Skip to content

Commit cdff36b

Browse files
authored
Merge pull request #6662 from MicrosoftDocs/main
Publish 01/31/2022, 10:30 AM
2 parents d4c42ee + f2b60a7 commit cdff36b

3 files changed

Lines changed: 29 additions & 8 deletions

File tree

memdocs/intune/protect/device-compliance-partners.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: brenduns
88
ms.author: brenduns
99
manager: dougeby
10-
ms.date: 12/29/2021
10+
ms.date: 01/31/2022
1111
ms.topic: overview
1212
ms.service: microsoft-intune
1313
ms.subservice: protect
@@ -57,6 +57,7 @@ The following compliance partners are supported as generally available:
5757
- JAMF Pro
5858
- MobileIron Device Compliance Cloud
5959
- MobileIron Device Compliance On-prem
60+
- SOTI MobiControl
6061
- VMware Workspace ONE UEM (formerly AirWatch)
6162

6263
## Prerequisites

memdocs/intune/protect/microsoft-tunnel-overview.md

Lines changed: 20 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ keywords:
55
author: brenduns
66
ms.author: brenduns
77
manager: dougeby
8-
ms.date: 12/03/2021
8+
ms.date: 01/28/2022
99
ms.topic: how-to
1010
ms.service: microsoft-intune
1111
ms.subservice: protect
@@ -121,14 +121,30 @@ The Microsoft Tunnel Gateway runs in containers that run on Linux servers.
121121
- **5** - Device authenticates to Azure AD. Conditional Access policies are evaluated.
122122
- **6** - With split tunnel:
123123
- **6.a** - Some traffic goes directly to the public internet.
124-
- **6.b** - Some traffic goes to your public facing IP address for the Tunnel. The VPN channel will use TCP, TLS, UDP, and DTLS over port 443.
125-
- **7** - The Tunnel routes traffic to your internal proxy (optional) and your corporate network.
124+
- **6.b** - Some traffic goes to your public facing IP address for the Tunnel. The VPN channel will use TCP, TLS, UDP, and DTLS over port 443. This requires inbound and outbound [Firewall ports](../protect/microsoft-tunnel-prerequisites.md#firewall) to be open
125+
- **7** - The Tunnel routes traffic to your internal proxy (optional) and/or your corporate network. IT Admins must ensure that traffic from the Tunnel Gateway server internal interface can successfully route to internal corporate resource (IP address ranges and ports).
126126

