
Find out which hosts and ports are required to use your Apple products on enterprise networks.
This article is intended for enterprise and education network administrators.
Apple products require access to the internet hosts listed in this article for a variety of services. Here's how your devices connect to hosts and work with proxies:
Network connections to the hosts below are initiated by the device, not by hosts operated by Apple.
Apple services will fail any connection that uses HTTPS Interception (SSL Inspection). If the HTTPS traffic traverses a web proxy, disable HTTPS Interception for the hosts listed in this article.
Make sure your Apple devices can access the hosts listed below.
Apple Push Notifications
Find out how to troubleshoot connecting to the Apple Push Notification service (APNs). For devices that send all traffic through an HTTP proxy, you can configure the proxy either manually on the device or with Mobile Device Management (MDM). Devices can connect to APNs when configured to use the HTTP proxy with a proxy auto-config (PAC) file.
Use Apple products on enterprise networks

Device setup
Apple devices need access to the following hosts during the setup process, or when installing, updating or restoring the operating system.
Hosts | Ports | Protocol | OS | Description | Supports proxies |
443 | TCP | iOS, iPadOS, tvOS and macOS | Device activation | Yes | |
443, 80 | TCP | iOS, iPadOS, tvOS and macOS | Internet connectivity validation for networks that use captive portals | Yes | |
443 | TCP | iOS, iPadOS, tvOS and macOS |
| Yes | |
443 | TCP | iOS, iPadOS, tvOS and macOS |
| Yes | |
443, 80 | TCP | iOS, iPadOS, tvOS and macOS |
| Yes | |
443 | TCP | iOS and iPadOS | eSIM activation | — | |
443 | TCP | iOS, iPadOS, tvOS and macOS |
| Yes | |
123 | UDP | iOS, iPadOS and tvOS | Used by devices to set their date and time | — | |
123 | UDP | iOS, iPadOS, tvOS and macOS | Used by devices to set their date and time | — | |
123 | UDP | macOS only | Used by devices to set their date and time | — |

Device management
Apple devices enrolled in MDM need access to the following hosts and domains.
Hosts | Ports | Protocol | OS | Description | Supports proxies |
443, 80, 5223, 2197 | TCP | iOS, iPadOS, tvOS and macOS | Push notifications | ||
443 | TCP | iOS, iPadOS, tvOS and macOS | DEP provisional enrolment | — | |
443 | TCP | iOS, iPadOS, tvOS and macOS |
| — | |
443 | TCP | iOS, iPadOS, tvOS and macOS | Used by an MDM server to identify which software updates are available for devices that use managed software updates | Yes | |
443 | TCP | iOS, iPadOS, tvOS and macOS | APNs certificate request portal | Yes | |
443 | TCP | iOS, iPadOS, tvOS and macOS | Hosts enrolment profiles used when devices enrol in Apple School Manager or Apple Business Manager through Device Enrolment | Yes | |
443 | TCP | iOS, iPadOS, tvOS and macOS | MDM servers to upload enrolment profiles used by clients enrolling through Device Enrolment in Apple School Manager or Apple Business Manager, and to look up devices and accounts | Yes | |
443 | TCP | iOS and iPadOS | Required to log in with a Managed Apple ID on Shared iPad | — | |
443 | TCP | iOS, iPadOS, tvOS and macOS | MDM servers to perform operations related to Apps and Books, like assigning or revoking licences on a device | Yes |

Apple Business Manager and Apple School Manager
Administrators and managers need access to the following hosts and domains in order to administer and manage Apple Business Manager and Apple School Manager.
Hosts | Ports | Protocol | OS | Description | Supports proxies |
443, 80 | TCP | - | Apple Business Manager | — | |
443, 80 | TCP | - | Apple School Manager | — | |
443 | TCP | - | Login authentication | Yes | |
443 | TCP | - | Login authentication | Yes | |
443, 80 | TCP | - | Apps and Books | Yes | |
443 | TCP | - | Apps and Books | — | |
443 | TCP | - | Apps and Books (ABM) | — | |
443 | TCP | - | Apps and Books (ASM) | — | |
443 | TCP | - | Device icons | — | |
443 | TCP | - | Validating tax-exempt status | — | |
443 | TCP | - | Fonts for certain languages | — | |
22 | SSH | - | SFTP uploads | Yes |
Employees and students using Managed Apple IDs need access to the following host in order to look up others in their business or school when composing messages or sharing documents.
Hosts | Ports | Protocol | OS | Description | Supports proxies |
443, 80 | TCP | iOS, iPadOS and macOS | User lookup service | — |

