Installing Lync Edge Server in Double Hop DMZ
Overview
Active Directory and Lync Standard
In this article I set the Edge server role in a DMZ separated by firewalls between the Front End All servers are installed with Windows Server 2008 R2 Service Pack 1, Lync Standard Server was configured with the domain sip home.com.br domain and Active Directory is named fqdn home.intranet
http://3.bp.blogspot.com/-CDX8ZYslWEY/TynFpp8sQLI/AAAAAAAAC7Q/ch2c18S9wwo/s640/topologia.jpg
The servers were configured as follows
Server Name |
Role |
IP Address |
hm01.home.intranet |
Domain Controller and Certificate Authority |
192.168.1.200 |
Hm02.home.intranet |
Lync Server Standard Edition |
192.168.1.201 |
Hm10.home.intranet | TMG 2010 / filter packets between the internal network and a DMZ | IP1: 192.168.1.250 / DMZ1: 172.16.0.250 |
HmRV.home.dmz | 2010 TMG configured with Reverse Proxy / filter packet between a DMZ and DMZ 2 | DMZ11: 172.16.0.254 / DMZ2: 10.0.0.251 |
hmEdge.home.dmz |
Lync Server Edge Server - not part of the field |
DMZ 1: 172.16.0.200 / DMZ 2: 10.0.0.200, 10.0.0.201, 10.0.0.202 |
Internet firewall | Firewall with NAT active | DMZ 2 10.0.0.254 Internet: 223.0.0.1, 223.0.0.2, 223.0.0.3, 223.0.0.4 |
The pool Lync Server has been updated with the Cumulative Pack 4 using the procedure of Article Update Lync Server Pool with Cumulative Update 4
On the domain controller was created a zone called home.com.br with records
Type of Record |
FQDN |
IP Address |
The |
admin.home.com.br |
192.168.1.201 |
The |
dialin.home.com.br |
192.168.1.201 |
The |
meet.home.com.br |
192.168.1.201 |
The |
Sip.home.com.br |
192.168.1.201 |
SRV |
Service: _sipinternaltls Protocol: tcp Port: 5061 |
Sip.home.com.br |
In the area of Active Directory home.intranet was created a record for the Edge server.
http://3.bp.blogspot.com/-Tq0KskoJp-4/TyWXFu02j_I/AAAAAAAAC0k/LmhhiVhuuD4/s320/edge01.png
The record type Address resolves the FQDN HmEdge.home.intranet to set ip on the board inside the server 172.16.0.200. In the Internet DNS records were created to serve the Edge Server:
Public URL |
IP |
Type of Record |
sip.home.com.br |
223.0.0.1 |
The |
WebConf.home.com.br |
223.0.0.2 |
The |
AV.home.com.br |
223.0.0.3 |
The |
_sip._tls.home.com.br | sip.home.com.br: 443 | SRV |
_sipfederationtls._tcp.home.com.br | sip.home.com.br: 5061 | SRV |
Internal Firewall
The internal firewall Hm10.home.intranet are running Forefront Threat Management Gateway (TMG) 2010 Service Pack 2 .
The following protocols and ports must be freed from the internal network and internal network adapter of the Edge server.
http://2.bp.blogspot.com/-_U8VYlMlAfA/TynF3qJqTjI/AAAAAAAAC7Y/RjMPUlKSqvc/s320/InstallEdge.jpg
Port |
Source Network |
Destination Network | Finalizadade |
4443/TCP |
Back End Server Role |
Edge Server Role | Port replication of Central Management Store for the Edge Server Local Store |
5062/TCP |
Front End Server Role |
Edge Server Role |
Traffic authentication session |
443/TCP |
Fron End Server Role / |
Fron End Server Role / Edge Server Role |
HTTPS traffic to be released in both directions between the Front End Server and Edge. |
3478/UDP | Fron End Server Role / Edge Server Role / Internal Network |
Fron End Server Role / Edge Server Role |
Port used by the Web Conference service. The traffic of this port should be released in both directions between the Front End Server and Edge. sessions Used for Audio and Video |
5061/TCP | Fron End Server Role / Edge Server Role |
Fron End Server Role / Edge Server Role |
Sip traffic safe, port should be released in both directions between the Front End Server and Edge |
8057/TCP | Front End Server | Edge Server | Port of customer sessions |
For this article I will demonstrate the rules that I set for release in TMG, I will demonstrate step by step each rule. I set up two network entities to the firewall.
