Jump to content


wilbywilson

IBCM Deployment Results

Recommended Posts

I've spent the last few weeks installing/configuring a internet-based management point for SCCM 2012 R2, and I thought I'd share some tips, since it was not the most straight-forward thing. Also, thanks to those people (especially Peter) who gave me advice along the way.

 

I chose to install the internet-based management point onto a DMZ server, which is in a separate domain from the SCCM primary. This DMZ domain does NOT need to have the schema extended for SCCM 2012, nor a "Systems Management" container created, nor add the SCCM Primary computer account to the administrators group. If you're planning to manage clients within that DMZ domain, configuring those pieces may be a good idea, but if you're just trying to stage a management point to serve clients in an existing domain, you don't need to do those steps.

 

For configuration of PKI and certificates, I followed this post:

http://sccmmofos.idepix.ca/?p=193

 

When installing the internet-based MP/DP, specify an account in the DMZ domain. It will need to have administrative access to the internet-based DMZ server. For the MP/DP/SUP options, choose "HTTPS", "Internet-Only", and "SSL" where applicable. You'll want to lock down the internet-based MP as much as possible.

 

As for firewall ports: From the SCCM Primary to the DMZ Server, I opened 80, 135, 443, 445, 8530, and 8531, and 49125-65535 (dynamic range for Windows Server 2012.) From the DMZ server to the Primary, I opened up 135, 445, 8530, and 8531. (Also, in the MP settings, check the box that says "Require the site server to initiate connections to this site system." And the FQDN for the internet MP/DP should be the internet DNS name, as opposed to the internal server name.) Between the SQL server and the DMZ server, only port 1433 should be open. If you're doing SQL DB replication, also open port 4022. And finally from the DMZ server to the internet, open ports 443 and 8531.

 

On the IIS server in the DMZ, make sure to add an SSL binding for the WSUS port (8531). The instructions I followed showed how to do this for SSL over port 443, but use the same premise to make the binding for port 8531:

http://wibier.me/wsus-and-configmgr-2012-https-communication/

 

After all of this, your internet-based SCCM clients should be able to do hardware/software inventory, and receive approved Windows Updates. I did run into an issue with a security update that was approved/published via SCUP, but I think that may be expected behavior, and I'll start another thread on that topic.

 

Hope this information is helpful to someone out there.

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...


×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.