Internal corporate network rules

The following table outlines the firewall rules required for internal corporate network access for:

  • MobileIron Core Appliance (physical or virtual) - All ports (except UDP) should be bi-directional to allow information / data exchange between systems.

  • Sentry Appliance (physical or virtual, ActiveSync / AppTunnel) - the Sentry must be able to resolve the Core hostname (via DNS lookup) or a hostfile entry must be added.

MobileIron Core Appliance and the Sentry Appliance items communicate with each other.

Table 1. Internal corporate network rules

Requirement

Description

Port

Traffic from Internal Corporate Network to MobileIron Core

MobileIron Core is in the DMZ

MobileIron administrator access (System Manager)

Open HTTPS 8443 from the corporate network to the MobileIron Core appliance

HTTPS 8443

MobileIron administrator access Open HTTPS 443 and SSH 22 from the corporate network to the MobileIron Core appliance HTTPS 443, SSH 22

MobileIron Enterprise Connector (Optional LDAP Proxy)

Open HTTPS 443 from Enterprise Connector to MobileIron Core HTTPS 443
MobileIron Reporting Database (Optional) Ensure that HTTPS 7443 from the MobileIron Reporting Database to MobileIron Core is open. It is open by default. HTTPS 7443
Self-service user portal Open HTTPS 443 from the corporate network to the MobileIron Core appliance HTTPS 443

Traffic from MobileIron Core to Internal Corporate Network

MobileIron Core is in the DMZ

LDAP / Active Directory LDAP User Lookup and Authentication TCP 636 (secure) -or- TCP 389
SMTP Relay for SMS and Email Notifications Open TCP 25 (if not in DMZ) and define the SMTP relay server TCP 25
DNS Lookup Open

Open UDP 53 (if not in DMZ) and define DNS server(s)

NOTE: TCP is needed in case of large DNS Queries
UDP 53
NTP Time Synchronization Service Open UDP 123 (if not in DMZ) and define NTP server(s) UDP 123
Certificate / SCEP Server SCEP Proxy Configuration HTTP 443
MobileIron Core access to MobileIron Sentry Open HTTPS 9090 (primary access) and HTTPS 443 (view of Sentry certificate) to the MobileIron Sentry appliance HTTPS 9090 and HTTPS 443
MobileIron Sentry access to MobileIron Core Open HTTPS 8443 to the MobileIron Core appliance (HTTPS 8443 is the default, but HTTPS 443 is also supported.) HTTPS 8443

Traffic from Internal Corporate Network to MobileIron Standalone Sentry

Standalone Sentry is in the DMZ

MobileIron administrator access Open HTTPS 8443 from the corporate network to Sentry (System Manager access) HTTPS 8443
MobileIron administrator access Open SSH 22 from the corporate network to Sentry SSH 22

Traffic from MobileIron Standalone Sentry to Internal Corporate Network

Standalone Sentry is in the DMZ

CIFS-based Content Server Open TCP 445 if using Docs@Work with CIFS-based content servers TCP 445
Certificate / SCEP Server SCEP Server/CA Access (for CRL verification only) HTTP 80 or HTTPS 443
App Server for AppTunnel Open HTTP 80 or HTTPS 443 to the app/content server if configuring this Sentry for AppTunnel HTTP 80 or HTTPS 443 (typically)
Exchange ActiveSync Open HTTP 80 or HTTPS 443 to the ActiveSync server if configuring this Sentry for email service HTTP 80 or HTTPS 443
DNS Lookup Open UDP 53 (if not in DMZ) and define DNS server(s) UDP 53
NTP Time Synchronization Open UDP 123 (if not in DMZ) and define NTP server(s) UDP 123
LDAP / Active Directory Open TCP/UDP 389 Kerberos LDAP ping (optional for Kerberos-constrained delegation) TCP/UDP 389
SMTP Relay for Sentry Console Email Notifications Open TCP 25 (if not in DMZ) and define SMTP relay server TCP 25
Kerberos Server Open TCP 88 (for Kerberos-constrained delegation) TCP 88