tmg

Publishing Lync Server 2010 (RC) Simple URLs and Web Components with Forefront TMG 2010

In my first blog post around TMG 2010, I outlined the setup of TMG and configuration for publishing OCS 2007 R2 web components and then CWA services through that same server. Please reference that post for the basics around the network configuration for this TMG server, and I will cover configuring publishing rules for your Lync Server Simple URLs and web components in this post.

Intro Information

First, I assume you have configured simple urls and web services when deploying your topology, and now need to publish this externally.

My URL information is as follows:

Component URL IP Internal IP External Port on Front End Port on External/ISA
Web Services lyncweb.domain.com 10.117.117.9 xxx.39.27.152 8080 and 4443 80 and 443
Dialin Simple URL dialin.domain.com 10.117.117.9 xxx.39.27.152 8080 and 4443 443
Meet Simple URL meet.domain.com 10.117.117.9 xxx.39.27.152 8080 and 4443 443

First off, let me point out by saying that you can use a single external IP address for all three of these URLs, as they go to the same place. Also, if you open IIS manager on your front end server, you will notice there is an internal, and an external site, the internal listens on 80 and 443, and the external on 8080 and 4443. When proxying requests through TMG, you will be sending external clients to the external site, listening on 8080 and 4443.

image

Also, one not so commonly known fact is that the Meet simple URL is required to provide external access to meetings. You will notice when clicking on the link to Join Online Meeting in your outlook, it is directing you to your meet simple URL.

As far as certificates go, you must also have a certificate with the following names:

Common Name: lynecwebservicesexternalurl.domain.com

Subject Alt Name(s): meetsimpleurl.domain.com,dialinsimpleurl.domain.com

Import this certificate to the TMG server, and you can proceed with the following steps for configuration.

Another important thing regarding DNS:

If you have a separate internal domain name, you will need split brain DNS to get this working. You should already have split brain DNS configured to get your internal clients to work with auto signin.

For example, if your internal domain name is domain.local and your external is domain.com, your simple urls should be for the domain.com namespace, however you will need to resolve the domain.com simple URLs to the correct internal address.

Thanks to Adam in the comments for pointing this out and working through the issue with me. Check out this link for a great review on how this DNS
configuration works for the rest of the services:

http://blogs.technet.com/b/drrez/archive/2010/08/17/split-brain-domain-name-services-for-communications-server.aspx

Steps to Create Publishing Rule

While in the TMG or ISA management console, Right click on Firewall Policy and choose New->Web Site Publishing Rule

image

Enter a name for the rule like Lync Web

Follow the wizard with the following options:

Select Rule Action : Allow

Publishing Type: Publish a single web site or load balancer

Server Connectivity Security: Use SSL to connect to the published Web server or server farm

Internal publishing details:

Internal Site Name: FQDN of front end server 

If your internal server is a Standard Edition server, this FQDN is the Standard Edition server FQDN. If your internal server is an Enterprise pool, this FQDN is a hardware load balancer VIP that load balances the internal Web farm servers. The TMG Server must be able to resolve the FQDN to the IP address of the internal Web server. If the TMG Server is not able to resolve the FQDN to the proper IP address, you can select Use a computer name or IP address to connect to the published server, and then in the Computer name or IP address box, type the IP address of the internal Web server. If you do this, you must ensure that port 53 is open on the TMG Server and that it can reach an internal DNS server or a DNS server that resides in the perimeter network.

Path (optional): /*

Public Name Details:

Public Name: FQDN of external web services

Select Web Listener: Select New(This will open the new web listener wizard)

Web Listener Name: Anything you want, something like Lync Web Listener)

Client Connection Security: Require SSL secured connections with clients

Web Listener IP Address: Select External and then Select IP Address choose the appropriate IP address and add it to the listener

Listener SSL Certificates: Select Assign Certificate for Each IP Address, select the IP associated before, and choose your valid certificate.

Authentication Setting: No Authentication

Single Sign On Setting: Ignore, click Next

Complete the web listener wizard and choose Finish

Authentication Delegation: No Delegation, but client may authenticate directly

User Set: Ignore, click Next

Complete the rule configuration wizard and choose Finish. Then at the top hit Apply to save the configuration.

 

Once the rule is created, there are a couple important settings that need to be changed, this is really the only thing that makes the Lync setup different from OCS R2.

Open the newly created rule and modify the following settings.

On the To tab, ensure that the Forward the original host header instead of the actual one check box is checked.

.

image

On the Listener Tab, click to modify the properties of the web listener

Navigate to the Connections tab and enable port 80

image

On the Bridging tab, select to Redirect requests to SSL port and Redirect requests to HTTP port, enter 8080 and 4443 for your ports.

image

On the Public Name tab, add the Simple URLS to the list of allowed public names.

image

Once these changes have been made, Apply the configuration and you are done. To verify access, you can test the following URLs in Internet Explorer.

For address book server: https://externalwebservicesfqdn/abs

You should receive an HTTP challenge, because directory security on the ABS folder is configured for Windows Authentication by default.

For Web conferencing: Generate an online meeting request in Outlook, or a meet now request in Lync 2010, try joining the URL provided from external, it should be similar to this: https://meet.domain.com/rwintle/KG2K4HDM

For Group expansion: https://externalwebservicesfqdn/GroupExpansion/service.asmx 

For Dialin: https://dialinsimpleurl.domain.com

You should now have functioning simple URLs and web services which provide the following functionality:

  • Enabling external users to download meeting content for your meetings.
  • Enabling external users to expand distribution groups.
  • Enabling remote users to download files from the Address Book Service.
  • Accessing the Reach client
  • Accessing the dial-in Web page
  • Accessing the Location Information Service
  • Enabling external devices to connect to Device Update Service and obtain updates.

(2168)

Posted on by Randy Wintle in Communications Server 2010, Forefront TMG 2010, Lync, Lync RC, Reach Client, Simple URL, Threat Management Gateway, TMG, TMG 2010 67 Comments