffic between CollabOS and Logitech servers cannot be inspected using a proxy.

AI assisted translation
Menu