System Scope and Security Protocols
The Q-SYS OS is a highly adaptable platform for the processing and distribution of audio, video, and control signals in a wide variety of applications. From meeting rooms to stadiums to cruise ships and theme parks, Q-SYS provides audio, video, and control signal input, processing, distribution, and output in a real-time, network-connected system. The solution comprises native Q-SYS products (including software, cloud services, and hardware designed and delivered by QSC), with each system deployment including some or all of those components. Additionally, the Q-SYS OS includes a large number of optional software capabilities for integration with third-party systems such as SIP for VoIP calling, SNMP for device monitoring, multicast media streaming for audio distribution, as well as third-party Lua scripting for custom programming.
Here is an example Q-SYS deployment, including the logical signal flow (transported over a Layer 3 network):


The Q-SYS Core processor is the main system processor for every Q-SYS system. It leverages Intel processing with a custom, highly optimized, real-time Linux operating system. The Core handles all audio and control signal processing and orchestrates the distribution of Q-SYS video signals over the network.
As of Q-SYS Designer Software v9.2, the Q-SYS OS is based on kernel.org Longterm branch v4.19. Some open-source libraries are incorporated, as required, to support a variety of applications in the OS. Security patches are applied through Q-SYS firmware updates; there are no methods to apply patches outside of a Q-SYS firmware update. CLI access is restricted in scope to troubleshooting and maintenance purposes. Root is accessible only via time-limited, QSC-signed certificates and will only be used by QSC support personnel who have local access to the Core at the request of the customer. Video monitor outputs found on the motherboard of the various Core models are used for development only. There is no user access using keyboard, mouse or monitor.

The Q-SYS OS natively supports a broad range of audio, video and control I/O interfaces and endpoints, developed and supported by QSC. The Q-SYS Core processor manages the firmware on its associated Q-SYS peripherals to ensure that they are always running the same compatible firmware as the Core.
Security updates for Q-SYS devices are applied only through firmware updates; there is no mechanism to “side load” a patch outside of a Q-SYS firmware update. Q-SYS peripherals share the same certificate-based authentication as Q-SYS Cores for CLI access to Root, which is also restricted in scope to troubleshooting and maintenance only.

To simplify system configuration, Q-SYS uses a multicast-based device discovery protocol to advertise basic device information on the local area network. The content of the packets is benign in nature and dramatically improves the user experience for system design and deployment. To advertise network presence, one multicast QDP packet is sent every second from Q-SYS peripherals and the PC running Q-SYS Designer Software.
Note: PTZ-IP Series cameras do not use QDP. Instead, they use Web Services Discovery. See Multicast Addressing.
Example QDP packet contents
<QDP><device> <name>core-110f-dddd</name> <type>core</type> <platform>core</platform> <part_number>Core 110f</part_number> <ref>device.core.core-110f-dddd</ref> <is_virtual>false</is_virtual> <lan_a_ip>192.168.1.118</lan_a_ip> <lan_a_lldp>30:23:03:bf:8f:46+gi3</lan_a_lldp> <lan_b_ip/> <lan_b_lldp/> <aux_a_ip/> <aux_a_lldp/> <aux_b_ip/> <aux_b_lldp/> <web_cfg_url>/network-settings</web_cfg_url> <secure_comm>enabled</secure_comm> </device> <control> <role>core</role> <design_pretty>camera-video-bridge</design_pretty> <design_code>pdTHJ5GGNifl</design_code> <primary>1</primary> <redundant>0</redundant> <device_ref>device.core.core-110f-dddd</device_ref> <ref>control.pdTHJ5GGNifl.core.primary</ref> </control> <query_ref>control.pdTHJ5GGNifl.*</query_ref> </QDP>
Details
Q-SYS Discovery Protocol (QDP) | |
---|---|
Transport |
UDP (multicast) |
Multicast Address |
224.0.23.175 |
Port |
2467-2470 |
Encryption |
None |