Administrators and devices managed by Apple Business Essentials need access to the following hosts and domains, along with those listed above for Apple Business Manager.
Hosts | Ports | Protocol | OS | Description | Supports proxies |
443 | TCP | iOS, iPadOS, tvOS and macOS | DEP enrolment server | — | |
443 | TCP | iOS, iPadOS, tvOS and macOS | MDM server | — | |
443 | TCP | iOS, iPadOS, tvOS and macOS | SCEP server | — | |
443 | TCP | iOS, iPadOS and macOS | View and manage apps and devices | — | |
443 | TCP | iOS and iPadOS | View the location of devices in Managed Lost Mode | — | |
443 | TCP | macOS | Custom Package icons | — |

Classroom and Classwork
Student and Teacher devices using the Classroom or Classwork apps need access to the following hosts, as well as those listed in the Apple ID and iCloud sections below.
Hosts | Ports | Protocol | OS | Description | Supports proxies |
443 | TCP | iPadOS and macOS | Classroom and Classwork device verification | — | |
443 | TCP | iPadOS and macOS | Classroom and Classwork device verification | — | |
443 | TCP | iPadOS and macOS | Classroom and Classwork class roster service | — | |
443 | TCP | iPadOS and macOS | Classroom and Classwork class roster service | — | |
443 | TCP | iPadOS | Classwork handout service | — | |
443 | TCP | iPadOS | Classwork handout service | — | |
443 | TCP | iPadOS | Classwork handout service | — |

Software updates
Make sure that you can access the following ports for updating macOS, updating apps from the Mac App Store and for using content caching.
macOS, iOS, iPadOS, watchOS and tvOS
Apple devices need access to the following hosts when installing, restoring and updating iOS, iPadOS, macOS, watchOS and tvOS.
Hosts | Ports | Protocol | OS | Description | Supports proxies |
80 | TCP | iOS, iPadOS and watchOS | iOS, iPadOS and watchOS updates | — | |
443 | TCP | macOS only | Rosetta 2 updates | — | |
443 | TCP | iOS, iPadOS, tvOS, watchOS and macOS | Software update catalogue | — | |
443, 80 | TCP | iOS, iPadOS, tvOS, watchOS and macOS | iOS, iPadOS, tvOS, watchOS and macOS updates | Yes | |
443, 80 | TCP | iOS, iPadOS, tvOS, watchOS and macOS | iOS, iPadOS, tvOS, watchOS and macOS updates | Yes | |
443 | TCP | macOS only | macOS updates | Yes | |
443, 80 | TCP | iOS, iPadOS, tvOS, watchOS and macOS | Hosts software update catalogues | — | |
443 | TCP | iOS, iPadOS and watchOS |
| Yes | |
443, 80 | TCP | macOS only | macOS Recovery | — | |
443, 80 | TCP | macOS only | macOS Recovery | — | |
443 | TCP | macOS only | macOS updates | — | |
443, 80 | TCP | macOS only | macOS updates | — | |
443 | TCP | macOS only | macOS updates | — | |
443, 80 | TCP | macOS only | macOS updates | Yes | |
443 | TCP | macOS only | macOS updates | — | |
80 | TCP | iOS, iPadOS, tvOS and macOS | Software update downloads | — | |
443 | TCP | iOS, iPadOS, tvOS and macOS | Software update downloads | — | |
443 | TCP | iOS, iPadOS, tvOS and macOS |
| Yes |

App Store
Apple devices need access to the following hosts and domains for installing and updating apps.
Hosts | Ports | Protocol | OS | Description | Supports proxies |
443, 80 | TCP | iOS, iPadOS, tvOS and macOS | Store content, such as apps, books and music | Yes | |
443 | TCP | iOS, iPadOS, tvOS and macOS | Store content, such as apps, books and music | Yes | |
443 | TCP | iOS, iPadOS, tvOS and macOS | Store content, such as apps, books and music | — | |
443, 80 | TCP | iOS, iPadOS, tvOS and macOS |
| Yes | |
443 | TCP | iOS, iPadOS, tvOS and macOS | Enterprise App validation | — |

Network provider updates
Mobile devices need access to the following hosts to install provider bundle updates.
Hosts | Ports | Protocol | OS | Description | Supports proxies |
80 | TCP | iOS and iPadOS | Mobile network provider bundle updates | — | |
80 | TCP | iOS and iPadOS | Mobile network provider bundle updates | — | |
80 | TCP | iOS and iPadOS | Network provider bundle update discovery | — | |
443 | TCP | iOS and iPadOS | Network provider bundle update discovery | — | |
80 | TCP | iOS and iPadOS | Mobile network provider bundle updates | — | |
443 | TCP | iOS and iPadOS | Mobile network provider bundle updates | — |

Content caching
A Mac that provides content caching needs access to the following hosts, as well as the hosts listed in this document that provide Apple content, such as software updates, apps and additional content.
Hosts | Ports | Protocol | OS | Description | Supports proxies |
443 | TCP | macOS only | Server registration | Yes | |
80 | TCP | macOS only | Configuration | — | |
443 | TCP | macOS only | Reporting | Yes |
Clients of macOS content caching need access to the following hosts.
Hosts | Ports | Protocol | OS | Description | Supports proxies |
443 | TCP | iOS, iPadOS, tvOS and macOS | Content caching locator service | — | |
443 | TCP | macOS only | Content caching client public IP determination | — |

App features
Apple devices may need access to the following hosts to use certain app features.
App notarisation is required for apps to run on macOS 10.14 and later. Gatekeeper requires access to Apple servers to verify notarisation, unless the app developer has stapled the notarisation ticket to the app. App developers can find out more about customising the notarisation workflow.
App validation is used to certify that a valid instance of the app is running. App developers can find out more about establishing an app‘s integrity.
Hosts | Ports | Protocol | OS | Description | Supports proxies |
443 | TCP | macOS | App notarisation | — | |
443 | TCP | iOS, iPadOS and macOS | App validation, Touch ID and Face ID authentication for websites | — |

Beta updates
Apple devices need access to the following hosts to sign in to Beta Updates and report feedback using the Feedback Assistant app.
Hosts | Port | Protocol | OS | Description | Supports proxies |
443 | TCP | iOS, iPadOS, tvOS, watchOS and macOS | Beta update enrolment | Yes | |
443 | TCP | iOS, iPadOS, tvOS and macOS | Used by Feedback Assistant to upload files | Yes | |
443 | TCP | iOS, iPadOS, tvOS and macOS | Used by Feedback Assistant to file and view feedback | Yes |

Apple diagnostics
Apple devices may access the following host in order to perform diagnostics used to detect a possible hardware issue.
Hosts | Ports | Protocol | OS | Description | Supports proxies |
443 | TCP | iOS, iPadOS, tvOS and macOS | Used by Apple devices to help detect possible hardware issues | Yes |

Domain Name System resolution
Encrypted Domain Name System (DNS) resolution in iOS 14, iPadOS 14, tvOS 14, and macOS Big Sur and later uses the following host.
Hosts | Ports | Protocol | OS | Description | Supports proxies |
443 | TCP | iOS, iPadOS, tvOS and macOS | Used for DNS over HTTPS (DoH) | Yes |

Certificate validation
Apple devices must be able to connect to the following hosts to validate digital certificates used by the hosts listed in this article.
Hosts | Ports | Protocol | OS | Description | Supports proxies |
80, 443 | TCP | iOS, iPadOS, tvOS and macOS | Certificate validation | — | |
80 | TCP | iOS, iPadOS, tvOS and macOS | Certificate validation | — | |
80 | TCP | iOS, iPadOS, tvOS and macOS | Certificate validation | — | |
80 | TCP | iOS, iPadOS, tvOS and macOS | Certificate validation | — | |
80 | TCP | iOS, iPadOS, tvOS and macOS | Certificate validation | — | |
80 | TCP | iOS, iPadOS, tvOS and macOS | Certificate validation | — | |
80 | TCP | iOS, iPadOS, tvOS and macOS | Certificate validation in China mainland | — | |
80 | TCP | iOS, iPadOS, tvOS and macOS | Certificate validation | — | |
80 | TCP | iOS, iPadOS, tvOS and macOS | Certificate validation | — | |
443 | TCP | iOS, iPadOS, tvOS and macOS | Certificate validation | — | |
443 | TCP | iOS, iPadOS, tvOS and macOS | Certificate validation | Yes |

Apple ID
Apple devices must be able to connect to the following hosts in order to authenticate an Apple ID. This is required for all services that use an Apple ID, such as iCloud, app installation and Xcode.
Hosts | Ports | Protocol | OS | Description | Supports proxies |
443 | TCP | iOS, iPadOS, tvOS and macOS | Apple ID authentication in Settings and System Preferences | Yes | |
443 | TCP | iOS, iPadOS, tvOS and macOS | Apple ID authentication in Settings and System Preferences | Yes | |
443 | TCP | iOS, iPadOS, tvOS and macOS | Apple ID authentication | Yes | |
443 | TCP | iOS, iPadOS, tvOS and macOS | Apple ID authentication | Yes |

iCloud
In addition to the Apple ID hosts listed above, Apple devices must be able to connect to hosts in the following domains to use iCloud services.
Hosts | Ports | Protocol | OS | Description | Supports proxies |
443 | TCP | iOS, iPadOS, tvOS and macOS | iCloud services | — | |
443 | TCP | iOS, iPadOS, tvOS and macOS | iCloud services | — | |
443 | TCP | iOS, iPadOS, tvOS and macOS | iCloud services in China mainland | — | |
443 | TCP | iOS, iPadOS, tvOS and macOS | iCloud services | — | |
443 | TCP | iOS, iPadOS, tvOS and macOS | iCloud services | — | |
443 | TCP | iOS, iPadOS, tvOS and macOS | iCloud services | — | |
443 | TCP | iOS, iPadOS, tvOS and macOS | iCloud services in China mainland | — | |
443 | TCP | iOS, iPadOS, tvOS and macOS | iCloud services | — | |
443 | TCP | iOS, iPadOS, tvOS and macOS | iCloud services | — | |
443 | TCP | iOS, iPadOS, tvOS and macOS | iWork documents | — | |
443 | UDP | iOS, iPadOS, macOS | iCloud Private Relay | — | |
443 | TCP | iOS, iPadOS, macOS | iCloud Private Relay | — | |
443 | TCP | iOS, iPadOS, macOS | iCloud Private Relay | Yes |

Siri and Search
Apple devices must be able to connect to the following hosts to process Siri requests, including dictation and searching in Apple apps.
Hosts | Ports | Protocol | OS | Description | Supports proxies |
443 | TCP | iOS, iPadOS and macOS | Siri and dictation requests | — | |
443 | TCP | iOS, iPadOS and macOS | Search services, including Siri, Spotlight, Lookup, Safari, News, Messages and Music | — |

Associated Domains
Apple devices must be able to connect to the following hosts to use Associated Domains in iOS 14, iPadOS 14, and macOS Big Sur and later. Associated Domains underpin universal links, a feature that allows an app to present content in place of all or part of its website. Handoff, App Clips and single sign-on extensions all use Associated Domains.
Hosts | Ports | Protocol | OS | Description | Supports proxies |
443 | TCP, UDP | iOS, iPadOS and macOS | Associated domains for universal links | — | |
443 | TCP, UDP | iOS, iPadOS and macOS | Associated domains for universal links | — |
Tap to Pay on iPhone
To use a payment app to accept contactless payments, an iPhone must be able to reach the following hosts.
Hosts | Ports | Protocol | OS | Description | Supports proxies |
443 | TCP, UDP | iOS | Tap to Pay on iPhone | Yes | |
443 | TCP | iOS | Tap to Pay on iPhone setup | Yes | |
443 | TCP | iOS | Optional analytics sharing | Yes |

Additional content
Apple devices must be able to connect to the following hosts to download additional content. Some additional content may also be hosted on third-party content distribution networks.
Hosts | Ports | Protocol | OS | Description | Supports proxies |
80, 443 | TCP | iOS, iPadOS and macOS | GarageBand downloadable content | — | |
80, 443 | TCP | macOS only | Xcode downloadable components | — | |
80, 443 | TCP | macOS only | Xcode downloadable components | — | |
443 | TCP | iPadOS and macOS | Swift Playgrounds | — | |
443 | TCP | iPadOS and macOS | Swift Playgrounds | — | |
80, 443 | TCP | tvOS only | Apple TV screen savers | — |

Firewalls
If your firewall supports using hostnames, you may be able to use most Apple services listed above by allowing outbound connections to *.apple.com. If your firewall can only be configured with IP addresses, allow outbound connections to 17.0.0.0/8. The entire 17.0.0.0/8 address block is assigned to Apple.

HTTP proxy
You can use Apple services through a proxy if you disable packet inspection and authentication for traffic to and from the listed hosts. Exceptions to this are noted above. Attempts to perform content inspection on encrypted communications between Apple devices and services will result in a dropped connection to preserve platform security and user privacy.

Content Distribution Networks and DNS Resolution
Some of the hosts listed in this article may have CNAME records in DNS instead of A or AAAA records. These CNAME records may refer to other CNAME records in a chain before ultimately resolving to an IP address. This DNS resolution allows Apple to provide fast and reliable content delivery to users in all regions and is transparent to devices and proxy servers. Apple doesn't publish a list of these CNAME records because they are subject to change. You shouldn't need to configure your firewall or proxy server to allow them as long as you don't block DNS lookups and allow access to the hosts and domains named above.
Recent changes
July 2023:
Removed the macOS version requirement for APN connectio
Comments