How to check if the AD Broker connects to the cloud
In this topic, you will learn how to check if the Portnox™ Active Directory Broker connects to the Portnox™ Cloud service.
The Portnox Active Directory Broker connects to the cloud on the following ports:
- Outgoing: portnox-centraal-prod.servicebus.windows.net:443
- Outgoing: mobilecentraal.portnox.com:8081
You need to allow these connections on the firewall and these names/ports must be reachable from the Active Directory Broker machine.
To check if the cloud is reachable, use the following methods:
-
Use the following PowerShell commands:
- Test-NetConnection -Port 443 -ComputerName portnox-centraal-prod.servicebus.windows.net -InformationLevel Detailed
- Test-NetConnection -Port 8081 -ComputerName mobilecentraal.portnox.com -InformationLevel Detailed
-
Try to open the following URLs in your browser and see if you receive a server response:
- https://portnox-centraal-prod.servicebus.windows.net:443
- https://mobilecentraal.portnox.com:8081 (a 503 response code means that there is connectivity)
If the servers are not reachable, you need to check DNS, firewall, and proxy settings.
The following configurations must be done on the firewall for the broker to be able to communicate with the cloud:
FQDN | Protocol | Ports | Direction |
---|---|---|---|
mobilecentraal.portnox.com | TCP | 8081 | Outbound |
cloudcentraalstoreprodus.blob.core.windows.net | TCP | 443 | Outbound |
cloudcentraalstoreprod.blob.core.windows.net | TCP | 443 | Outbound |
pnxeusprdclrinstallers.blob.core.windows.net | TCP | 443 | Outbound |
pnxweuprdclrinstallers.blob.core.windows.net | TCP | 443 | Outbound |
pnxweuprdclrpublic.blob.core.windows.net | TCP | 443 | Outbound |
pnxeusprdclrpublic.blob.core.windows.net | TCP | 443 | Outbound |
*.servicebus.windows.net | TCP | 80, 443, 5671, 5672, 9350, 9351, 9352 | Outbound |
If your firewall software does not support FQDNs or encounters issues, such as failing to recognize some IP addresses resolved from the FQDNs, you can use this official Azure script to retrieve the IP addresses associated with an Azure FQDN. You can then add all these IP addresses to the firewall instead of the FQDNs. However, be sure to regularly monitor connectivity and check for any updates, as Microsoft may add or remove IP addresses over time.