AirWatch PoC Technical Architecture
AirWatch PoC Technical Architecture
AirWatch PoC Technical Architecture
Table of Contents
Overview.....................................................................................................................................2
Option 1: Pure Cloud...................................................................................................................4
Option 2: Integrated Cloud .........................................................................................................6
Integrated Cloud AirWatch Cloud Connector ......................................................................................................................... 8
Integrated Cloud No DMZ ..................................................................................................................................................... 11
Integrated Cloud DMZ Relay ................................................................................................................................................. 14
Integrated Cloud Reverse Proxy ........................................................................................................................................... 17
Overview
The AirWatch Enterprise Mobility Management (EMM) software can be deployed through a variety of cloud or onpremise options to meet an organizations security requirements and IT strategy. This document will outline each of the
supported configurations and help determine the ideal AirWatch architecture for a successful PoC evaluation.
The below diagram displays four deployment options including both cloud and on-premise architectures.
Cloud
On Premise
Benefits
Fastest implementation with minimal client effort
No significant investment in technology or services
Minimal or no network changes required
Automatic software updates
Benefits
Comply with corporate on-premise security polices
Direct integration with corporate systems
Leverage existing infrastructure investments
Physical and virtual environments supported
Considerations
Integration with corporate resources
Security / datacenter requirements
Considerations
Network firewall changes required
Multiple software and hardware required on-premise
Option 1: Cloud
Ideal for
Ideal for
Rapid Deployment
No corporate infrastructure
required
Pages 4-5
Ideal for
Page 8-19
Leveraging existing
infrastructure
On-premise is required
Enterprise integration
Page 20-22
Page 23-25
The remainder of this document defines the requirements for the architecture options described above. After choosing
a deployment option from the descriptions above, review the following items for the desired deployment choice:
1. Architecture Diagram high level design of all level data flow.
2. Prerequisite Checklist complete list of all software and hardware
preparations required.
Architecture
Diagram
Prerequisite
Checklist
Network
Requirements
Architecture Diagram
SAML
Office 365
Google Apps for Business
Prerequisite Checklist
There are no prerequisites necessary for this deployment option.
Network Requirements
Pure Cloud
Source
Component
Source
Host
{ADMIN_IP}
Destination
Component
Destination Host
Destination IP
any
*for a list of IP
ranges of AW
Datacenters click
Protocol
Port
Ref
Diagram
HTTP/HTTPS
80/443
AirWatch SaaS
*.airwatchportals.com
*.awmdm.com
Apple iTunes
Cloud
itunes.apple.com
ax.itunes.apple.com
*.mzstatic.com
*.phobos.apple.com
*phobos.apple.com.edges
uite.net
any
HTTP/HTTPS
80/443
N/S
play.google.com
any
HTTP/HTTPS
80/443
N/S
*.virtualearth.net
any
HTTP/HTTPS
80/443
N/S
17.0.0.0/8
TCP
5223
any
HTTP/HTTPS
80/443
any
TCP
5228
HTTP/HTTPS
80/443
Yes
No
N/A
Administrators
/ User Self
Service
Devices
{ADMIN_IP}
{ADMIN_IP}
{ADMIN_IP}
Google Play
Store
Virtual Earth
(GPS Maps)
Apple APNs
Cloud
{Device_IP}
{Device_IP}
Apple iTunes
Cloud
{Device_IP}
Android C2DM
Cloud
{Device_IP}
AirWatch SaaS
#-courier.push.apple.com
gateway.push.apple.com
phobos.apple.com
oscp.apple.com
ax.itunes.apple.com
mtalk.google.com
*.airwatchportals.com
*.awmdm
any
*for a list of IP
ranges of AW
Datacenters click
Checklist
here
here
MAG
Directory Services
Email Infrastructure
SIEM
Content Repositories
++
+ AirWatchs email attachment encryption feature requires the MAG (SEG component)
++ AirWatchs content repository sync with the Administrative Console requires the ACC.
Ideal for
Fast implementation
Ideal for
Clients without a DMZ
infrastructure
Ideal for
Ideal For
Pages 14-16
Page 17-19
Prerequisite Checklist
Integrated Cloud AW Cloud Connector
Hardware
Title
AirWatch Internal
Server
Windows OS
Firewall
Changes
Service
Accounts
Enterprise Service
Accounts
(Optional)
Software
Description / Purpose
Yes
No
N/A
Windows Server
Minimum specification:
- 1 CPU core ( > 2.0 GHz)
- 2 GB RAM
-1 GB Disk Space (if logging is being done 5 GB)
(physical or virtual)
Windows Server 2008 R2
A windows update is required for .NET 4 after installation to update additional
software components.
