2.4 Firewall Settings: CollabOS

Below you will find all the information needed to set up your firewall to allow software updates for the CollabOS devices on your firewall-secured network.

Protocol

Ports

Destination/FQDN

Usage of the endpoint

Is it needed for device functionality

HTTPS

443

updates.vc.logitech.com

Device updates service domain

Mandatory for Zoom Rooms, Go To Meetings, RingCentral, Pexip, Tencent appliance mode devices to update to the latest release.

Recommended but optional for Microsoft Teams Rooms on Android.

HTTPS

443

releasenotes.vc.logitech.com

Release note for device updates

Recommended, but optional.

HTTPS

443

svcs.vc.logitech.com

Release note for device updates

Recommended, but optional.

HTTP,  HTTPS 

80, 443

ping.vc.logitech.com

Ping server

Recommended, but optional.

SNTP/UDP

123

time.android.com

Default time server used

Optional. Devices can be configured to use custom NTP servers.

MQTT/TCP

443,(8883 for SOCKS proxy)

a3fejkt9utwjk2-ats.iot.us-west-2.amazonaws.com

raiden.iot.us-west-2.vc.logitech.com

Sync servers 

Only mandatory. When devices are managed using Logitech Sync.

HTTP

8443, 443

LNA

Mandatory to use LNA

Sync on CollabOS Devices

With the CollabOS 1.7 release, Sync on CollabOS devices are proxy aware on PAC proxy configurations only. Click here for Sync firewall setup: Firewall and Proxy Setup Information for Sync. 

Space management firewall settings

Logitech space management utilizes CollabOS hardware to run its services. To make sure that you have the correct firewall settings to allow space management services to run correctly please visit this page.

AI assisted translation
Menu