111
Secure Remote Access & Lync Ilse Van Criekinge http://blogs.technet.com/ilvancri @ivcrieki

Secure Remote Access & Lync Ilse Van Criekinge @ivcrieki

Embed Size (px)

Citation preview

Page 1: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

Secure Remote Access & LyncIlse Van Criekingehttp://blogs.technet.com/ilvancri@ivcrieki

Page 2: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

Session Objectives and Takeaways

• Session Objectives • Overview of typical Lync Server Edge configurations• DNS Load Balancing and Hardware Load Balancing• NAT support for Edge Deployment• Reverse Proxy• ICE

• Takeaways• Understand typical Edge planning and deployment process• Understand certificate requirements for Edge and Reverse

Proxy

2

Page 3: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

Introduction

3

Page 4: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

Conferencing Capabilities of Lync

Web Conferencing

Audio Conferencing

Video Conferencing

Instant Messaging

Conferencing

PSTN Conferencing

ACP Integration

Integration with third-

party A/V SIP endpoints and MCUs

Page 5: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

Dial-In Conferencing

Conferencing Attendant

Application

Conferencing Announcing Application

Dial-in Conferencing

Web Page

Mediation Servers and Gateways or

PBX

Page 6: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

Simple URLs

• Lync Server 2010• Meet• Dial-in• Admin

• Scope = Global & Site• Created using PowerShell or Topology Builder

Page 7: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

Edge Server Role

Page 8: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

Lync Server Edge scenarios

• External User Access• Lync clients can transparently connect to the Lync Server

deployment over the public Internet• PIC• Connecting with public IM providers

• Federation• Federation with other Enterprises• IM&P only, or• All modalities A/V and Application Sharing

Page 9: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

Edge Server Role Requirements

• General Requirements• 64-bit Windows 2008, Windows 2008 R2• Microsoft .NET Framework 3.5 SP1• Windows PowerShell v2

• Cannot be collocated with any other Microsoft Lync Server role• Virtualization is supported (Windows 2008 R2 OS!)

Server role Physical Virtual

CPU Memory Number of users supported

CPU Memory Number of users supported

Edge Server

8 cores 16 GB 15,000 4 cores 5 GB 7,500

Page 10: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

Edge Server Roles

• Access Edge = handles all SIP traffic crossing the corporate firewall

• Web Conferencing Edge = proxies PSOM (Persistant Shared Object Model) traffic between the Web Conferencing Server and external clients

• Audio/Video Edge = provides a single trusted connection point through which audio and video traffic enters and exits your network

Page 11: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

1 IP, 2 IP, 3 IP, 4 IP, ... ?Edge Server Role

Page 12: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

A Few Networking Lync Facts

• Lync Server 2010 supports only IPv4• It does niet support IPv6• Can function in a network with dual IP stack enabled

• Two network adapters for each Edge Server are required:• one for the internal-facing interface • one for the external-facing interface

• Important: The internal and external subnets must not be routable to each other.

Page 13: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

Single IP address Edge

Edge ServerExternal

edge.contoso.com131.107.155.10

SIP: 5061 Web Conf: 444A/V Conf: 443, 3478

Internal

edge-int.contoso.com172.25.33.10

SIP: 5061 Web Conf: 8057A/V Conf: 443, 3478

Page 14: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

Multiple IP address Edge

Edge Server

External SIP

access.contoso.com131.107.155.10 443, 5061

Internal

edge-int.contoso.com172.25.33.10

SIP: 5061 Web Conf: 8057A/V Conf: 443, 3478

External Web Conf

External AV

webcon.contoso.com131.107.155.20 443

av.contoso.com131.107.155.30 443, 3478

Page 15: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

Edge using NAT IP addresses

Edge Server

External SIP

IP1

IntExternal Web Conf

External AV

NATIP2

IP3

Public IP space

IP2’

IP1’

IP3’

Client

Clients connect to IP for A/V traffic

Translated AV IP mustbe configured in LyncServer

Lync Server does not needto know translated SIP andWeb Conf IP

Page 16: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

DNS Load Balanced Edge

Edge Server 1

IP1

IntIP2

IP3

Public IP space

Client

Client can retrieve and handle multiple IPaddresses and can fail overDNS server returns randomized IP address

DNS A records access.contoso.com IP1 and IP4webcon.contoso.com IP2 and IP5av.contoso.com IP3 and IP6

Edge Server 2

IP4

IntIP5

IP6

Page 17: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

DNS Load Balanced Edge using NAT

Edge Server 1

IP1

IntIP2

IP3

Public IP spaceDNS A records access.contoso.com IP1’ and IP4’webcon.contoso.com IP2’ and IP5’av.contoso.com IP3’ and IP6’

Edge Server 2

IP4

IntIP5

IP6

NAT

IP1’

IP2’

IP3’