Client may need to generate internal certs for the traffic between the external
internet interface for the EAS traffic and the Reverse Proxy, F5, SEG, and CAS
servers. Details to be determined by the Client architect team.
See Below Firewall Change Requests
Checklist
Source
Network Requirements
Integrated Cloud AW Cloud Connector
Source
Component
A
Source Host
Destination
Component
Destination Host
Destination IP
Protocol
Port
Ref
Diagram
{InternalServer_IP}
Client EAS/CAS
Server(s)
{InternalURL_CAS}
{InternalIP_CAS}
HTTP/HTTPS
80,443
{InternalServer_IP}
Domain
Controller
{InternalURL_DC}
{InternalIP_DC}
LDAP/LDAPS
{InternalServer_IP}
Enterprise
Services
(Optional)
{InternalURL_ES}
{InternalIP_ES}
HTTP/HTTPS
/SMTP
{InternalServer_IP}
Certificate
Authority
(Optional)
{InternalURL_CA}
{InternalIP_CA}
DCOM
AirWatch
Internal Server
{InternalServer_IP}
AirWatch SaaS
*.airwatchportals.com
*.awmdm.com
any
*for a list of IP
ranges of AW
Datacenters click
389,
636,
3268,
3269
80,443
, 25,
465
135,
10255000,
4915265535
Yes
No
N/A
HTTPS
443
HTTP/HTTPS
80/443
{ADMIN_IP}
any
*for a list of IP
ranges of AW
Datacenters click
AirWatch SaaS
*.airwatchportals.com
*.awmdm.com
any
HTTP/HTTPS
80/443
N/S
here
{ADMIN_IP}
Apple iTunes
Cloud
*.itunes.apple.com
*.mzstatic.com
*.phobos.apple.com
*phobos.apple.com.edges
uite.net
{ADMIN_IP}
Google Play
Store
play.google.com
any
HTTP/HTTPS
80/443
N/S
{ADMIN_IP}
Virtual Earth
(GPS Maps)
*.virtualearth.net
any
HTTP/HTTPS
80/443
N/S
{Device_IP}
Apple APNs
Cloud
17.0.0.0/8
TCP
5223
{Device_IP}
Apple iTunes
Cloud
any
HTTP/HTTPS
80/443
{Device_IP}
Android C2DM
Cloud
any
TCP
5228
HTTP/HTTPS
80/443
Administrators
/ User Self
Service
Devices
{Device_IP}
AirWatch SaaS
#-courier.push.apple.com
gateway.push.apple.com
phobos.apple.com
oscp.apple.com
ax.itunes.apple.com
mtalk.google.com
*.airwatchportals.com
*.awmdm.com
any
*for a list of IP
ranges of AW
Datacenters click
Checklist
here
here
Prerequisite Checklist
Integrated Cloud No DMZ
#
Title
Description / Purpose
AirWatch Internal
Server
Windows OS
IIS 7 Server
Microsoft Messaging
Queue (MSMQ)
Java
External URL
10
Load
Balancer
11
Firewall
Changes
12
Service
Accounts
13
Enterprise Service
Accounts
(Optional)
Hardware
Software
DNS
Certificates
Yes
No
N/A
Windows Server
Minimum specification:
- 2 CPU core ( > 2.0 GHz)
- 4 GB RAM
(physical or virtual)
Windows Server 2008 R2
IIS Server must also have additional role services installed.
Checklist
Source
Public trusted SSL Certificate to match the External DNS for the AirWatch SEG/EIS
server.
Client may need to generate internal certs for the traffic between the external
internet interface for the EAS traffic and the Reverse Proxy, F5, SEG, and CAS
servers. Details to be determined by the Client architect team.
If installing the SEG/MAG behind a network load balancer, client will need to setup
load balancer configuration. Persistence should be set on the SSL session for 15
minutes. See Appendix for more details.
See Below Firewall Change Requests
If implementing enterprise services, services accounts will need to be created and
given specific permissions to allow integration. See Appendix.
