programming4us
           
 
 
Applications Server

Microsoft Lync Server 2010 : Planning for Deploying External Services - Firewall Configuration (part 2)

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
7/5/2013 8:31:32 PM

4. Publicly Routable Perimeter Network

One consideration when planning for Edge services is determining whether the perimeter network contains publicly routable IP addresses. A publicly routable address space is a set of public IP addresses that reach a server directly without any kind of network address translation (NAT). This means public IP addresses are bound directly to the Edge Server network interfaces.

Caution

Typically, this suggestion is met with a negative reaction from network security teams that are accustomed to using NAT to allow external access to any service. It is important to note that NAT is not a method of security. Instead, it is designed to accommodate a shortage of IPv4 addresses and although it might mask a server’s internal IP address as long as the external ports are available, NAT does not provide any extra security.


The reason for the publicly routable network requirement is because of how the A/V Edge role uses Interactive Connectivity Establishment (ICE), Session Traversal Utilities for NAT (STUN) and Traversal using Relay NAT (TURN) to facilitate media traffic between endpoints that might be masked by NAT, such as two users at home behind their own routers.

Without delving into too many of the technical details, this requirement comes from the fact that to make the media path work where clients cannot contact each other directly, they must have some middle ground where they can both send to. That middle ground is the public IP address space. Without following the publicly routable address requirements, the environment is susceptible to situations where media transfer follows a nonoptimal path or completely fails if clients cannot contact each other directly.

Note

It is also important to realize that placing Lync Server Edge Servers in a publicly routable address is not considered a security issue. This placement does not mean that firewall rules are bypassed or that the server becomes more of a risk. The appropriate rules should still be put in place to allow only the required protocols and services to each interface. The only difference is that the IP addressing used is part of the public address space instead of a privately addressable space.


When Office Communications Server 2007 was released, it was a requirement to have a publicly routable address space for the external A/V Edge Server interface. In Office Communications Server 2007 R2, support was added for using NAT on the A/V Edge Server interface, but NAT could be used only in a scenario with a single A/V Edge Server. If high availability for redundancy was required, using a publicly routable address space was again required.

Lync Edge Servers have the same limitation as Office Communications Server 2007 R2. If a single Edge Server is used, the A/V Edge Server can use an IP address translated by NAT, but if multiple Edge Servers are hardware load-balanced, each A/V Edge Server requires a publicly routable IP address bound to its interface. The only exception to this rule is if DNS load-balancing is used, NAT can be used for all external interfaces.

The Access Edge and Web Conferencing Edge Server roles have never required a public IP address bound directly to their interfaces, but following the same approach selected for the A/V Edge generally makes the deployment simpler. In other words, use private IP addresses and NAT if using NAT for the A/V Edge interface, but if using public IP addresses for the A/V Edge interface, do the same for the Access Edge and Web Conferencing Edge interfaces.

Note

When discussing NAT, the conversation usually centers around the external IP addresses of an Edge Server. Keep in mind that the internal-facing adapter on the Edge must be routable from the internal network. Unlike the external interfaces, it cannot be translated by NAT through a firewall under any circumstance. It can be a private address, but must be completely routable from all server and client subnets without address translation.


5. Firewall Rules

This section provides a comprehensive list of the firewall rules involved in Edge Server deployments and what features require each of the ports. It also discusses which direction the connections take so that the appropriate ports can be opened inbound or outbound. In some scenarios, the Edge Server initiates the outbound connection to external destinations.

Access Edge Server

The Access Edge Server is the core of any remote access. At a minimum, remote user access must be allowed to the Access Edge Server to support any kind of web conferencing or A/V traffic. Table 1 displays the firewall requirements for traffic between the Internet and the Access Edge Server IP addresses.

Table 1. Access Edge Firewall Rules
SourceDestinationDestination PortFunction
InternetAccess EdgeTCP 443Remote user access
InternetAccess EdgeTCP 5061Federation Public IM Connectivity
Access EdgeInternetTCP 5061Federation Public IM Connectivity

Web Conferencing Edge Server

The Web Conferencing Edge Server requires only a single port to be allowed inbound. Additionally, TCP 443 to the Access Edge must already be allowed to support authentication to the web conferences. Table 2 displays the firewall requirements for traffic between the Internet and Web Conferencing Edge Server IP addresses.

Table 2. Web Conferencing Edge Firewall Rules
SourceDestinationDestination PortFunction
InternetWeb Conferencing EdgeTCP 443Remote web conferencing

A/V Edge Server

The A/V Edge Server has the trickiest set of rules because it varies depending on business requirements. Minimally, to support audio and video traffic with external authenticated users, TCP 443 and UDP 3478 must be allowed inbound to the A/V Edge IP address.

If an organization wants to support A/V federation, the A/V Edge IP address must be allowed to initiate outbound connections to the partner organization. The destination port used by the A/V Edge for outbound federation connections is always within the TCP 50,000–59,999 range. This range is required only for outbound and not required to be opened inbound to support federation with Lync Server or Office Communications Server 2007 R2 organizations.

