Skip to main content

 

Cisco Meraki Documentation

Allowing Apple iCloud services on a restrictive firewall

When using restrictive Layer 3 Firewall Rules for outbound traffic on the MX Security Appliance, services such as Apple iCloud can sometimes be inadvertently blocked. The purpose of this KB is to discuss the ports Apple iCloud needs access to perform backups and access data stored on iCloud.

 

Figure 1. Explicit deny rule blocking iCloud traffic. 

 

screenshot showing an explicit deny firewall rule

 

The firewall configuration shown in Figure 1 will block all outbound traffic except TCP 80 amd TCP 443 (http and https).  A user trying to use another protocol, like UDP, or another port, like 25, will be blocked by the firewall. With these rules in place many other features will not work.

 

 

 

To allow iCloud to function, Apple has a list of ports which need to be allowed for iCloud to function on your client devices. The ports used by iCloud are:

 

TCP 25

TCP 80

TCP 443

TCP 587

TCP 993

TCP 5223

To allow the connection on these ports, use the following configuration.

Figure 2. iCloud firewall config.

Screenshot showing the outbound firewall rules.

Once the connections are allowed, iCloud will function and users will be able to back up their devices or pull information they have stored in iCloud.

  • Was this article helpful?