Network Requirements
Integrated Cloud No DMZ
Source
Component
A
Source Host
Destination
Component
Destination Host
Destination IP
Protocol
Port
Ref
Diagram
{InternalServer_IP}
Client EAS/CAS
Server(s)
{InternalURL_CAS}
{InternalIP_CAS}
HTTP/HTTPS
80,443
{InternalServer_IP}
Domain
Controller
{InternalURL_DC}
{InternalIP_DC}
LDAP/LDAPS
{InternalServer_IP}
Enterprise
Services
(Optional)
{InternalURL_ES}
{InternalIP_ES}
HTTP/HTTPS
/SMTP
{InternalServer_IP}
Certificate
Authority
(Optional)
{InternalURL_CA}
{InternalIP_CA}
DCOM
AirWatch
Internal Server
{InternalServer_IP}
AirWatch SaaS
*.airwatchportals.com
*.awmdm.com
any
*for a list of IP
ranges of AW
Datacenters click
389,
636,
3268,
3269
80,443
, 25,
465
135,
10255000,
4915265535
Yes
No
N/A
HTTPS
443
HTTP/HTTPS
80/443
here
F
{ADMIN_IP}
any
*for a list of IP
ranges of AW
Datacenters click
AirWatch SaaS
*.airwatchportals.com
*.awmdm.com
any
HTTP/HTTPS
80/443
N/S
{ADMIN_IP}
Apple iTunes
Cloud
{ADMIN_IP}
Google Play
Store
play.google.com
any
HTTP/HTTPS
80/443
N/S
{ADMIN_IP}
Virtual Earth
(GPS Maps)
*.virtualearth.net
any
HTTP/HTTPS
80/443
N/S
AW Public URL
AW Public IP
HTTPS
443
17.0.0.0/8
TCP
5223
any
HTTP/HTTPS
80/443
any
TCP
5228
HTTP/HTTPS
80/443
10
HTTPS
443
2010
2020
11
Administrators
/ User Self
Service
AirWatch SaaS
See IP list
here
AirWatch
Server
Apple APNs
Cloud
#-courier.push.apple.com
gateway.push.apple.com
phobos.apple.com
oscp.apple.com
ax.itunes.apple.com
{Device_IP}
{Device_IP}
Apple iTunes
Cloud
{Device_IP}
Android C2DM
Cloud
mtalk.google.com
{Device_IP}
AirWatch SaaS
*.airwatchportals.com
*.awmdm.com
{Device_IP}
AirWatch
Internal Server
Devices
N
any
*for a list of IP
ranges of AW
Datacenters click
Checklist
here
*.itunes.apple.com
*.mzstatic.com
*.phobos.apple.com
*phobos.apple.com.edges
uite.net
here
O
AW Public URL
AW Public IP
Prerequisite Checklist
Integrated Cloud DMZ Relay
#
Title
Description / Purpose
AirWatch DMZ
Server
Windows OS
IIS 7 Server
Microsoft Messaging
Queue (MSMQ)
Java
AirWatch Software
External URL
10
Internal URL
11
12
Load
Balancer
13
Firewall
Changes
14
Service
Accounts
15
Enterprise Service
Accounts
(Optional)
Hardware
Software
DNS
Certificates
Yes
No
N/A
Windows Server
Minimum specification:
- 2 CPU core ( > 2.0 GHz)
- 4 GB RAM
(physical or virtual)
Windows Server 2008 R2
IIS Server must also have additional role services installed.
