Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Overview

A fully operational MDM setup requires a set of CapaInstaller services that are deployed correctly in the company network infrastructure. Consult the illustration and tables below when setting up your network for CapaInstaller MDM.

Table of Contents
minLevel2

Services


Service

Port Number

Data Type

Direction

Destination DNS URL

if

- Outgoing

Description

cimdm

443 (SSL)

TCP

PUBLIC -> DMZ

api.capaone.com

mobile devices get configurations and

application

applications

cimdm

443 (SSL)

TCP

DMZcibackend5023 (CapaInstaller MDM default)TCPDMZ → LANcimdm get profiles and configurationscifrontend5022 (CapaInstaller Public Frontend Default)TCPDMZ → LANcimdm used to authenticate users when enrolling phones

Devices

Services

Service

Port Number                       

Data Type

Direction

Origin DNS URL if Incoming

Destination DNS URL if Outgoing

Reference

cimdm

443 (SSL)

TCP

Public -> DMZ

CapaInstaller DMZ server

2 B

cimdm

8443 (SSL) OMA DM Protocol

TCP

Public -> DMZ

CapaInstaller DMZ server

2 BSelfService9443 (CapaInstaller SelfService Portal)TCPPublic -> DMZCapaInstaller DMZ server2 B

DMZ → PUBLIC

api.capaone.com

Gateway for:

Apple Push Network Service (APNS):

http://support.apple.com/kb/TS4264 

Google Cloud Messaging:

http://en.wikipedia.org/wiki/Google_Cloud_Messaging

Microsoft Open Mobile Alliance (OMA):

https://en.wikipedia.org/wiki/OMA_Device_Management

Self Selfvice Portal9443(SSL)TCPPUBLIC -> DMZ
Used to access the Self-Service portal from the devices

cibackend

5023 (CapaInstaller MDM default)

TCP

DMZ

-> LAN

CapaInstaller Backend server

2 Ecifrontend5021 (CapaInstaller

→ SERVER 


cimdm get profiles and configurations

cifrontend

5022 (CapaInstaller Public Frontend Default)

TCP

DMZ

-> LANCapaInstaller Frontend server2 E

CapaSystems server

7000 (CapaSystems server)

TCP

LAN -> Public

certservice.capainstaller.com

5 D

CapaInstaller frontend service

80 (HTTP)

TCP

LAN -> Public

→ SERVER 


cimdm authenticates users when enrolling devices

cifrontend80TCPSERVER → PUBLICdownload.capainstaller.com
4 Dciscep443 (HTTPS)TCPLAN -> Publichttps://scep.capaone.com

All devices

443 (SSL)

TCP

LAN -> Public

*

G

Service                        

Port Number                   

Data Type

Direction

Origin DNS URL if Incoming

Destination DNS URL if Outgoing

Reference

cimdm

2195 (Apple server)

TCP

DMZ -> Public

gateway.push.apple.com

2 F

cimdm

2196 (Apple server)

TCP

DMZ -> Public

feedback.push.apple.com

2 F

Service                           

Port Number

Data Type

Direction

Origin DNS URL if Incoming

Destination DNS URL if Outgoing

Reference

cimdm

5228 (Google server)

TCP

DMZ -> Public

android.apis.google.com

gcm-http.googleapis.com

fcm.googleapis.com

2 F

cimdm

5229 (Google server)

TCP

DMZ -> Public

android.apis.google.com

gcm-http.googleapis.com

fcm.googleapis.com

2 F

cimdm

5230 (Google server)

TCP

DMZ -> Public

android.apis.google.com

gcm-http.googleapis.com

fcm.googleapis.com

2 Fcimdm443 (Google server)TCPDMZ -> Public

android.apis.google.com

gcm-http.googleapis.com

fcm.googleapis.com

play.google.com

2 F

Services              

Port Number

Data Type

Direction

Origin DNS URL if Incoming

Destination DNS URL if Outgoing

Reference

cimdm

443 (Microsoft server)

TCP

DMZ -> Public

2 F

cimdm

7000 (Capasystems server)

TCP

DMZ -> Public

5 2 C

Devices

retrieve updated information about device models and versions

Devices

Communication from end user devices to services to support mobile device management

Devices                           

Port Number

Data Type

Direction

Origin DNS URL if Incoming

Destination DNS URL if Outgoing

Reference

Description

All devices

443 (SSL)

TCP

LAN -> Public

*

G
Used for secure communication between iOS devices and the MDM server.
All devices8443TCPLAN -> Public
*G


Devices                           

Port Number

Data Type

Direction

Origin DNS URL if Incoming

Destination DNS URL if Outgoing

Reference

Description

Android devices

5228 (Google server)

TCP

LAN -> Public

android.apis.google.com

gcm-http.googleapis.com

fcm.googleapis.com

GThis port is used for communication between Android devices and Google Cloud Messaging (GCM), which is used for sending push notifications and other data to Android devices.