IP4’

IP5’

IP6’

Translated AV IP addresses mustbe configured in Lync Server individuallyIP3 to IP3’IP6 to IP6’

Page 18: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

Hardware Load Balanced Edge

Edge Server 1

IP1

IntIP2

IP3

Public IP spaceDNS A records access.contoso.com VIP1webcon.contoso.com VIP2av.contoso.com VIP3

Edge Server 2

IP4

IntIP5

IP6

HLB

VIP1

VIP2

VIP3Initial AV connection requires will land on VIP and gets forwarded. However clients will connect to Edge directly (UDP)TCP traffic continues to use VIP

NAT and HLB is not possible

Page 19: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

INSTALLATIONEdge Server Role

Page 20: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 21: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 22: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 23: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 24: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 25: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 26: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 27: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 28: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 29: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 30: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 31: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 32: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 33: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 34: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 35: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 36: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 37: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 38: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 39: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 40: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 41: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 42: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 43: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 44: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 45: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 46: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 47: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 48: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 49: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 50: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 51: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

CERTIFICATE REQUIREMENTSEdge Server Role

Page 52: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

Certificate Requirements Edge Server Role

• A single public certificate is supported in Lync for• Access Edge external interface• Web conferencing Edge external interface• A/V Authentication Edge internal interface

• Edge internal interface • Can be issued by an internal CA• Subject name is typically the Edge internal interface FQDN or

HWLB VIP• No subject alternative names required

Page 53: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

Requirements External Certificate

• Issued by an approved public CA (http://go.microsoft.com/fwlink/?LinkId=202834)

• If Edge pool, same cert on every Edge, must be exportable• Subject Name = Access Edge FQDN or HWLB VIP(Not required,

but recommended (previous versions) )• Subject Alternative Names• Access Edge external interface or HWLB VIP• Web Conferencing Edge external interface or HWLB VIP• Any SIP doman FQDN (for auto-discovery, federation)

Page 54: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 55: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 56: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 57: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 58: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 59: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 60: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 61: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 62: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 63: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 64: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

DNS REQUIREMENTSEdge Server Role

Page 65: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

DNS Requirements

• DNS Entries• External DNS lookups by remote users and federated

partners• Entries for DNS lookups for use by the Edge Servers within

the perimeter network• Internal DNS entries for lookups by the internal clients and

servers running Lync Server 2010• Edge Server requires DNS Suffix

Page 66: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

Need client auto

configuration?

Default SIP domain FQDN = AD domain

FQDN

Use GPOs or configure clients manually

You are not using split-brain DNSInternal DNS

_sipinternaltls._tcp.<sip domain> sip. <sip domain>

External DNS_sip._tls. <sip domain>

You are using split-brain DNSInternal DNS

_sipinternaltls._tcp.<sip domain>External DNS

_sip._tls. <sip domain>

YES

YES

NO

NO

Page 67: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

Is Federation required?

Internal DNSA Record internal interface

External DNSA Record external interfaces

External DNS_sipfederationtls._tcp.<sip domain>

NO

YES

Page 68: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

DNS Records for External Devices

Type Value Note

SRVEdge Server:_sipexternal._tls.<SIP domain>, and _sipexternaltls.<SIP domain>

Allows external devices to connect by using SIP over TLS to the Registrar internally.

A Reverse proxy FQDN:<server name>.<SIP domain>

Allows external devices to connect by using TLS over HTTP to the Device Update Web service.

Page 69: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

REVERSE PROXY & DIRECTOREdge Server Role

Page 70: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

Reverse Proxy and Director

Internal Network

Director

Remote ClientsFederated ClientsAnonymous Clients

Front End

Perimeter NetworkInternet

Edge Server

Reverse Proxy

Page 71: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

Reverse Proxy and external access (1)

• Forwards External HTTPS and HTTP traffic to Front End and Director Pool

• External user access to:• Meeting content for meetings (HTTPS)• Expand and display of distribution groups (HTTPS)• Downloadable files from the Address Book Service (HTTPS)• The Lync Web App client (HTTPS)• The Dial-In Conferencing Settings web page (HTTPS)• Location Information Service (HTTPS)• Device Update Service and obtain updates (HTTP)

Page 72: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

Reverse Proxy and external access (2)

• Simple URL forward to Director (recommended)• Forwarding rule for Simple URL to a single Director (or Pool); port 443• Reverse Proxy certificate’s SAN to contain base FQDN of each Simple

URL

• Web External Pool traffic forwarded to pools by Reverse Proxy• Reverse Proxy requires a forwarding rule each Web External FQDN

(Front End Pool and Director); port 443• If external Phone Devices are implemented, Reverse Proxy rule for

port 80 is required • Reverse Proxy certificate’s SAN to contain base FQDN of all configured

Web external Pools (Front End Pool and Director)