127127
> [!NOTE]
128128
>
129129
> - Tunnel gateway maintains two channels with the client. A control channel is established over TCP, and TLS. This also serves as a backup data channel. It then looks to establish a UDP channel using DTLS (Datagram TLS, an implementation of TLS over UDP) that serves as the main data channel. If the UDP channel fails to establish or is temporarily unavailable, the backup channel over TCP/TLS is used. By default port 443 is used for both TCP and UDP, but this can be customized via the Intune Server Configuration - [*Server port* setting](../protect/microsoft-tunnel-configure.md#create-a-server-configuration). If changing the default port (443) ensure your inbound firewall rules are adjusted to the custom port.
130130
>
131-
> - Client traffic will have the source IP address of the Linux server host. Microsoft Tunnel Gateway uses port address translation (PAT). PAT is a type of network address translation (NAT) where the multiple private IP addresses are mapped into a single public IP (many-to-one) by using ports.
131+
> - The assigned client IP addresses (the*IP address range* setting in a [Server configuration](../protect/microsoft-tunnel-configure.md#to-create-a-server-configuration) for Tunnel) are not visible to other devices on the network. These addresses won't conflict with any internal/corporate network IP address on the network. Client traffic will have the source IP address of the Linux server host. Microsoft Tunnel Gateway uses port address translation (PAT). PAT is a type of network address translation (NAT) where multiple private IP addresses from the Server configuration are mapped into a single IP (many-to-one) by using ports. Client traffic will have the source IP address of the Linux server host.
132+
133+
**Break and inspect**:
134+
135+
Many enterprise networks enforce network security for internet traffic using technologies like proxy servers, firewalls, SSL break and inspect, deep packet inspection, and data loss prevention systems. These technologies provide important risk mitigation for generic internet requests but can dramatically reduce performance, scalability, and the quality of end user experience when applied to Microsoft Tunnel Gateway and Intune service endpoints.
136+
137+
The following outlines where break and inspect is not supported and where it is supported with Microsoft Tunnel Gateway. References are to the architecture diagram from the preceding section.
138+
139+
- **Break and inspect is not supported in the following areas**:
140+
141+
- Tunnel Gateway does not support SSL break and inspect, TLS break and inspect, or deep packet inspection for client connections.
142+
- The Use of firewalls, proxies, load balancers, or any technology that terminates and inspects the client sessions that go into the Tunnel Gateway is not supported and will cause clients connections to fail. (Refer to **F**, **D**, and **C** in the Architecture diagram).
143+
- If Tunnel Gateway uses an outbound proxy for internet access, the proxy server cannot perform break and inspect. This is because Tunnel Gateway Management Agent uses TLS mutual authentication when connecting to Intune (Refer to **3** in the Architecture diagram above). If break and inspect is enabled on the proxy server, network admins that manage the proxy server must add the Tunnel Gateway server IP address and Fully Qualified Domain Name (FQDN) to an approve-list to these [Intune endpoints](../fundamentals/intune-endpoints.md#access-for-managed-devices).
144+
145+
- **Break and inspect is supported in the following area**:
146+
147+
The Microsoft Tunnel [client VPN profile](../protect/microsoft-tunnel-configure.md#create-a-vpn-profile) that gets delivered to mobile clients supports a proxy configuration. If using this setting, the proxy (Refer to **G** in the Architecture diagram) specified can use “Break and Inspect” on the client traffic routed out (refer to **7** in the Architecture diagram) of the Tunnel Gateway server to the corporate network.
132148

133149
**Additional details**:
134150

memdocs/intune/protect/microsoft-tunnel-prerequisites.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ keywords:
55
author: brenduns
66
ms.author: brenduns
77
manager: dougeby
8-
ms.date: 01/04/2022
8+
ms.date: 01/28/2022
99
ms.topic: how-to
1010
ms.service: microsoft-intune
1111
ms.subservice: protect
@@ -159,7 +159,7 @@ When creating the Server configuration for the tunnel, you can specify a differe
159159

160160
You can use a proxy server with Microsoft Tunnel. The following considerations can help you configure the Linux server and your environment for success:
161161

162-
### Configure an internal proxy for Docker
162+
### Configure an outbound proxy for Docker
163163

164164
- If you use an internal proxy, you might need to configure the Linux host to use your proxy server by using environment variables. To use the variables, edit the **/etc/environment** file on the Linux server, and add the following lines:
165165

@@ -182,10 +182,14 @@ You can use a proxy server with Microsoft Tunnel. The following considerations c
182182
> [!NOTE]
183183
> Microsoft Tunnel doesn’t support Azure AD App Proxy, or similar proxy solutions.
184184
185-
### Configure an internal proxy for Podman
185+
### Configure an outbound proxy for Podman
186186

187187
The following details can help you configure an internal proxy when using RHEL 8.4, and Podman:
188188

189+
- Authenticated proxies aren't supported.
190+
191+
- The proxy can’t perform break and inspect because the Linux server uses TLS mutual authentication when connecting to Intune.
192+
189193
- Podman reads HTTP Proxy information stored in **/etc/profile.d/http_proxy.sh**. If this file doesn't exist on your server, create it. Edit **http_proxy.sh** to add the following two lines. In the following lines, *10.10.10.1:3128* is an example address:port entry. When you add these lines, replace *10.10.10.1:3128* with the values for your proxy IP *address:port*:
190194

191195
`export HTTP_PROXY=http://10.10.10.1:3128`

0 commit comments

Comments
 (0)