Checklist
Source
Network Requirements
Integrated Cloud DMZ Relay
Source
Component
Source Host
A
{DMZ_Server_IP}
{DMZ_Server_IP}
{DMZ_Server_IP}
AirWatch DMZ
Server
Destination
Component
Client EAS/CAS
Server(s)
AirWatch
Internal Server
Destination Host
{InternalURL_CAS}
{InternalURL_AWInternal}
Destination IP
Protocol
Port
Ref
Diagram
{InternalIP_CAS}
HTTP/HTTPS
80,443
HTTP/HTTPS
443
2010
HTTPS
443
389,636,
3268,
3269,
135,443,
25
{InternalIP_AWInt
ernal}
any
*for a list of IP
ranges of AW
Datacenters click
AirWatch SaaS
*.airwatchportals.com
*.awmdm.com
{InternalURL_DC}
{Internal_BES}
{Internal_ADCS}
{Internal_SMTP}
{Internal_SharePoint}
{InternalURL_CA}
{InternalIP_IP}
DCOM
HTTPS
LDAP/LDAPS
SMTP
AW Public IP
HTTPS
443
HTTP/HTTPS
80/443
Yes
No
N/A
here
{InternalServer_IP}
Internal
Network
{InternalServer_IP}
AirWatch DMZ
Server
AW Public URL
AirWatch SaaS
*.airwatchportals.com
*.awmdm.com
any
HTTP/HTTPS
80/443
N/S
AirWatch
Internal Server
{ADMIN_IP}
any
*for a list of IP
ranges of AW
Datacenters click
{ADMIN_IP}
Apple iTunes
Cloud
{ADMIN_IP}
Google Play
Store
play.google.com
any
HTTP/HTTPS
80/443
N/S
{ADMIN_IP}
Virtual Earth
(GPS Maps)
*.virtualearth.net
any
HTTP/HTTPS
80/443
N/S
AW Public URL
AW Public IP
HTTPS
443
17.0.0.0/8
TCP
5223
any
HTTP/HTTPS
80/443
any
TCP
5228
10
HTTP/HTTPS
80/443
11
HTTPS
443
2010
2020
12
Administrators
/ User Self
Service
AirWatch SaaS
See IP list
here
AirWatch DMZ
Server
Apple APNs
Cloud
{Device_IP}
{Device_IP}
Apple iTunes
Cloud
{Device_IP}
Android C2DM
Cloud
#-courier.push.apple.com
gateway.push.apple.com
phobos.apple.com
oscp.apple.com
ax.itunes.apple.com
mtalk.google.com
Devices
N
{Device_IP}
AirWatch SaaS
*.airwatchportals.com
*.awmdm.com
any
*for a list of IP
ranges of AW
Datacenters click
Checklist
here
itunes.apple.com
ax.itunes.apple.com
*.mzstatic.com
*.phobos.apple.com
*phobos.apple.com.edges
uite.net
here
O
{Device_IP}
AirWatch DMZ
Server
AW Public URL
AW Public IP
Prerequisite Checklist
Cloud with Integration DMZ Reverse Proxy
#
Title
Description / Purpose
AirWatch Internal
Server
Windows OS
IIS 7 Server
Microsoft Messaging
Queue (MSMQ)
Java
AirWatch Software
External URL
10
11
12
Load
Balancer
13
Firewall
Changes
14
Service
Accounts
15
Enterprise Service
Accounts
(Optional)
Hardware
Software
DNS
Certificates
Yes
No
N/A
Windows Server
Minimum specification:
- 2 CPU core ( > 2.0 GHz)
- 4 GB RAM
(physical or virtual)
Windows Server 2008 R2
IIS Server must also have additional role services installed.
Installed on MAG.
Will be provided to Client during install.
External URL (DNS Record) resolving to the AirWatch Internal server
Internal URL to relay Exchange ActiveSync traffic from the AirWatch server
Checklist
Source
Public trusted SSL Certificate to match the External DNS for the AirWatch Internal
server address
Client may need to generate internal certs for the traffic between the external
internet interface for the EAS traffic and the Reverse Proxy, F5, SEG, and CAS
servers. Details to be determined by the Client architect team.
The MAG SSL certificate must be installed on the reverse proxy.
If installing AirWatch behind a network load balancer, client will need to setup load
balancer configuration. Persistence should be set on the SSL session for 15 minutes.
See Appendix for more details.
See Below Firewall Change Requests
If implementing enterprise services, services accounts will need to be created and
given specific permissions to allow integration. See Appendix.