Q-SYS Core processors and Q-SYS peripherals both host a native web application for local device management, referred to as Q-SYS Core Manager and Q-SYS Peripheral Manager, respectively. Owing to the difference in scope between a Core and a peripheral, there are subtle differences between the capabilities and communication technologies used for each.
Both web applications support encrypted and unencrypted communications. The user can disable unencrypted web communications for Core Manager using the Network Services manager; it is not possible to do the same in Peripheral Manager.
Note: The use of unencrypted communications is not recommended and will be deprecated in future software releases. Refer to the What's New in Q-SYS 9.13 section of the Release Notes for more information.
Details
Core Manager | Peripheral Manager | |||
---|---|---|---|---|
|
Unencrypted |
Encrypted |
Unencrypted |
Encrypted |
Protocol |
WS |
HTTPS and WSS |
WS |
HTTPS |
Port |
80 |
443 |
80 |
443 |
Encryption |
None |
TLS_AES_128_GCM_SHA256 |
None |
TLS_AES_128_GCM_SHA256 |
For encrypted communications, Q-SYS Core processors and other Q-SYS devices use self-signed certificates that can cause modern web browsers to present a privacy warning. This is expected and, provided the user is confident that they are connecting to the correct device, should not cause alarm. The user can avoid this by installing a Device Certificate – signed by the organization's certificate authority (CA). To learn more, see the Core Manager > Network > Certificates topic or the Peripheral Manager > Certificates topic.

Each Q-SYS system requires at least one Core processor. However, depending on the scale, complexity, and desire of the system designer, it is possible to have more than one Core in a Q-SYS deployment. Those options are discussed here.
Core redundancy
In this case, a pair of identical Q-SYS Core processors are assigned to the same System and are both configured to run the same design file. While both are powered up, connected to the network, and communicating with each other, only one Core (the Active Core) is communicating with connected devices.
If the Active Core fails or is removed, then the Standby Core automatically takes over responsibility for the system. To ensure that the Standby Core is running an identical configuration to the Active Core, the Standby Core continuously synchronizes all system parameters and files from the Active Core so that it is ready to take over at any time.
Q-SYS Core processors use Q-SYS Discovery Protocol (QDP) to identify each other on the network, which is an unencrypted multicast UDP announcement containing basic device information.
Tip: Beyond device discovery, all further communication between a redundant pair of Cores is fully encrypted.
Details
Core Redundancy | |||
---|---|---|---|
Negotiation and File Sync |
Control Communications |
Discovery |
|
Protocol |
HTTPS |
TLS |
QDP |
Transport |
TCP |
TCP |
UDP |
Multicast Address |
None |
None |
224.0.23.175 |
Port |
443 |
1704 |
2467-2470 and unicast on port 6504 |
Encryption |
TLS_AES_128_GCM_SHA256 |
TLS_AES_128_GCM_SHA256 |
None |
Q-SYS Core Redundancy can be enabled or disabled in Core Manager > Network > Services. Refer to the Network Interfaces, Services, & Protocols topic to see a list of protocols used for this service.
Distributed systems deployments
In this case, two or more Core processors can be used to serve the needs of a large facility, with each Core (or pair of redundant Cores) responsible for processing and managing its own part of the complete system. In this scenario, each system can largely run independently and there may be no need to share any data between them.
However, if there is a desire to share data between each system (for example, to synchronize startup or shutdown sequences or to facilitate multi-Core paging), then it is possible to use the following native, built-in capabilities:
- Core-to-Core control using Control Link Server and Client components.
- Core-to-Core audio using Q-LAN TX and RX components.
- Core-to-Core audio and video using System Link TX and RX components.
- Users could also create their own custom, encrypted or unencrypted solutions to send data between Cores using the Control Scripting capabilities. This is outside the scope of this document.
Control Link (client and server), Q-LAN TX / RX audio streams, and System Link TX / RX AV streams all use QDP for device discovery and are not currently encrypted. (Encryption is planned for a future software release.) Refer to the Control Link, Q-LAN Transmitter, Q-LAN Receiver, and System Link topics to learn about these components, including their characteristics and controls.
Details
Control Link Server & Client | Q-LAN TX & RX | System Link TX & RX | |
---|---|---|---|
Transport |
TCP |
UDP / RTP |
TCP / UDP / RTP |
Port |
1700 |
319, 320 6518 - 7030 |
1700 319, 320 6518 - 7030 |
Encryption |
None |
None |
Q-SYS Shift content uses AES-128 encryption - see Q-SYS video-protected content distribution. All other content is currently unencrypted. |

