You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/intune/protect/certificate-connector-overview.md
+12-4Lines changed: 12 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ keywords:
7
7
author: brenduns
8
8
ms.author: brenduns
9
9
manager: dougeby
10
-
ms.date: 05/04/2022
10
+
ms.date: 05/18/2022
11
11
ms.topic: how-to
12
12
ms.service: microsoft-intune
13
13
ms.subservice: protect
@@ -85,11 +85,19 @@ The Certificate Connector for Microsoft Intune supports:
85
85
86
86
## Lifecycle
87
87
88
-
Periodically, updates to the certificate connector are released. Announcements for new updates appear in the [What's new for the Certificate Connector](#whats-new-for-the-certificate-connector) section in this article.
88
+
Periodically, updates to the certificate connector are released. Announcements for new connector updates, including the version and release date for each update, appear in the [What's new for the Certificate Connector](#whats-new-for-the-certificate-connector) section in this article.
89
89
90
-
Intune supports each connector release for six months after it's released. After the six months have passed, the connector is no longer supported and might not function as expected.
90
+
**Each new connector release**:
91
91
92
-
If you don’t allow the connector to automatically update, plan to manually update it to the latest version at the first opportunity.
92
+
- Is supported for six months after its release date. During this period, automatic updates can install a newer connector version. Updated connector versions can include but aren't limited to bug fixes and performance and feature improvements.
93
+
94
+
- If an out of support connector fails, you’ll need to update to the latest supported version.
95
+
96
+
- If you block the automatic update of the connector, plan to manually update the connector within six months, before support for the installed version ends. After support ends, you’ll need to update the connector to a version that remains in support to receive support for problems with the connector.
97
+
98
+
- Connectors that are out of support will continue to function for up to 18 months after its release date. After 18 months, a connectors functionality might fail due to service level improvements, updates, or in addressing common security vulnerabilities that might surface in the future.
99
+
100
+
For example, the connector version 6.2203.12.0 that released on May 4, 2022, will drop from support on November 4, 2022. The same connector should continue to function (though not be supported) until November 2023. After November 2023 the connector might stop communicating with Intune.
Copy file name to clipboardExpand all lines: memdocs/intune/protect/microsoft-tunnel-prerequisites.md
+15-15Lines changed: 15 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ keywords:
5
5
author: brenduns
6
6
ms.author: brenduns
7
7
manager: dougeby
8
-
ms.date: 03/03/2022
8
+
ms.date: 05/18/2022
9
9
ms.topic: how-to
10
10
ms.service: microsoft-intune
11
11
ms.subservice: protect
@@ -50,12 +50,11 @@ The following sections detail the prerequisites for the Microsoft Tunnel, and pr
50
50
Set up a Linux based virtual machine or a physical server on which Microsoft Tunnel Gateway will install.
51
51
52
52
> [!NOTE]
53
-
> Only the opearating systems and container versions that are listed in the following table are supported. Versions not listed are not supported. Only after testing and supportability are verified are newer versions added to this list.
53
+
> Only the operating systems and container versions that are listed in the following table are supported. Versions not listed are not supported. Only after testing and supportability are verified are newer versions added to this list.
54
54
55
+
-**Supported Linux distributions** - The following table details which versions of Linux are supported for the Tunnel server, and the container they require:
55
56
56
-
-**Supported Linux distributions** - The following table details which versions of Linux are supported for the Tunnel server, and the container they require:
57
-
58
-
|Distributon version | Container requirements | Considerations |
57
+
|Distribution version | Container requirements | Considerations |
@@ -64,7 +63,6 @@ Set up a Linux based virtual machine or a physical server on which Microsoft Tun
64
63
| Ubuntu 18.04 | Docker CE ||
65
64
| Ubuntu 20.04 | Docker CE ||
66
65
67
-
68
66
-**Size the Linux server**: Use the following guidance to meet your expected use:
69
67
70
68
|# Devices | # CPUs | Memory GB | # Servers | # Sites | Disk Space GB |
@@ -83,7 +81,6 @@ Set up a Linux based virtual machine or a physical server on which Microsoft Tun
83
81
-**Install Docker CE or Podman**: Depending on the version of Linux you use for your Tunnel server, you'll need to install one of the following on the Linux server:
84
82
- Docker version 19.03 CE or later
85
83
- Podman version 3.0
86
-
87
84
88
85
Microsoft Tunnel requires Docker or Podman on the Linux server to provide support for containers. Containers provide a consistent execution environment, health monitoring and proactive remediation, and a clean upgrade experience.
89
86
@@ -94,7 +91,7 @@ Set up a Linux based virtual machine or a physical server on which Microsoft Tun
94
91
> The preceding link directs you to the CentOS download and installation instructions. Use those same instructions for RHEL 7.4. The version installed on RHEL 7.4 by default is too old to support Microsoft Tunnel Gateway.
95
92
-[Install Docker Engine on Ubuntu](https://docs.docker.com/engine/install/ubuntu/)
96
93
-[Install Podman on Red Hat Enterprise Linux 8.4 and 8.5 (scroll down to RHEL8)](https://podman.io/getting-started/installation)
97
-
These versions of RHEL don't support Docker. Instead, these versions use Podman, and *podman* is part of a module called "container-tools". In this context, a module is a set of RPM packages that represent a component and are usually installed together. A typical module contains packages with an application, packages with the application-specific dependency libraries, packages
94
+
These versions of RHEL don't support Docker. Instead, these versions use Podman, and *podman* is part of a module called "container-tools". In this context, a module is a set of RPM packages that represent a component and that usually install together. A typical module contains packages with an application, packages with the application-specific dependency libraries, packages
98
95
with documentation for the application, and packages with helper utilities. For more information, see [Introduction to modules](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/installing_managing_and_removing_user-space_components/introduction-to-modules_using-appstream) in the Red Hat documentation.