Network Requirements
Integrated Cloud DMZ Reverse Proxy
Source
Component
A
AirWatch
Internal Server
Source Host
Destination
Component
Destination Host
Destination IP
Protocol
Port
Ref
Diagram
{InternalServer_IP}
Client EAS/CAS
Server(s)
(Optional)
{InternalURL_CAS}
{InternalIP_CAS}
HTTP/HTTPS
80,443
Enterprise
Services
(Optional)
{InternalURL_DC}
{Internal_BES}
{Internal_ADCS}
{Internal_SMTP}
{Internal_SharePoint}
{InternalURL_CA}
{InternalIP_IP}
DCOM
HTTPS
LDAP/LDAPS
/SMTP
389,636
3268,
3269,
135,443,
25
HTTPS
443
HTTP/HTTPS
80/443
{InternalServer_IP}
{InternalServer_IP}
AirWatch SaaS
*.airwatchportals.com
*.awmdm.com
any
*for a list of IP
ranges of AW
Datacenters click
Yes
No
N/A
here
D
{ADMIN_IP}
any
*for a list of IP
ranges of AW
Datacenters click
AirWatch SaaS
*.airwatchportals.com
*.awmdm.com
any
HTTP/HTTPS
80/443
N/S
{ADMIN_IP}
Apple iTunes
Cloud
{ADMIN_IP}
Google Play
Store
play.google.com
any
HTTP/HTTPS
80/443
N/S
{ADMIN_IP}
Virtual Earth
(GPS Maps)
*.virtualearth.net
any
HTTP/HTTPS
80/443
N/S
AW Public URL
AW Public IP
HTTPS
443
17.0.0.0/8
TCP
5223
any
HTTP/HTTPS
80/443
any
TCP
5228
HTTP/HTTPS
80/443
HTTPS
443
2010
2020
10
Administrators
/ User Self
Service
AirWatch SaaS
See IP list
here
AirWatch
Internal Server
Apple APNs
Cloud
{Device_IP}
{Device_IP}
Apple iTunes
Cloud
{Device_IP}
Android C2DM
Cloud
#-courier.push.apple.com
gateway.push.apple.com
phobos.apple.com
oscp.apple.com
ax.itunes.apple.com
mtalk.google.com
Devices
L
{Device_IP}
AirWatch SaaS
{Device_IP}
AirWatch
Internal Server
*.airwatchportals.com
*.awmdm.com
any
*for a list of IP
ranges of AW
Datacenters click
Checklist
here
*.itunes.apple.com
*.mzstatic.com
*.phobos.apple.com
*phobos.apple.com.edges
uite.net
here
M
AW Public URL
AW Public IP
Architecture Diagram
AirWatch Console
AirWatch Device Services
AirWatch Secure Email Gateway
AirWatch Mobile Access Gateway
Prerequisite Checklist
On-Premise Single Server
Source
Title
Description / Purpose
AirWatch Internal
Server
Windows OS
SQL Server
IIS 7 Server
Microsoft Messaging
Queue (MSMQ)
Java
10
Hardware
Yes
No
N/A
11
DNS
12
13
Certificates
14
15
16
Firewall
Changes
17
Load
Balancer
18
Service
Accounts
19
Enterprise Service
Accounts
(Optional)
Checklist
Software
Client Internal Domain (AD) DNS to use to connect from the AirWatch server to the
AD for authenticating users
Internal hostname and CA issuing name of the CA or SCEP endpoint.
Public trusted SSL Certificate to match the External DNS for the AirWatch SEG/EIS
server. (If applicable)
Client may need to generate internal certs for the traffic between the external
internet interface for the EAS traffic and the Reverse Proxy, F5, SEG, and CAS
servers. Details to be determined by the Client architect team.
The MAG SSL certificate must be installed on the reverse proxy.
See Below Firewall Change Requests
If installing AirWatch behind a network load balancer, client will need to setup load
balancer configuration. Persistence should be set on the SSL session for 15 minutes.
See Appendix for more details.
If implementing enterprise services, services accounts will need to be created and
given specific permissions to allow integration. See Appendix.
Network Requirements
On-Premise Single Server
AirWatch
Internal Server
Source Host
Destination
Component
Destination IP
Protocol
Port
Ref
Diagram
{Internal_IPs}
DCOM
HTTPS
LDAP/LDAPS
SMTP
389,636,
3268,
3269,
135,
443, 25,
465
17.0.0.0/8
TCP
2195,
2196
any
HTTP/HTTPS
80,443
play.google.com
any
HTTP/HTTPS
80,443
N4S
Destination Host
{InternalURL_DC}
{Internal_CAS}
Internal_BES}
{Internal_ADCS}
{Internal_SMTP}
{Internal_SharePoint}
gateway.push.apple.co
m
feedback.push.apple.co
m
*.itunes.apple.com
*.phobos.apple.com