The Q-SYS Core processor manages all peripheral devices associated with the running design file. Device management includes configuration settings and real-time health status monitoring. No personally identifiable information is included in these control data exchanges.
Cores and peripherals use Q-SYS Discovery Protocol (QDP) to identify each other on the network, which is an unencrypted, multicast UDP announcement containing basic device information. Encrypted HTTPS is used to transfer any device configuration information. Real-time control communications between Cores and peripherals are not currently encrypted but planned to be added in an upcoming software release.
Details
Q-LAN Control Connections | |||
---|---|---|---|
|
Negotiation and File Sync |
Real-time Control |
Discovery |
Protocol |
HTTPS |
QCB |
QDP |
Transport |
TCP |
TCP |
UDP |
Multicast Address |
N/A |
N/A |
224.0.23.175 |
Port |
443 |
1700 |
2467-2470 and Unicast on Port 6504 |
Encryption |
TLS_AES_128_GCM_SHA256 |
None |
None |

The Q-SYS Core processor uses an RTP-based media streaming technology (Q-LAN) for distribution of real-time audio between the Core and all Q-SYS peripheral devices that feature audio I/O.
Q-LAN is not yet encrypted, but encryption is planned for a future release.
Details
Q-LAN Audio Streams | |||
---|---|---|---|
|
Audio Streaming |
Media Clock Synchronization |
Discovery |
Protocol |
RTP & RTCP |
PTPv2 |
QDP |
Transport |
UDP |
UDP |
UDP |
Multicast Address |
N/A |
224.0.1.129 |
224.0.23.175 |
Ports |
6518 – 7030 |
319 – 320 |
2467-2470 and unicast on port 6504 |
Encryption |
None |
None |
None |

In nearly all cases, Q-SYS peripheral devices do not communicate directly with each other. Instead, they route their audio and control data to the Core, where it is processed and can be distributed to other peripherals on the network. The exception to this signal flow paradigm are Q-SYS NV Series Video Endpoints, where AV data is routed directly from peripheral to peripheral, bypassing the Core.
Q-SYS video-protected content distribution
Q-SYS offers HDMI I/O distribution through the Q-SYS NV Series Video Endpoints using the Q-SYS Shift codec. For video content distribution, Q-SYS NV Series devices are designed to transmit AV streams over the network directly from Encoder to Decoder. Q-SYS NV Series devices use QDP, just like the other Q-SYS devices on the network, as part of their discovery process.
The video content within the AV streams between Q-SYS NV Series devices is encrypted with AES-128, as required by the HDCP 2.2 standard.
To reduce the chance of multicast IP address overlap, 'Auto' mode (default) seeds addresses in the following ranges using a combination of the device type and MAC address of the Core's primary LAN interface. For each Core, the third octet of the range receives the seeded value.
Details
Q-SYS Shift Video Streams | ||
---|---|---|
AV Stream |
Discovery |
|
Protocol |
RTP, RTCP / RTSP |
QDP |
Transport |
UDP / TCP |
UDP |
Multicast Address (Auto - default) |
233.252.0.0 – 233.252.255.255 |
224.0.23.175 |
Port Range |
7400 – 7505 5540 – 5542 |
2467-2470 and Unicast on Port 6504 |
HDCP Versions |
1.4 and 2.2 (HDMI) |
N/A |
Encryption |
AES-128 |
None |
Q-SYS IP camera video streams
Q-SYS offers a portfolio of IP video cameras to facilitate highly flexible camera distribution and switching for a variety of applications. The IP cameras stream video data across the network before finally being converted to USB using one of the various Q-SYS USB bridging interfaces. The video stream is then input to a PC using built-in UVC and UAC drivers over USB.
- PTZ-IP Series Cameras: Unlike other Q-SYS devices, Q-SYS Core processors do not use QDP to discover Q-SYS PTZ-IP Series cameras. Instead, they use WS-Discovery (Web Services-Discovery, or WSD) via multicast UDP to discover Q-SYS PTZ-IP Series cameras on the network.
- NC Series Cameras: The Q-SYS Core processor uses QDP to discover all Q-SYS NC Series Cameras.
To reduce the chance of multicast IP address overlap, 'Auto' mode (default) seeds addresses in the following ranges using a combination of the device type and MAC address of the Core's primary LAN interface. For each Core, the third octet of the range receives the seeded value.
Note: The network-based camera video streams and control data are not currently encrypted, although it is planned to add encryption capabilities to the Q-SYS IP camera family in the future.
Details
Q-SYS IP Camera Video Streams | |||
---|---|---|---|
Video Stream |
Discovery – PTZ-IP Series Cameras |
Discovery – NC Series Cameras |
|
Protocol |
RTP |
WSD |
QDP |
Transport |
UDP |
UDP |
UDP |
Multicast Address (Auto - default) |
233.253.0.0 – 233.253.255.255 |
239.255.255.250 |
224.0.23.175 |
Ports |
8010 and 8012 (multicast) Ephemeral 32768-61000 (unicast) |
3702 |
2467-2470 (multicast) 6504 (unicast) |
Codecs |
Mediacast Stream: H.264 Preview Stream: H.264 |
N/A |
N/A |
Encryption |
None |
None |
None |
Q-SYS IP camera video previews
Q-SYS cameras provide a still image preview that is updated once per second. This preview image is useful for aiming the camera, validating recalled presets, and verifying the image being sent to the conferencing system or USB bridging infrastructure. The preview image is available for client devices or software applications to download and display. This preview is often presented on the in-room touch screen controller displaying the User Control Interface (UCI).
In Q-SYS version 9.3.0 and later, Q-SYS cameras offer a lower resolution live video Preview Stream for consumption by third-party devices and applications. This is configured through the Status/Control (Cameras) or USB Video Bridge component, and is an RTSP stream with an H.264 codec.
Q-SYS Reflect allows authorized support personnel to access the Q-SYS Core processors to view and interact with UCIs remotely using a web browser. The camera preview image is therefore viewable if it is placed in the UCI. Users who have access to the Core using Q-SYS Designer Software, either locally or remotely via Q-SYS Reflect, can also view these camera preview images.
Tip: If the ability to view camera preview images remotely on a UCI is a security concern, then the camera preview should not be placed on the UCI. Alternatively, if having a camera preview in the UCI is required, it is possible to add PIN protection to the UCI. To learn how, see the Core Manager > User Control Interfaces topic.