To support A/V federation to organizations running the original release of Office Communications Server 2007, there are some additional requirements. Both TCP and UDP ranges of 50,000–59,999 must be opened to and from the A/V Edge IP address. Table 3 displays the firewall requirements for traffic between the Internet and A/V Edge Server IP addresses.

Table 3. A/V Edge Firewall Rules
SourceDestinationDestination PortFunction
InternetA/V EdgeTCP 443 UDP 3478Remote user A/V
A/V EdgeInternetTCP 50,000–59,999 UDP 3478Federation A/V Legacy Federation A/V
InternetA/V EdgeTCP 50,000–59,999 UDP 50,000–59,999Legacy Federation A/V
A/V EdgeInternetUDP 50,000–59,999Legacy Federation A/V

Note

This large inbound port gave many network security and firewall administrators heart attacks when Office Communications Server 2007 R2 was first released. The Microsoft document “Designing Your Perimeter Network for Office Communications Server 2007 R2” addresses these concerns in detail and should be read before supporting legacy A/V federation. The executive summary version of the security details is that the ports are not actively open on an Edge Server until a user has authenticated and retrieved a media encryption key over an SSL channel. The ports are randomly chosen and opened only during a call. After reviewing the technical details, many organizations allowed the port range.


Internal Edge Interface

The last set of firewall rules to account for are the ports used by the internal adapter of the Edge Server. TCP 5061 should be allowed from the Edge to the next-hop address to support remote access, federation, and public IM connectivity.

Tip

If a Director pool is used as the next hop, it should be used in the rule. If not, each Front-End pool should be configured to reach the internal Edge IP address.


The ports used for signaling are easy to understand, but one detail that might cause confusion is the source IP address to support web conferencing and A/V traffic: It must be allowed from any internal IP address, not just a specific server. Internal endpoints and users contact these ports on the internal Edge Server adapter directly. The server with the Central Management Store should also be allowed to reach the internal Edge adapter on TCP 4443 to push any configuration updates. Wherever referenced in Table 4, Edge Server refers to the internal-facing adapter of the Edge Server.

Table 4. Internal Edge Interface Firewall Rules
SourceDestinationDestination PortFunction
Edge ServerFront-End Pool/Servers Director Pool/ServersTCP 5061Remote access

Federation

Public IM Connectivity
Front-End Pool/Server Director Pool/ServersEdge ServerTCP 5061Remote access

Federation

Public IM Connectivity
Any internal IP addressEdge ServerTCP 8057Web conferencing
Any internal IP addressEdge ServerTCP 5062

TCP 443

UDP 3478
A/V authentication

STUN

STUN
Front-End Pool/ServerEdge ServerTCP 4443CMS configuration

Figure 5 summarizes all of the rules discussed in the section.

Figure 5. Edge Server Firewall Rules
Other -----------------
- Microsoft Lync Server 2010 : Planning for Deploying External Services - Edge Server Considerations
- Microsoft Dynamic GP 2010 : Receivables Management (part 4) - Sales e-mail settings, Customers
- Microsoft Dynamic GP 2010 : Receivables Management (part 3) - Customer classes
- Microsoft Dynamic GP 2010 : Receivables Management (part 2) - Receivables Setup Options, Sales Territories, Salespeople
- Microsoft Dynamic GP 2010 : Receivables Management (part 1) - Receivables Management Setup
- Microsoft Dynamic GP 2010 : Payables Management (part 3) - Purchasing E-mail setup, Vendors
- Microsoft Dynamic GP 2010 : Payables Management (part 2) - Payables Setup Options, Vendor classes
- Microsoft Dynamic GP 2010 : Payables Management (part 1) - Payables Management Setup
- Microsoft Dynamic GP 2010 : Bank Reconciliation
- Microsoft Dynamic GP 2010 : General Ledger
- Using Non-Windows Systems to Access Exchange Server 2007 : Mac OS X Mail
- Using Non-Windows Systems to Access Exchange Server 2007 : Outlook Express
- Using Non-Windows Systems to Access Exchange Server 2007 : Understanding Non-Windows–Based Mail Client Options
- Microsoft Dynamics AX 2009 : The Application Integration Framework (part 8) - Consuming Web Services from Dynamics AX
- Microsoft Dynamics AX 2009 : The Application Integration Framework (part 7) - Sending One-Way Requests from Dynamics AX
- Microsoft Dynamics AX 2009 : The Application Integration Framework (part 6) - Working with Document Services - Consuming Dynamics AX Services
- Microsoft Dynamics AX 2009 : The Application Integration Framework (part 5) - Working with Document Services - Publishing Dynamics AX Services, Configuring Dynamics AX Services
- Microsoft Dynamics AX 2009 : The Application Integration Framework (part 4) - Working with Document Services - Customizing Document Services
- Microsoft Dynamics AX 2009 : The Application Integration Framework (part 3) - Working with Custom Services
- Microsoft Dynamics AX 2009 : The Application Integration Framework (part 2) - Components of Dynamics AX Services
 
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
programming4us programming4us