{InternalServer_IP}
Internal
Network
{InternalServer_IP}
Apple APNs
Cloud
{InternalServer_IP}
{InternalServer_IP}
{InternalServer_IP}
Android C2DM
Cloud
android.googleapis.com
android.apis.google.com
www.google.com
google.com
any
HTTPS
443
{InternalServer_IP}
CellTrusts SMS
Gateyway
(optional)
gateway.celltrust.net
162.42.205.0/24
HTTPS
443
N/S
{InternalServer_IP}
AirWatch
Certificate
Portal
HTTPS
443
N/S
{InternalServer_IP}
{InternalServer_IP}
{InternalServer_IP}
{InternalServer_IP}
{ADMIN_IP}
Apple iTunes
Cloud
Google Play
Store
awcp.air-watch.com
any
*for a list of IP
ranges of AW
Datacenters click
here
Administrators
/ User Self
Service
Devices
SSL Signing
Cert CRL
SQL Server
SQL Server
Reporting Svc
AW
Autodiscovery
Server
Ex.ocsp.verisign.com
TBD
HTTP
80
N/S
{SQLServer_Name}
{SQLServer_IP}
TCP
1433
{SSRS_Name}
{SSRS_IP}
HTTP
80
discovery.awmdm.com
209.208.230.100
HTTPS
443
AirWatch
Internal Server
{InternalServer}
{InternalServer_IP}
HTTP/HTTPS
80,443
{ADMIN_IP}
Virtual Earth
(GPS Maps
*.virtualearth.net
any
HTTP/HTTPS
80,443
N/S
{Device_IP}
Apple APNs
Cloud
17.0.0.0/8
TCP
5223
10
{Device_IP}
Apple iTunes
Cloud
any
HTTP/HTTPS
80,443
11
{Device_IP}
Android C2DM
Cloud
any
TCP
5228
12
13
14
#courier.push.apple.com
gateway.push.apple.co
m
phobos.apple.com
oscp.apple.com
ax.itunes.apple.com
mtalk.google.com
{Device_IP}
AirWatch
Server
AW Public URL
AW Public IP
HTTP/HTTPS
80,443,
2001,
2010,
2020
{Device_IP}
AirWatch
Autodiscovery
Server
discovery.awmdm.com
209.208.230.100
HTTPS
443
Yes
No
N/A
Checklist
Source
Component
Architecture Diagram
Prerequisite Checklist
On-Premise Multi Server
Source
Title
Description / Purpose
AirWatch Internal
Server
(Internal)
AirWatch DMZ
Server
Windows OS
SQL Server
IIS 7 Server
Microsoft Messaging
Queue (MSMQ)
Java
10
External URL
11
11
Internal URL
12
13
SSL Certificate
(AirWatch Internal)
Load
Balancer
14
Firewall
Changes
15
Service
Accounts
16
Enterprise Service
Accounts
(Optional)
Hardware
Yes
No
N/A
DNS
Certificates
Checklist
Software
If installing AirWatch behind a network load balancer, client will need to setup load
balancer configuration. Persistence should be set on the SSL session for 15 minutes.
See Appendix for more details.
See Below Firewall Change Requests
If implementing enterprise services, services accounts will need to be created and
given specific permissions to allow integration. See Appendix.
Network Changes
On-Premise Multi Server
AirWatch
Internal Server
AirWatch DMZ
Server
Source Host
Destination Host
Internal
Network
{InternalURL_DC}
{Internal_CAS}
Internal_BES}
{Internal_ADCS}
{Internal_SMTP}
{Internal_SharePoint}
{Internal_IPs}
DCOM
HTTPS
LDAP/LDAPS
SMTP
SQL Server
SQL Server
Reporting Sync
{SQLServer_Name}
{SQLServer_IP}
TCP
389,63
6,
3268,
3269,
135,
443,
25,
465
1433
{SQLServer_Name}
{SQLServer_IP}
HTTP/HTTPS
80,443
Apple APNs
Cloud
gateway.push.apple.com
feedback.push.apple.com
17.0.0.0/8
TCP
2195,
2196
Apple iTunes
Cloud
Google Play
Store
*.itunes.apple.com
*.phobos.apple.com
any
HTTP/HTTPS
80,443
play.google.com
any
HTTP/HTTPS
80,443
Destination IP
Protocol
Port
Ref
Diagram
{InternalServer_IP}
{InternalServer_IP}
{InternalServer_IP}
{InternalServer_IP}
{InternalServer_IP}
{InternalServer_IP}
{InternalServer_IP}
Google Cloud
Messaging
android.googleapis.com
android.apis.google.com
www.google.com
google.com
any
TCP
443
N/S
{InternalServer_IP}
CellTrust SMS
gateway.celltrust.net
162.42.205.0/2-4
HTTPS
443
N/S
{InternalServer_IP}
AW DMZ
Server
{DMZServer_Name}
{DMZServer_IP}
TCP
443,
2001
{InternalServer_IP}
AirWatch
autodiscovery
Server
discovery.awmdm.com
209.208.230.100
HTTPS
443
{DMZ_Server_IP}
(SEG only)
Client CAS
Server(s)
{InternalURL_EAS}
{InternalIP_EAS}
HTTPS