The Q-SYS OS includes an open scripting environment for custom programming that can be enabled through a perpetual software license or, in the case of some older Core processor models, is included with purchase of the Core. The Q-SYS Scripting Engine allows the user to create scripts to perform any number of tasks that go beyond the native capabilities of the platform.
Common uses of the Scripting Engine are control, management, and monitoring of third-party devices and advanced system automation tasks. The Scripting Engine offers both native Lua libraries (version 5.3) and libraries that are customized for Q-SYS. Users can author scripts in a traditional script editor or use a modular, block-based code editor for easier manipulation of the underlying Lua code.
The Q-SYS Scripting Engine facilitates both custom, user-defined scripts as well as plugins that are distributed through Asset Manager in Q-SYS Designer Software. The contents of user scripts can optionally be encrypted. They can also be protected from unauthorized changes with the Core's Access Control capabilities.
To learn about how to enable Access Control on the Core, see the Core Manager > Access Management > Users topic. For details on the full capabilities of the Q-SYS Scripting Engine, see the Control Scripting topic.
File system access
The Q-SYS Scripting Engine can access a sandbox on the Q-SYS Core processor's file system. This access is limited to /media
(where audio files are typically stored) and /design
(where system design specific settings are stored). No other parts of the Core's filesystem are accessible from the Scripting Engine.

To facilitate the many areas throughout Q-SYS where HTTPS communication is used, the Q-SYS Core processor is configured with a self-signed Device Certificate. This can generate privacy warnings in modern web browsers, which are expected. To prevent these warnings, the user can install a device certificate – signed by the organization’s certificate authority (CA) – to each Q-SYS Core and peripheral.
- For Q-SYS Cores, use Core Manager to configure device certificates.
- For Q-SYS peripherals, use Peripheral Manager to configure device certificates.

With the exception of Q-SYS PTZ-IP cameras, all Q-SYS Core processors and peripherals support 802.1X for network infrastructure access protection. Enabling 802.1X is an effective way of ensuring that only authorized devices can access network resources.
- For Q-SYS Core processors, use Core Manager to enable and configure 802.1X.
- For Q-SYS peripherals, use Peripheral Manager to enable and configure 802.1X.
Note: Although Q-SYS PTZ-IP cameras do not currently support 802.1X, this functionality is being evaluated for future support.

