Forum Discussion
Exchange 2013 iApp Confguration for MobileIron
- Nov 03, 2016
We resolved this. We had the ActiveSync virtual directory in IIS locked down to the MobileIron servers, but needed to add the self-ip's of the F5 devices as well.
Hi RainHail, You can't change the iApp virtual server type to Performance L4 because that VS type isn't supported for doing all the things that the iApp deployment needs to do.
I'm unfamiliar with how MobileIron works, so I'm just going to ask some general questions.
Is MobileIron sitting between mobile clients and your Exchange server? Was the previously configured Performance L4 virtual server the target for traffic sourced from MobileIron, and did it work until you switched it to point at the iApp-created virtual server?
Did you deploy APM or AFM with your Exchange iApp?
- RainHail_281362Oct 28, 2016Altostratus
From MobileIron: "Standalone Sentry serves as an intelligent gatekeeper to the ActiveSync server. It uses the ActiveSync protocol to communicate with the ActiveSync server and with the ActiveSync devices."
Essentially, a MobileIron app sits on the mobile device and is pointed to the MobileIron Sentry device. This Sentry device is in the DMZ and passes the information to the Exchange iApp using ActiveSync over 443. This configuration works fine using the manually created virtual servers, but doesn't work with the iApp. On the external F5 appliance, there is a virtual server that answers all Exchange requests. It points those to an APM 'portal' where the user gets authenticated with username and password, then uses Symantec VIP for two-factor. Once authenticated, the traffic gets passed to the internal F5 device where the Exchange iApp is deployed (along with the old Exchange VS). The only thing that changes in this scenario is the internal VS that the traffic gets passed to.
Old way: Mobile Device -> Ext F5 -> APM for authentication -> Internal F5 w/created VS
New way: Mobile Device -> Ext F5 -> APM for authentication -> Internal Exchange F5 iApp
- mikeshimkus_111Oct 28, 2016Historic F5 Account
Do you see successful authentications in APM for the clients when they are forwarded to the iApp VS?
Does the MobileIron Sentry have a cert installed? It should either have the cert that matches the one used in the iApp, a self-signed cert, or none at all, according to this: https://www.ndm.net/mobile/pdf/vol_iv_using_mobileiron_sentry.pdf
In the old way, if the MobileIron device had a cert with it's own CN, that should work. But it would break if you started pointing that to a VS using the Exchange cert.
- RainHail_281362Oct 28, 2016Altostratus
We haven't gotten that far yet to look for successful authentications in APM when forwarded to the iApp VS.
Everything is using a wildcard certificate, except that the old VS is using 'Performance (Layer 4)' for the type, so no certificate is used. That's why I was wondering about changing the combined_https VS to 'Performance (Layer 4)' instead of 'Standard'. That was the one thing the stood out as a difference between the old VS and the iApp VS. That being said, the wildcard cert on the Sentry, F5 and Exchange all have different thumbprints, but are all issued from the same primary wildcard certificate from Digicert.
- mikeshimkus_111Oct 28, 2016Historic F5 Account
It's hard to do much more troubleshooting without knowing exactly where it's breaking. We'd want to verify that the request is getting to the iApp virtual server and if it's making it through to the ActiveSync pool on the back end. You can turn up the APM log level to debug and watch /var/log/apm to verify that you are getting an authenticated session. You should also be able to add an iRule to the iApp VS to log the ActiveSync requests and responses from Exchange.
I recommend opening a case with F5 support on this. If you want, you can send me the case number so I can track it.
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com