Page 73: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

RECAP DNS VS HW LOAD BALANCINGEdge Server Role

Page 74: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

DNS vs. Hardware Load Balancing

DNS LB HLB

Public IP addresses required

Each Server x 3 (Each Server+1 VIP) x 3

Failover Support No, Delayed Failover* for:• Exchange UM (remote

user)• PIC• Federation of older

version of OCS

Yes, instant Failover for:• Exchange UM (remote

user)• PIC• Federation of older

version of OCS

NATing of IP addresses (Edge Server)

Supported Not supported

* Delayed Failover: DNS TTL period

Page 75: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

XMPPEdge Server Role

Page 76: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

Extensible Messaging and Presence Protocol (XMPP) Gateway

• Features provided• Add and delete each other as contacts• Publish Presence and subscribe for each other’s Presence• Engage in one-to-one conversations

• Three scenarios• Public federation with hosted network• Federation between two organizations• On-premises deployment with Jabber

Page 77: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

SIP/MTLS:5061

XMPP Gateway

Page 78: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

MANAGE & CONTROL REMOTE ACCESSEdge Server Role

Page 79: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

Manage & Control Remote Access

• To support external user access, you must do both of the following:• Enable support for external user access to your organization• Configure and assign one or more policies to support

external user access• Policies• External user access policies• Conferencing policies

Page 80: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 81: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 82: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 83: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 84: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 85: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 86: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 87: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 88: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 89: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 90: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 91: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 92: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

CLIENT COMMUNICATIONSEdge Server Role

Page 93: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

IM And Presence Workload

Page 94: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

Step 1. Client resolves DNS SRV record _sip._tls.<sip-domain> to Edge Server

Page 95: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

Access Edge – SIP/TLS: 443

Step 2. Client connects to Edge Server

Page 96: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

Access Edge – SIP/TLS: 443

Step 3. . Edge Server proxies connection to Director

SIP/MTLS:5061

Page 97: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

Access Edge – SIP/TLS: 443

Step 4. Director authenticates user and proxies connection to user’s home pool

SIP/MTLS:5061 SIP/MTLS:5061

HTTPS: 443

HTTPS: 443

Page 98: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

Access Edge: SIP/TLS: 443 SIP/MTLS:5061 SIP/MTLS:5061

HTTPS: 443

HTTPS: 443

SIP/MTLS: 5061

Federated IM & Presence Workloads

Page 99: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

ESTABLISHING MEDIA PATHICE

Page 100: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

SDP, STUN, TURN, ICE

• Lync uses SDP to provide initialization parameters for media stream

• Add a Media Relay (aka A/V Edge Server)• STUN reflects NAT addresses • TURN relays media packets

• ICE exchanges candidates (cand) and determines optimal media path to assist media in traversing NATs without requiring the endpoints to be aware of their network topologies

• All three protocols based IETF standards

Page 101: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

ICE Details

• There are five phases for establishing a media path• During login• TURN Provisioning and Credentials

(MRAS – Media Relay Authentication Service)• When establishing a call• Address Discovery (Allocation) (Obtain Candidate List)• Address Exchange (SIP Invite/200 OK)• Connectivity Checks• Candidate Promotion

Page 102: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

In summary, to send media into the enterprise, the external user must be authenticated and have an authenticated internal user explicitly agree to

exchange media streams. Lync Server 2010 uses TCP 50,000-59,999 outbound. Lync Server 2010 federating with Office Communications Server 2007 partners continues to use the port range of 50,000 – 59,999 UDP/TCP. Federation involving Lync Server 2010 partners or Office Communications Server 2007 R2 partners will use 3478/UDP and 443/TCP, and TCP 50,000-

59,999 outbound

Page 103: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

Step 1. Inband Provisioning Process duing Lync Sign-In

Page 104: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 105: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

Step 2. Obtain Candidate List

Page 106: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki
Page 107: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

Step 3. Connectivity Checks

Page 108: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

Step 4. Candidate Promotion

Page 109: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

Stay up to date with TechNet Belux

Register for our newsletters and stay up to date:http://www.technet-newsletters.be

• Technical updates• Event announcements and registration• Top downloads

Join us on Facebookhttp://www.facebook.com/technetbehttp://www.facebook.com/technetbelux

LinkedIn: http://linkd.in/technetbelux/

Twitter: @technetbelux

Download MSDN/TechNet Desktop Gadget

http://bit.ly/msdntngadget

Page 110: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

TechDays 2011 On-Demand

• Watch this session on-demand via TechNet Edge http://technet.microsoft.com/fr-be/edge/

http://technet.microsoft.com/nl-be/edge/

• Download to your favorite MP3 or video player• Get access to slides and recommended resources by the speakers

Page 111: Secure Remote Access & Lync Ilse Van Criekinge  @ivcrieki

THANK [email protected]