While an SSH server exists on the Core, it is protected by certificate authentication and is not available to the user. SSH access is only for diagnostics and maintenance by QSC engineering if support is requested, authorized, and local access is provided by the user. SSH is disabled by default on the Core and this setting can be checked on the Core using the Secure Maintenance & Support network service in Core Manager > Network > Services.
Note: SSH access to the CLI cannot currently be disabled on Q-SYS peripherals. QSC cannot access this interface without end-user authorization for support purposes.

Q-SYS Designer Software (QDS) v9.1.0 and later implements cryptographic code signing for Core firmware images to ensure their authenticity. For the purpose of downgrading the Core to version 9.0.1 or earlier, administrators can enable the Allow Legacy Unsigned Firmware (QDS v9.0.1 or lower) option in Core Manager > Utilities. This option is available only for Administrator users with access to Q-SYS Core Manager.

Q-SYS offers dedicated Windows OS-specific applications and modern web applications for various functions that can be performed by the system installer, the AV technician, and even the end user.

Q-SYS Designer Software (QDS) is the primary software application for designing, troubleshooting, and modifying a Q-SYS system. These functions are normally performed by the system installer or AV technician.
QDS uses QDP to discover all Q-SYS devices. QDS then uses encrypted communications for all further configuration, settings, design upload and download, and firmware updates for the Q-SYS Core.
Tip: HTTPS is enabled on the Core by default and cannot be disabled.
Audio Monitor (Hovermon)
The Audio Monitor feature, more commonly known as the “Hovermon”, is a Q-SYS Designer Software tool-tip assistant that allows a system designer or AV technician to troubleshoot audio system issues by visualizing and listening to the audio content at any point within the DSP design running on the Core. It provides a bar graph real-time analyzer (RTA) used to visualize the presence of audio and see the frequency spectrum of that audio. It also provides an optional feature for listening to the audio content via a user’s PC sound card and loudspeakers.
Currently, Hovermon audio content from Core processor to a user’s PC is unencrypted and is transported over UDP using an ephemeral port. In a future software update, this audio stream will be encrypted.
Using the Network Services manager in Core Manager, it is possible to disable Hovermon Audio, meaning that the bar graph RTA will still be shown, but the audio stream from Core to user’s PC is disabled.
Q-SYS Reflect allows authorized AV support personnel to access the Q-SYS Core to use Hovermon remotely. Currently, only the bar graph display is supported when using Q-SYS Reflect for remote Core access. In a future software update, Hovermon Audio monitor will be added for Q-SYS Reflect-connected Cores. If this is not desired, the user can disable Hovermon Audio in the Network Services manager.
- To learn how to disable network services on the Q-SYS Core, see the Core Manager > Network > Services topic.
- To see a list of network services and protocols used by the Q-SYS Core processor, see the Network Interfaces, Services, & Protocols topic.
Details
Q-SYS Designer Software | ||||
---|---|---|---|---|
Management and File Sync |
Real-time Control |
HoverMon Audio |
Discovery |
|
Protocol |
HTTPS |
TLS |
RTP |
QDP |
Transport |
TCP |
TCP |
UDP |
UDP |
Multicast Address |
N/A |
N/A |
N/A |
224.0.23.175 |
Port |
443 |
1704 |
Ephemeral port |
2467-2470 and unicast on port 6504 |
Encryption |
TLS_AES_128_GCM_SHA256 |
TLS_AES_128_GCM_SHA256 |
None |
None |

Administrator is a standalone Windows application used for configuration of some Q-SYS features, primarily the Paging System and Scheduled Events. This can be a convenient way for end users to adjust the playback time of certain Paging Messages or other actions.
Q-SYS Administrator uses unencrypted QDP to discover Q-SYS Core processors on the network and then HTTPS for all further communications with the Core.
Details
Q-SYS Administrator | ||
---|---|---|
|
Negotiation and File Sync |
Discovery |
Transport Protocol |
HTTPS |
QDP |
Transport |
TCP |
UDP |
Multicast Address |
N/A |
224.0.23.175 |
Port |
443 |
2467-2470 and unicast on port 6504 |
Encryption |
TLS_AES_128_GCM_SHA256 |
None |

