Network Ports Used by Parallels Mac Management for Microsoft SCCM:
The ports used by Parallels Mac Management should NOT be used by other programs. Please review the following table and make sure that the ports listed are available. Please note that the table doesn't include the ports used by the standard System Center Configuration Manager 2012 services, and by the standard Windows services.
Program | TCP | UDP | Platform | Required | Notes |
---|---|---|---|---|---|
Configuration Manager Proxy pma_isv_proxy_service.exe |
8760, 443 |
Windows | Required |
The default ports 8760 and The outbound port 443 is used by
Parallels CfgMgr Proxy to communicate
with the Parallels License Server. The port
is also used to comm
unicate with the
Apple DEP service when participating in
the Apple Device Enrollment Program.
|
|
NetBoot Server pma_netboot_service.exe bootpd (DHCP) |
67, 68 | Windows | Optional | Required for the NetBoot Server functionality. |
|
NetBoot Server pma_netboot_service.exe tftpd (TFTP) |
69 | Windows | Optional | Required for the NetBoot Server functionality. |
|
NetBoot server | 80 | Windows | Optional | Required for the NetBoot Server functionality. |
|
Parallels MDM Server |
2195
custom
ports
|
Windows | Optional |
Port 2195 is used to communicate with
the Apple Push Notification service
(APNs).
Custom ports are used for incoming
connections. You specify these ports
when you configure a Parallels MDM
Server
|
|
SSH server | 22 | Mac | Optional | Required for the Network Discovery functionality. |
|
VNC server | 5900 | Mac | Optional | Needed to accept VNC connections on a Mac. |
|
Mac Client | 8000 | Mac | Required | Required for Parallels Mac Client to accept incoming connection from Parallels Configuration Manager Proxy. |
|
Mac computer | 5223 | Mac | Optional |
The port is used to communicate with the
Apple Push Notification service (APNs).
|
Additionally, RPC ports need to be open in order to allow WMI/RPC traffic to pass through. RPC ports can be opened by enabling a Group Policy firewall exception:
- Open the Group Policy Object Editor snap-in (gpedit.msc) to edit the Group Policy object (GPO) that is used to manage Windows Firewall settings in your organization.
- Open Computer Configuration, open Administrative Templates, open Network, open Network Connections, open Windows Firewall, and then open either Domain Profile or Standard Profile, depending on which profile you want to configure.
- Enable the following exception: "Allow Remote Administration Exception".
Was this article helpful?
Tell us how we can improve it.