Couple of issues with On-Prem v14.3 service, can anyone help?

Solved
PP
Paul Piper
Jade Solutions Ltd

Hi,

Have an On-prem v14.3 instance that I am using for internal testing, all components (DS/DSE, MS, SQL) are all sat on the same Windows 2008 r2 server.  Server sits behind a UTM firewall.

Access from outside world to DS for devices is provided by inbound NAT via the firewall, from one of our available public IP addresses.

Everything generally speaking works fine but I have found a couple of issues which I am really struggling to get a definitive answer on: -

* I can enrol the server for Managed Google Play, this all completes fine.  However when I enrol a device (typically as DO) to leverage use of the configured Managed Google Play services, I get the Configuring Google Work Account message in the Pending Actions but it never completes.  Looking at the device logs there is an associated Managed Google Play error message showing "EMPTY_TOKEN".  The device is therefore not receiving the AfW generic credentials back (I believe from the server but may be wrong...the devices have open access to the internet so should be able to directly communicate with GMS no problem).

* Similarly when not using Managed Google Play, but attempting to leverage app deployment rules to deploy Google Play apps none of this works.  The Apps never publish to the App catalogue on the device and cant be downloaded.  When set as mandatory they equally never find their way onto the device.

* Finally when looking at the Configuration Profiles screen within the device agent, this fails to communicate with the server and does not populate any of the information; simply throwing the error "failed to retrieve list of profiles".

Have also had access to a cloud version and the above typically worked just fine and experienced no such issues.

The firewalling is allowing the devices to communicate with the server inbound on 5494 & 5495, outbound the server is allowed to the internet on any port.  I have the feeling that Google services and the device agent themselves are experiencing problems talking back to the server.  Does 443 need to be allowed inbound also to allow this all to work?

Appreciate any help or thoughts anyone can offer.

6 years ago
Android
ANSWERS
PP
Paul Piper
6 years ago

All fixed.

For anyone experiencing the same I suggest you check the following: -

* Your DMA (Device Management Address) FQDN is set to use the correct FQDN your devices will use for connecting to MC within the MCAdmin utility on the server.  If your device connection FQDN is different to that set in the MC config (i.e you have different FQDN's for internal and external access as we do) it wont work.

* Port 443 is allowed inbound to the MC server from devices (the device agent) as well as 5494

* If your DMA FQDN needs to be changed, once done ensure you generate a new "Deployment Server Extensions & Web Console" certificate within the MCAdmin utility on the server and apply it, otherwise you will experience a certificate warning on the devices when the Device Agent tries to connect to the server (as the FQDN it is connecting on will not match that published on the server).  That said if your FQDN is the same for internal and external connectivity you wont have to worry (in my case they are different).

* To ensure no outbound connectivity issues, unless your security policy dictates otherwise suggest you allow the MC server itself unfettered outbound access to the internet.  Its more simple than locking it down then having to punch the relevant holes.

Our problems were three fold: -

* Our firewall was not allowing 443 connectivity from the device agent to the MC server.  Even when we put the correct rule in, it did not work but we found that another 443 blocking rule we had added for another purpose was being matched.  Moving the new allow 443 rule above this matching block rule fixed that issue.

* Our DMA address had to be changed.  It was set to the internal FQDN of the MC server, our devices use a different (external DNS) FQDN to connnect to MC.  Changing this to the correct external FQDN fixed the issue.

* Upon changing the DMA address, we had to generate the new DSE & Web Extensions certificate as mentioned above.

As soon as the above steps were completed almost immediately I was able to see profile information in the device agent, application catalogue functionality started working properly and the Google account configured on the device.

Hope this ends up helping someone.


Cheers

Paul

Solution
MD
Matt Dermody Diamond Contributor
6 years ago

I'm fairly certain you need 443 as well. 

PP
Paul Piper
6 years ago

Thanks Matt, I'll take a look at the firewalling and make sure its allowing 443 inbound from the internet to the server also

PP
Paul Piper
6 years ago

Hi Matt,

So Outbound the server is able to access anything on the internet on any port.

Inbound the firewall allows 5494 and 5495 from the internet to the server for device connectivity.

I'm certain some required connectivity is being blocked somewhere but unsure where exactly.  Finding this all a bit of a puzzle and the SOTI network port listings in the help file do not really provide any answers.

Appreciate your help.

Paul

SS
Support Staff Account
6 years ago (edited 6 years ago)
PP
Paul Piper
6 years ago

Thanks for this.  So do I take it that I need to allow Google inbound access on 443 to the MobiControl server.

The devices themselves are just internet connected (not Private APN) so they have free and unfettered access to Google services.

Paul

Hi Paul, 

Yes this would be required so that the DS/MS can communicate with Google for configuration details. 

Hope this helps,

MD
Matt Dermody Diamond Contributor
6 years ago

Is there any formal SOTI documentation on what access you need between the devices, the MobiControl server, and the Play Store for an Android Enterprise deployment?

PP
Paul Piper
6 years ago

Hi Matt,

I have to say I think the port requirement instructions could be clearer.  The port list I think should really advise for each port between which components and whether the requirement is inbound/outbound etc.  Would make life easier.

Paul

PP
Paul Piper
6 years ago

Have a possible resolution to this, still to be proven however.

I found having thumbed through the documentation some more that my DMA (Device Management Address) was set to the servers internal FQDN and this should be set to the external (or whatever the FQDN the devices are typically using for management purposes).  I have now changed this to the external FQDN. I now just need to allow port 443 from the internet to the server and hoping everything should then work as expected.

The DMA tends to default to the servers base FQDN (normally internal)......I guess if you were using a DNS alias that was both internally and externally addressable it would never be an issue.

I am a remote worker so having to use the internet for my testing, suspect had I had a device connected to my corporate WiFi (and as such the DMA FQDN would have been valid, and 443 likely accessible from the local LAN) all this likely would have worked.

Once the firewall changes have been made, I will test and report back.