This standalone UCI Viewer application can be installed on a Windows PC and enables the user to interact with any selected UCI.
Windows UCI Viewer uses unencrypted QDP to discover Q-SYS Cores on the network and then encrypted communications for all configuration, file sync and real-time control.
For more information about the UCI Viewer application, see the UCI Viewer App (Windows) topic.
Details
Windows UCI Viewer | |||
---|---|---|---|
Negotiation and File Sync |
Real-time Control |
Discovery |
|
Protocol |
HTTPS |
TLS |
QDP |
Transport |
TCP |
TCP |
UDP |
Multicast Address |
N/A |
N/A |
224.0.23.175 |
Port |
443 |
1704 |
2467-2470 and unicast on port 6504 |
Encryption |
TLS_AES_128_GCM_SHA256 |
TLS_AES_128_GCM_SHA256 |
None |

This standalone application, developed specifically for any Windows-based Microsoft Teams Room compute, enables a Q-SYS UCI to be shown on the Microsoft Teams Rooms controller. Q-SYS Control for Microsoft Teams Rooms uses HTTPS and TLS for all communications with the Core.
For more information, see the Microsoft Teams Room (MTR) topic.
Details
Q-SYS Control for Microsoft Teams Rooms | |||
---|---|---|---|
Negotiation and File Sync |
Real-time Control |
Discovery |
|
Protocol |
HTTPS |
TLS |
TLS |
Transport |
TCP |
TCP |
TCP |
Port |
443 |
1704 |
2112 |
Encryption |
TLS_AES_128_GCM_SHA256 |
TLS_AES_128_GCM_SHA256 |
TLS_AES_128_GCM_SHA256 |

The Q-SYS Control app for iOS, available on Apple’s App Store, enables the user to interact with a selected UCI using an iOS device. All communications between the Q-SYS Control app and the Core processor are encrypted.
Tip: For backwards compatibility, the Q-SYS Control app can be configured to use legacy, unencrypted communications with Cores running older firmware where encrypted communications were not available.
To ensure that the Q-SYS Control app is using encrypted communications:
- Open the iOS Settings and scroll down to Q-SYS Control.
- Ensure that the 'Allow Insecure Networking' option is disabled.
To learn more about the app, including its settings, see the Q-SYS Control App (iOS).
Details
Q-SYS Control (iOS App) | ||||
---|---|---|---|---|
|
Encrypted (default) |
“Allow Insecure Networking” option enabled |
Real-time Control |
Discovery |
Protocol |
HTTPS |
HTTP |
TLS |
QDP |
Transport |
TLS |
TCP |
TCP |
UDP |
Multicast Address |
N/A |
N/A |
N/A |
224.0.23.175 |
Port |
443 / 1704 |
80 / 1700 |
1704 |
2467-2470 and unicast on port 6504 |
Encryption |
TLS_AES_128_GCM_SHA256 |
None |
TLS_AES_128_GCM_SHA256 |
None |

QSC offers a number of optional, cloud-based services for a variety of applications and use cases. In all cases, customer privacy and data security are paramount and QSC collaborates with external cybersecurity professionals to ensure the robustness of the solution.

As a highly flexible and configurable AV system that offers remote management and cloud-based license activation, the use of Q-SYS Reflect or the QSC Licensing Server dictates that some information about the system and its devices must be transmitted and stored in the cloud. The data transmitted to and stored in the Cloud is discussed in the following sections.
To leverage Q-SYS Reflect, users must have a QSC ID. No user credentials are required to access the QSC Licensing Server. During the QSC ID sign-up procedure, some information about the user is required to set up the user profile. This information is limited in scope and typically consists of name, contact details, location, contact preferences and, in the case of an Organization Owner who may be purchasing subscriptions, billing information. After account creation, the user signs in with an email address and password.
During normal operation of Q-SYS Reflect, the only PII that is captured is part of Audit Log Events as described in the What data is stored in the Q-SYS Reflect cloud? section. No other PII is automatically captured by the system.
Note: QSC has no purview over the content that is transmitted through the Q-SYS AV system. It is possible for system designers to create scripts, plugins, or other custom programming that may capture and transmit PII between Q-SYS devices or store that information in logs. Since these would be custom configurations created by the system designer, they are outside of the scope of this document.