Android devices

5229 (Google server)

TCP

LAN -> Public

android.apis.google.com

gcm-http.googleapis.com

fcm.googleapis.com

GThis port is used for communication between Android devices and GCM over a secure connection.

Android devices

5230 (Google server)

TCP

LAN -> Public

android.apis.google.com

gcm-http.googleapis.com

fcm.googleapis.com

GThis port is used for communication between Android devices and GCM for sending and receiving multicast messages.
Android devices443 (Google server)TCPLAN -> Public

android.apis.google.com

gcm-http.googleapis.com

fcm.googleapis.com

play.google.com

G

Devices                            

Port Number              

Data Type

Direction

Origin DNS URL if Incoming

Destination DNS URL if Outgoing

Reference
This port is used for secure communication between Android devices and the MDM server.
Apple devices2195 (Apple server)TCPLAN -> Publicgateway.push.apple.com
G
Used for sending push notifications to iOS devices.
Apple devices2196 (Apple server)TCPLAN -> Publicfeedback.push.apple.com
G
Used by the APNs Feedback Service to send feedback to the MDM server about failed push notifications.
Apple devices5223 (Apple server)TCPLAN -> Public
G

Devices

Port Number

Data Type

Direction

Origin DNS URL if Incoming

Destination DNS URL if Outgoing

ReferenceWindows Phone devices

Used for communication between iOS devices and the APNs. It is also used for device activation.
Windows Phone device443 (Microsoft server)TCPLAN -> Public
G

https://capawiki.capasystems.com/display/CI64DOC/MDM+Network+Ports

Services and Clients

Description of the components from the illustration and reference tables

Services

Expand

SCEP Service

Simple Certificate Enrollment Protocol http://en.wikipedia.org/wiki/Simple_Certificate_Enrollment_Protocol

The administrator must allow access through the firewall from the DMZ to the CapaInstaller Backend Service. The URL can be found from the Backend service configuration (http://ciserver.example.com:xx/cibackend). During enrollment the device will communicate with the SCEP service, so it needs to be accessible at the configured port (eg. port =1640).

MDM Service (Mobile Device Management)

The administrator must allow access through the firewall from the DMZ to the CapaInstaller Backend Service. The URL can be found from the Backend service configuration (http://ciserver.example.com:xx/cibackend).

The MDM service uses the DMZ Front-end Service. The Url can be found from the Frontend service configuration (http://mdm.example.com:xx/cifrontend).

The MDM service depends on two certificates (Apple certificate and SSL certificate) that are stored in the server's local certificate store (not the user store).

The MDM service hosts an enrollment homepage at URL: https://mdm.example.com/cimdm.

The MDM service communicates with the Apple Push Network Service (APNS). http://support.apple.com/kb/TS4264

The MDM service communicates with Google Cloud Messaging. http://en.wikipedia.org/wiki/Google_Cloud_Messaging

 

DMZ Frontend Service

The administrator must allow access through the firewall from the DMZ to the CapaInstaller internal Front-end Service. The URL can be found from the Frontend service configuration (http://ciserver.example.com:xx/cifrontend).

Back-end service

The Backend service communicates with the Active Directory, so it needs access to this, especially if AD lookup is required. The Backend service communicates with the CapaInstaller database.

Clients

Expand

Mobile Devices on public network

The mobile devices communicate with the MDM service through the main URL: https://mdm.example.com/cimdm

The mobile devices communicate with the SCEP service through the main URL: http://mdm.example.com:5024/

The mobile devices communicate with the Apple Push Network Service (APNS). http://support.apple.com/kb/TS4264

The mobile devices communicate with Google Cloud Messaging. http://en.wikipedia.org/wiki/Google_Cloud_Messaging

The mobile devices communicate with the MDM service through the OMA URL: http://mdm.example.com:8443/ [Open Mobile Alliance (OMA) Device Management (DM) server (https://en.wikipedia.org/wiki/OMA_Device_Management)]

Computers on public network

The computers communicate with the DMZ Front-end service http://mdm.example.com:xx/cifrontend

 

LAN Mobile Devices

The devices will communicate just like the Mobile Devices on Public networks (see above).

LAN Computers

The computers communicate with the Internal Front-end service http://ciserver.example.com:xx/cifrontend

Unless the internal WiFi allows connection to the Internal Front-end service, computers that use WiFi may connect to the DMZ Front-end through the Public network

Third party services

Expand

Apple Push Network Service

(APNS). http://support.apple.com/kb/TS4264

 

Google Cloud Messaging.

 http://en.wikipedia.org/wiki/Google_Cloud_Messaging

 

Microsoft Open Mobile Alliance (OMA) Device Management (DM) server https://en.wikipedia.org/wiki/OMA_Device_Management