Prerequisites for Cisco Security for Chromebooks Client

To enable DoH protection on the Cisco Secure Chromebook client, these prerequisites are required:

  • You must have Cisco Security for Chromebooks Client.
  • You must have Secure Access login credentials.
  • A Google Workspace Admin account to push the Cisco Security for Chromebook client to all the Chromebook devices.
  • Recommended: Sync Google Workspace Identities with Secure Access to apply Google Workspace user and organizational unit based policies. For information, see Integrate Google Workspace Identities.
  • Chrome OS 110 or later (to enable DoH-based DNS layer protection on Chromebooks).
  • Chromebooks must not be in kiosk mode.
  • For DNS-layer protection, port 53 UDP and 443 TCP must be allowed.

We recommend that you remove these solutions before deploying Cisco Security for Chromebook client.

  • The following devices and operating systems are not supported:
    • Chrome browser on OS X, Windows, and Linux
    • Devices running variations or third-party distributions of ChromeOS, such as Neverware CloudReady

Network requirements

ProtectionPort and ProtocolSource/DestinationNotes
DNS Layer53 (UDP)Configured DNS resolvers should be
reachable.
DNS Layer443 (TCP) Registration.Registration.
polaris.qq.opendns.com
Used for registration of the client.
DNS Layer443 (TCP) sync.hydra.opendns.comHTTPS. Used to sync device
details and to fetch configuration.
DNS Layer443 (TCP)doh.sse.cisco.comHTTPS. Used to resolve DNS requests.

About Cisco Security for Chromebooks < Prerequisites for Cisco Security for Chromebooks > Limitations for Cisco Security for Chromebooks Client