Applicable for: Enterprise users who are using corporate firewall and whitelisting policies
First, make sure you have corporate firewalls and whitelisting policies in place on your network systems.
Please contact your company's IT or security team for this whitelisting and firewall setup.
Note
- Marvelous Designer authentication servers only allow HTTPS communication. Therefore, only port 443 is discussed in this article.
- Until Marvelous Designer 10 version, the verify: peer option inside the Marvelous Designer 10 software was disabled, but from Marvelous Designer 11 version it is enabled and built and distributed. So if your company uses SSL Inspection on your secure network system, please check its detailed settings.
- If you need to whitelist Marvelous Designer authentication servers for Marvelous Designer logins on a secure network, add the information below to your security solution.
- If you are experiencing problems downloading in-app assets, please add the domain*.clo-set.com to your whitelist.
- Non-firewalled customers may not need whitelisting of Marvelous Designer authentication servers.
If you need whitelisting and use a corporate firewall
- IPs to be whitelisted
- 52.1.24.50
- 52.20.29.14
- Domains to be whitelisted
- sapi.clo3d.com
- sapi.clo3d-china.com
- *.clo-set.com
- Protocol and port to whitelisted
- https (443 port)
- Enable the Firewall option in Marvelous Designer login window (see the screenshot at the bottom)
If you need whitelisting but don't use a corporate firewall
- IPs to be whitelisted
- 52.1.24.50
- 52.20.29.14
- Domains to be whitelisted
- api.clo3d.com
- api.clo3d-china.com
- *.clo-set.com
- Protocol and port to whitelisted
- https (443 port)
- Disable the Firewall option in Marvelous Designer login window (see below figure)
Firewall option at Marvelous Designer login screen
- Note that the information provided below is only for customers using enterprise firewall solutions, not Windows or macOS firewall features. Check with your company's IT or security team whether you use a firewall.
Article is closed for comments.