Q-SYS Reflect is a modern web technology platform that can host numerous Q-SYS software services. This platform manages secure communications with Q-SYS Core processors and allows for Organization-level license management and API access control. Q-SYS Reflect is hosted on Google Cloud Platform (GCP) and leverages a number of Google technologies for storage, encryption, key management, and more.
Q-SYS Reflect is a remote management and monitoring service for Q-SYS-based AV systems, including third-party devices.
Communication
The Q-SYS Reflect user interface is browser-based using HTML5. All modern web browsers are therefore supported. QSC has followed IT industry best practices and implemented encrypted communications using TLS 1.3 over HTTPS and WSS between the user's web browser and the Q-SYS Reflect cloud infrastructure.
To improve the performance of real-time control on a Core processor when using a web browser, the Core and the user’s PC will route some real-time control data via a dedicated relay service. Control traffic via the relay service is always transported via Secure Web Sockets (WSS).
Registration
The Q-SYS Core-to-Reflect registration process is manually initiated and requires local access to the Core with an Administrator login. During the registration process, an outbound connection to the Q-SYS Reflect servers is initiated. Once the registration process is complete, a persistent web socket connection between Core and Q-SYS Reflect cloud is maintained.
Remote UCI Access
Q-SYS Reflect also allows authorized users to view and interact with all controls found on UCIs running on Cores to which they have access. This enables AV support technicians to provide operational support to clients without the need to be on-site – for example, to interact with room controls. If more granular access is required, then the system designer should consider leveraging the UCI PIN tool to further restrict and manage access to UCIs. Refer to the Core Manager > User Control Interfaces topic to learn how.
Details
For the purposes of firewall whitelisting rules, both of these servers should be permitted for outbound traffic from the Q-SYS Core processor.
Q-SYS Reflect | Q-SYS Reflect Relay Service | |
---|---|---|
Protocol |
HTTPS and WSS |
WSS |
Transport |
TCP |
TCP |
Port |
443 |
443 |
Encryption |
TLS_AES_128_GCM_SHA256 |
TLS_AES_128_GCM_SHA256 |
Server URL |
https://reflect.qsc.com |
https://relay-us.reflect.qsc.com |
Server IP |
35.238.114.149 |
35.222.164.145 |
Data collection
If the Q-SYS system implementation leverages Q-SYS Reflect, then some data transport and collection from Core to cloud is necessary. The type and amount of data collected is restricted to the minimum necessary for the successful delivery of the service.
As a remote management and monitoring solution for AV systems, the data content focuses on device health and system configuration settings.
Tip: While some data is transmitted and stored in the Q-SYS Reflect cloud, most data exchanges between the Core and Reflect are transmitted but not stored.
What data is stored in the Q-SYS Reflect cloud?
- Core event logs
- System inventory – device type, manufacturer, model, name, serial number, etc.
- System details – system name, design name, Core name, firmware version, etc.
- Core firmware packages
- Audit log of changes made by users – the Core Manager username or Q-SYS Reflect user account and email address are stored with each audit event.
What provisions are in place to protect customer interests?
For any data that is collected and stored in the Q-SYS Reflect database:
- All data is encrypted while at rest in the Q-SYS Reflect cloud and while in transit.
- Personnel access to the data storage is strictly controlled.
- Symmetric encryption keys for the data storage are rotated regularly.
- Encryption keys are kept in a secure, encrypted enclave.
- Data is backed up in geographically disparate data centers.
- Debug logs are scrubbed of identifying information prior to developer access.
What data is transmitted but not stored in Reflect?
- Device status – OK, Fault, Compromised, etc.
- System configuration settings – network, time/date, network services, SNMP settings, etc.
- Audio files and playlists – management and preview
- Device maintenance logs (syslog)
- Telephony and video system settings
- User Control Interfaces (UCIs) and their control values
- The Q-SYS Designer Software (QDS) design file
Q-SYS Reflect Third-Party API
Q-SYS Reflect provides a JSON-based API that can be used by third-party software solutions to extract scope-limited data from the Q-SYS Reflect database. Access to the API is governed by tokens that are generated at the Organization level by an Organization Owner. Encrypted HTTPS GET requests are then used to pull information related to system health and events. Audit events, which include username information per event, are included in the Core event logs that are accessible via the Q-SYS Reflect Third-Party API.