99
96
100
97
-**Transport Layer Security (TLS) certificate**: The Linux server requires a trusted TLS certificate to secure the connection between devices and the Tunnel Gateway server. You’ll add the TLS certificate, including the full trusted certificate chain, to the server during installation of the Tunnel Gateway.
@@ -287,14 +284,13 @@ The following details can help you configure an internal proxy when using Podmam
287
284
288
285
3. Restart the Tunnel Gateway server: Run `mst-cli server restart`
289
286
290
-
291
-
Be aware that RHEL uses SELinux. Because a proxy that doesn't run on a SELinux port for *http_port_t* can require additional configuration, check on the use of SELinux managed ports for http. Run the following command to view the configurations: `sudo semanage port -l | grep “http_port_t” `
287
+
Be aware that RHEL uses SELinux. Because a proxy that doesn't run on a SELinux port for *http_port_t* can require extra configuration, check on the use of SELinux managed ports for http. Run the following command to view the configurations: `sudo semanage port -l | grep “http_port_t”`
292
288
293
289
Example of the results of the port check command. In this example, the proxy uses 3128 and isn't listed:
294
290
295
291
:::image type="content" source="./media/microsoft-tunnel-prerequisites/check-selinux-ports.png" alt-text="Screen shot of the port check.":::
296
292
297
-
- If your proxy runs on one of the SELinux ports for **http_port_t**, then you can continue with the Tunnel Gateway install process.
293
+
- If your proxy runs on one of the SELinux ports for **http_port_t**, then you can continue with the Tunnel Gateway install process.
298
294
- If your proxy does't run on a SELunux port for **http_port_t** as in the preceding example, you'll need to make extra configurations.
299
295
300
296
**If your proxy port is not listed for*****http_port_t***, check if the proxy port is used by another service. Use the *semnage* command to first check the port that your proxy uses and then later if needed, to change it. To check the port your proxy uses, run: `sudo semanage port -l | grep “your proxy port”`
@@ -372,7 +368,6 @@ The Microsoft Tunnel Gateway permissions group grants the following permissions:
372
368
373
369
-**Read** - View Microsoft Tunnel Gateway server configurations and sites. Server configurations include settings for IP address ranges, DNS servers, ports, and split tunneling rules. Sites are logical groupings of multiple servers that support Microsoft Tunnel.
374
370
375
-
376
371
## Run the readiness tool
377
372
378
373
Before you start a server install, we recommend you download and run the most recent version of the **mst-readiness** tool. The tool is a script that runs on your Linux server and does the following actions:
@@ -381,7 +376,7 @@ Before you start a server install, we recommend you download and run the most re
381
376
382
377
- Confirms that your network configuration allows Microsoft Tunnel to access the required Microsoft endpoints.
383
378
384
-
- Checks for the presence of the ip_tables module on the Linux server. This check was added to the script on February 11 2022, when support for RHEL 8.5 was added. RHEL 8.5 doesn’t load the ip_tables module by default. If they are missing after the Linux server installs, you must [manually load the ip_tables module](#manually-load-ip_tables).
379
+
- Checks for the presence of the ip_tables module on the Linux server. This check was added to the script on February 11 2022, when support for RHEL 8.5 was added. RHEL 8.5 doesn’t load the ip_tables module by default. If they're missing after the Linux server installs, you must [manually load the ip_tables module](#manually-load-ip_tables).
385
380
386
381
> [!IMPORTANT]
387
382
> The readiness tool doesn't validate inbound ports, which is a common misconfiguration. After the readiness tool runs, review the [firewall prerequisites](#firewall) and manually validate your firewalls pass inbound traffic.
@@ -423,7 +418,7 @@ To check for the presence of this module, run the most recent version of mst-rea
423
418
424
419
If the module isn’t present, the tool stops on the ip_tables module check. In this scenario, you can run the following commands to manually load the module.
425
420
426
-
**Manually load the ip_tables module**:
421
+
#### Manually load the ip_tables module
427
422
428
423
In the context of sudo, run the following commands on your Linux server:
429
424
@@ -433,7 +428,12 @@ In the context of sudo, run the following commands on your Linux server:
433
428
434
429
3. Rerun the validation to confirm the tables are now loaded: `lsmod |grep ip_tables`
435
430
436
-
**Configure Linux to load ip_tables at boot**:
431
+
> [!IMPORTANT]
432
+
> When updating the Tunnel server, a manually loaded ip_tables module might not persist. This can require you to reload the module after the update completes. After your server update is completed, review the server for the presence of the ip_tables module.
433
+
>
434
+
> If the tables aren't present, use the preceding steps to reload the module, with the additional step to restart the server after the module is loaded.
435
+
436
+
#### Configure Linux to load ip_tables at boot
437
437
438
438
In the context of sudo, run the following command on your Linux server to create a config file that will load the ip_tables into kernel during boot time: `echo ip_tables > /etc/modules-load.d/mstunnel_iptables.conf`
0 commit comments