If your company is behind a security firewall that restricts internet access (external and internal), it would be necessary to call InfoSec and informe that some ports and addresses must be allowed in order to the solution to function correctly.
Cloud4mobile Servers
All C4M Agent communication with server is done through HTTPS over the port 443. These are the addresses used by cloud4mobile Agent:
- api.cloud4mobile.com.br
- mobile.cloud4mobile.com.br
- auth.cloud4mobile.com.br
- c4m.blob.core.windows.net
Android FCM
We also use Google Firebase Cloud Messaging (FCM) to send notifications to devices (more info about FCM can be found here). The ports and adresses to make this happen are:
Addresses | Ports |
mtalk.google.com mtalk4.google.com mtalk-staging.google.com mtalk-dev.google.com alt1-mtalk.google.com alt2-mtalk.google.com alt3-mtalk.google.com alt4-mtalk.google.com alt5-mtalk.google.com alt6-mtalk.google.com alt7-mtalk.google.com alt8-mtalk.google.com android.clients.google.com device-provisioning.googleapis.com gcm-http.googleapis.com gcm-xmpp.googleapis.com android.googleapis.com fcm.googleapis.com fcm-xmpp.googleapis.com | TCP/443,5228-5230 |
Android Enterprise
The device also comunicates to Google Android Enterprise servers if the enroll was done using Android Enterprise. This communication is not done through our C4M Agent, rather by the Android Device Policy, Google’s DPC, that is responsible to apply the MDM policies. Here are the necessary ports and adresses:
Endereços | Portas |
play.google.com android.com google-analytics.com googleusercontent.com *gstatic.com *.gvt1.com *.ggpht.com dl.google.com dl-ssl.google.com android.clients.google.com *.gvt2.com *.gvt3.com | TCP/443 TCP, UDP/5228-5230 |
*.googleapis.com m.google.com accounts.google.com accounts.google.[country] pki.google.com clients1.google.com clients2.google.com clients3.google.com clients4.google.com clients5.google.com clients6.google.com omahaproxy.appspot.com android.clients.google.com connectivitycheck.android.com connectivitycheck.gstatic.com www.google.com ota.googlezip.net ota-cache1.googlezip.net ota-cache2.googlezip.net | TCP/443 (country is the local country address, example: brazil -> accounts.google.com.br) |
NAT and SPI observations
If your network infrastructure implements NAT (Network Address Translation) or SPI (Stateful Packet Inspection) it is recommended to set the timeouts at 30 minutes or more to the connections to ports 5228-5230. This Google’s recommendation gives a more stable communication and also helps in save device’s battery.