If the user wishes to activate a Q-SYS perpetual feature license on the Q-SYS Core processor using the Online Activation Method, then the Q-SYS Core must be able to reach the QSC Licensing server. (To learn about license activation methods, see the Core Manager > Licensing topic.)
License activation is a user-initiated process and can be performed locally using Core Manager or remotely using Q-SYS Reflect. When the license activation process is initiated, the Core makes an outbound connection to the QSC Licensing server, which then responds with an activation code that is installed on the Core.
Details
For the purposes of firewall whitelisting rules, the server shown below should be permitted for outbound traffic from the Core.
QSC Licensing Server | |
---|---|
Transport |
HTTPS |
Port |
443 |
Encryption |
TLS_AES_128_GCM_SHA256 |
Server URL |
https://qscllc.prod.sentinelcloud.com/ |

In addition to support for native Q-SYS hardware devices and software applications, Q-SYS can integrate with third-party hardware and software systems using commonly understood software services or protocols.

The Q-SYS Core processor offers built-in SIP technology to facilitate VoIP call capability. The Core can present itself as a generic SIP endpoint or trunk to a standard SIP server. For compatibility with the huge variety of IP-PBX systems installed in the market, Q-SYS Cores offer a wide range of encrypted and unencrypted options for SIP telephony:
- When TLS is enabled, the Q-SYS Core uses a self-signed certificate to encrypt the SIP signaling between the Q-SYS Core and the IP-PBX. It is not currently possible to install a custom Device Certificate on the Core for SIP telephony, although this is planned for a future software update.
- When SRTP is enabled, the Q-SYS Core uses the mechanism in RFC 3711 to secure the audio traffic between the Q-SYS Core and the IP-PBX.
- Although TLS and SRTP can be enabled and disabled independently of each other, to ensure maximum security, it is a good practice to enable both. Note that the SIP Ports (default 5060 and 5061) can be customized if desired.
If secure telephony is required and supported by the SIP server, then all Q-SYS Softphones should be configured as follows in Core Manager > Softphones. To learn more about these settings, see the Core Manager > Telephony > Softphones topic.
- Disable the Insecure Ciphers option in Shared Settings.
- Enable SRTP in Shared Settings.
- Select TLS for each Softphone's Transport property.
Details
Q-SYS Softphone (unencrypted) | Q-SYS Softphone (encrypted) | |
---|---|---|
Protocol |
RTP |
SRTP |
Transport |
TCP/UDP |
TLS |
Port |
5060 |
5061 |
Encryption |
None |
TLS_AES_128_GCM_SHA256 |

It is possible to control a Q-SYS system using a hardware or software product from a third-party vendor. The level of capability and sophistication of these systems varies widely. As a result, the Q-SYS Core processor offers both encrypted and unencrypted methods for external control. Common applications for external control integration include:
- Changing sources on a video display using a third-party touch panel.
- Adjusting the volume of the sound system using a third-party physical control.
- Requesting health status information from the Core for use by another system.
Note: Owing to the flexible and configurable nature of Q-SYS, other control and data exchanges are possible. Through custom programming, it could be possible for the system designer to create scripts, plugins, or other methods that may capture and transmit PII between Q-SYS and third-party systems. Since these would be custom configurations created by the system designer, they are outside of the scope of this content.
Refer to the Management APIs, External Control Protocol (ECP), and Q-SYS Remote Control Protocol (QRC) topics for more information.
Details
Media Management API | Q-SYS External Control Protocol | Q-SYS Remote Control Protocol | |
---|---|---|---|
Protocol |
HTTPS |
Unicode |
Unicode |
Transport |
TCP |
TCP |
TCP |
Port |
443 |
1702 |
1710 |
Encryption |
TLS_AES_128_GCM_SHA256 |
None |
None |

The Q-SYS Core processor hosts an SNMP server that can be enabled if the system design requires monitoring the Core and its peripherals using an external SNMP client. Q-SYS Core Manager allows the user to define access control parameters for the SNMP server, as well as define which SNMP version is enabled on the server.
SNMPv3 is considered the most secure and is recommended where possible. SNMPv2c is available but may not be allowed based on the network security policies of the client network.
Tip: The SNMP server is disabled by default on new designs.
To learn more, see the Core Manager > Network > SNMP topic.
Details
SNMP Server | |
---|---|
Transport |
UDP |
Port |
161 |
Encryption |
None |