When managing employees devices in enterprise, privacy and security are main topics for the IT department due to multiple reasons. There are many strategies to keep both users and corporate data safe, and one of them is using proxies and firewalls to block malicious websites.
However, it’s critical that the IT administrators evaluate the proxies and firewalls that will be enabled carefully, since if the MDM servers and the devices are separated behind a firewall, they are unable to effectively communicate.
If you are struggling with many pending commands in your MDM solution, it’s highly possible that some of the required TCP ports are blocked by your firewall.
Thus, it’s so important to make sure the network configurations are properly set up to allow the communication between your Apple devices and the mobile device management solution.
Check all the required TCP Ports and APNs Server:
|Service Name||External Port (begin)||External Port (end)||Description|
|Web Service (http)||80||80||For accessing Hypertext Transfer Protocol (HTTP)|
|Web Service (https)||443||443||For a fallback on Wi-Fi only, when devices can't reach APN's on port 5223|
|Push||2195||2196||For sending notifications and having feedback of APNs|
|APNs||5223||5223||For communicating with Apple Push Notification Services (APNs)|
|Internet Control||3190||3190||For controlling the access to internet through Mosyle Business Study Sites and Web Filter|
You can check all the information about any other Apple ports on Apple Support: