Install TURN Server
The Remote Access feature in BigFix Modern Client Management (MCM) enables administrators to securely connect to managed devices.
The Remote Access feature in BigFix Modern Client Management (MCM) enables administrators to securely connect to managed devices.
As of the MCM v3.6.0 release, BigFix supports Remote View capability only (viewing the device screen). Full Remote Access (interactive control) capability will be introduced in a future release.
To support reliable connectivity between the administrator’s browser and the managed device—especially when devices are behind NAT or restricted networks—a TURN (Traversal Using Relays around NAT) server is required. The TURN server relays traffic when a direct connection is not possible and plays a critical role in establishing WebRTC sessions.
Prerequisites
Before configuring the TURN server, ensure the following:
- MDM Server is installed and configured.
- A server is available running:
- RHEL 7 / 8 / 9
- Container runtime: Docker or Podman
- Container compose support (Docker Compose or Podman Compose)
-
The TURN (Coturn) service must be:
- Publicly reachable by both the browser (admin) and managed devices
- Accessible over configured ports (including media ports)
-
Network/firewall configuration:
- Port 3478 (TCP) – TURN/STUN
- Port 5349 (TLS/TCP) – Secure TURN (TURNS)
- Media port range (UDP) – for relayed media traffic (e.g., 49152–49252)
-
If using TLS:
-
Valid TLS certificate signed by a trusted Certificate Authority (CA)
-
Install and Configure TURN Server
Step 1: Navigate to TURN Installation
- Log in to the BigFix Console.
- Navigate to:
- Apps → Modern Client Management → Admin
- In the left panel, expand:
- Coturn Service
- Click on:
- Install
Step 2: Select Target Devices
Field: Target Device
- Click on the Select button.
- Choose the device where the TURN server should be installed.
Notes:
-
The TURN server can be installed only on supported environments:
- RHEL 7 / 8 / 9
- Docker or Podman installed
- Compose support available
Purpose:
- Defines the machine where the TURN service will be deployed.
- This machine should ideally have public network accessibility.
Step 3: Configure Server Details
Section: Server Configuration
Field: Server Address (Required)
- Enter the hostname or FQDN of the TURN server (e.g., turn.yourdomain.com).
Purpose:
- This address is used by devices and browsers to connect to the TURN server.
- Must be resolvable from both managed devices and admin browsers.
Field: External IP Address (Optional but Recommended)
- Enter the public IP address of the TURN server.
Purpose:
- Required when the configured Server Address does not resolve to the server’s public IP.
- Ensures correct routing of TURN traffic when NAT is involved.
Step 4: Configure Network and Ports
Section: Network & Ports
Field: Enable TCP/UDP Port
- Enable this option if TCP connectivity should be allowed.
- Default Port: 3478
Purpose:
- Enables TURN/STUN communication over TCP.
- Useful in restrictive networks where UDP may be blocked.
Field: Enable TLS (TURNS) Port (Optional but Recommended)
- Enable this option to allow secure TURN communication.
- Default Port: 5349
Purpose:
- Encrypts TURN traffic using TLS.
- Recommended for production environments.
Additional Fields (Visible when TLS is enabled):
Field: TLS Certificate (Required for TURNS)
- Upload a TLS certificate.
Purpose:
- Must be a certificate signed by a trusted Certificate Authority (CA).
- Used to establish secure communication.
Field: TLS Key (Required for TURNS)
- Upload the private key corresponding to the TLS certificate.
Purpose:
- Required for TLS handshake and encryption.
Field: Media Ports (Required)
- Specify a UDP port range:
- Min: 49152
- Max: 49252
Purpose:
- Used for relaying media/data between browser and device.
- Ensure this entire range is open in firewall settings.
Step 5: Configure Authentication
Section: Authentication
Field: Authentication Secret (Required)
- Enter a secure shared secret.
Purpose:
- Used to authenticate TURN clients (browser and device).
- Prevents unauthorized usage of the TURN server.
Step 6: Install TURN Server
- Review all configurations.
- Click Install.
Purpose:
- Deploys and configures the TURN (Coturn) server on selected devices.
- Enables relay-based connectivity required for Remote View sessions.
- Ensure the TURN server is publicly reachable on all configured ports.
- Prefer enabling TLS (TURNS) for secure environments.
- Use strong, non-guessable authentication secrets.
- Verify firewall rules for:
- 3478 (TCP)
- 5349 (TLS/TCP)
- Media port range (UDP)
- Deploy TURN server on infrastructure with:
- Stable public IP
- High bandwidth
- Low latency
Outcome
- The TURN server is available for Remote View sessions.
- Devices in restricted networks can connect via relay.
- The environment is prepared for future Remote View (Screen viewing) capability.