443
{DMZ_Server_IP}
Apple APNs
Cloud
gateway.push.apple.com
17.0.0.0/8
TCP
2195,
2196
{DMZ_Server_IP}
Google Cloud
Messaging
any
TCP
443
10
{DMZ_Server_IP}
any
HTTP
N/S
{DMZ_Server_IP}
{InternalServer_URL}
{InternalServer_IP}
HTTPS
80
443,
2010
{DMZ_Server_IP}
{SQLServer_Name}
{SQLServer_IP}
TCP
1433
discovery.awmdm.com
209.208.230.100
HTTPS
443
17
*.virtualearth.net
any
HTTP/HTTPS
80,443
N/S
{InternalServer_URL}
{InternalServer_IP}
HTTP/HTTPS
80,443
12
{DMZ_Server_URL}
{DMZ_Server_IP}
HTTP/HTTPS
80,443
N/S
17.0.0.0/8
TCP
5223
13
any
HTTP/HTTPS
80,443
14
any
TCP
5228
15
16
18
{DMZ_Server_IP}
{ADMIN_IP}
{ADMIN_IP}
{USER_IP}
AirWatch DMZ
Server
{Device_IP}
Apple APNs
Cloud
{Device_IP}
Apple iTunes
Cloud
{Device_IP}
Android C2DM
Cloud
Administrators
Self Service
Portal
Destination
Component
android.googleapis.com
android.apis.google.com
www.google.com
google.com
TBD
#-courier.push.apple.com
gateway.push.apple.com
phobos.apple.com
oscp.apple.com
ax.itunes.apple.com
mtalk.google.com
Devices
X
{Device_IP}
AirWatch
Server
{DMZ_Server_URL}
Public IP
HTTP/HTTPS
80,
443,
2001,
2010,
2020
{Device_IP}
AirWatch
autodiscovery
Server
discovery.awmdm.com
209.208.230.100
HTTPS
443
Yes
No
N/A
Checklist
Source
Component
11
Appendix
The table below lists the required service accounts needed to integrate with backend enterprise services.
Service Accounts
Source
Title
LDAP Binding
Account
Enterprise
Integration Service
Account
Description / Purpose
Yes
No
N/A
Certificate Authority
Service Account
Request Certificates
Requires these permissions on the Certificate Template:
Read
Enroll
AirWatch Certificate Managment
Exchange 2010 and Office 365 permissions:
Service
Accounts
PowerShell Service
Account
Mail Recipients
Recipient Policies (only if deploying Windows Phone Devices)
AirWatch PowerShell Email Configuration Guide
SharePoint Service
Account
Installation Admin
Rights
SMTP
10
SCCM
Additional Notes
Apple APNs
From a device the following has to occur for a successful APNs connection: NSLookup gateway.push.apple.com for the TXT record; open
connection to #-courier.push.apple.com on port 5223 where # is the result returned from the TXT record on gateway.push.apple.com
Load Balancer
Load balancers are to be configured with a round robin load balancing mechanism and SSL session persistence of 15 minute sessions
Load balancers are also recommended to redirect all HTTP requests to HTTPS
SSL offloading supported for all services except API services. If offloading SSL, load balancer must forward secure cookies to and from the
AirWatch servers.
Public DNS
External DNS needed for email proxy server
External DNS needed for AirWatch Device Services
Public IP
A public IP address to access the AirWatch email proxy server from the Internet (HTTPS)
A public IP address to access the AirWatch Device Services server from the Internet (HTTPS)
Proxy
The AirWatch servers can be configured with a proxy / PAC file for outbound internet access. Apple APNs traffic, however, is not HTTP
traffic, and cannot be proxied through traditional HTTP proxies. This traffic must go straight out to the internet, or through an
application/SOCKS proxy.
Kerberos Delegation
If using client certificates for email authentication the SEG server must be joined to the same domain as the backend CAS server and
Kerberos Delegation must be setup in AD between the AirWatch SEG and the CAS server(s). In addition, valid SPNs must be set in AD for
the URL used by the public URL used by the SEG server.
HTTP PUT
iOS MDM requires the support of HTTP PUT commands from the iOS device to the AirWatch MDM server (Device Services)
Note Topology and Blackberry Administration Service setup permissions not necessary.