*Internal - represents all the network's internal ip 192.168.1.0 to 192.168.1.255
Network DM | 1 - *represents all ip's network * a DMZ 172.16.0.0 to 172.16.0.255
*
http://4.bp.blogspot.com/-5tAlhSXBRhE/TyWqVJajZDI/AAAAAAAAC00/I7Np4roOj9k/s320/edge02.png
Between the two there is a network interface Route, this means that I have active NAT between the DMZ and internal network!
http://2.bp.blogspot.com/-nxEEYgH0IAM/TyWqViLx1ZI/AAAAAAAAC08/DL2WR1IYFBE/s320/edge03.png
The ip's are configured on ethernet of the firewall, the internal network card was not configured gateway address and network card connected to a DMZ was configured with the gateway 172.16.0.254 which is the second TMG configured as Reverse Proxy and performs routing and filter between the DMZ 1 and DMZ 2
http://1.bp.blogspot.com/--2PYerikp1E/TyWqWP4qyiI/AAAAAAAAC1E/hU-iXpZoQhg/s320/edge04.png
It was created two network objects:
*Front End / Back End
*http://1.bp.blogspot.com/-N-antHLmY2s/TyWr-jprD6I/AAAAAAAAC1M/oVeB6lSjdJk/s320/edge05.png
Edge Server
http://2.bp.blogspot.com/-c0GcJSg1eLY/TyWr_DWx7iI/AAAAAAAAC1U/OhEol9UAvko/s320/edge06.png
This object will be used to release the rules of doors between Lync Server Standard and the *Edge Server.
*Then were created the protocols, the TMG console tab Toolbox create a new protocol.
http://2.bp.blogspot.com/-qwEVEab7RUM/TyWxsX3NVXI/AAAAAAAAC1c/i2rUGjPNAOI/s320/edge07.png
We created three different protocols:
*MRAS Authentication
*
Port: 5062
Protocol: TCP
Direction:
*http://3.bp.blogspot.com/-O5R8f1BZcgQ/TyWxs0U1y_I/AAAAAAAAC1k/bwz5FmCc4mE/s320/edge08.png
*
*CMS Replica:
*
Port: 4443
Protocol: TCP
Direction: Outgoing
*http://2.bp.blogspot.com/-4nM7ApzdkPM/TynF7_RsmnI/AAAAAAAAC7g/EvU5CCWQ1lc/s320/edge56.png
*
*WebConf Traffic
*
Port: 8057
Protocol: TCP
Direction:
*http://4.bp.blogspot.com/-UydE2UBZE1o/TyWxuqC2RGI/AAAAAAAAC10/OCm51QNysUw/s320/edge10.png
*
*AV Traffic
*
Port: 3478
Protocol: UDP
Direction
*http://1.bp.blogspot.com/-fyW1R9Zq3C4/TyWxvP3305I/AAAAAAAAC18/HHRLVJJGqMU/s320/edge11.png
*
The protocols and objects created missing only create rules for releasing traffic. Access the guide Tasks in TMG management console and create a Create Access Rule.
http://1.bp.blogspot.com/-sX2dOzZ94uU/TyW1NnLMluI/AAAAAAAAC2g/i3ZxL8bC8KU/s1600/edge15.png
We created three access rules:
Rule 1: Access to the Internal Network Edge releasing the protocols HTTPS and AV Traffic to internal network clients to the server Edge Server
http://4.bp.blogspot.com/-ZYBOQZHrF4s/TyWxwJTGsVI/AAAAAAAAC2U/XXcq4Xwuzsc/s640/edge14.png
Rule 2: Communication Front End Edge Server releasing protocols HTTPS and SIPS AV Traffic in both directions of communication between the Standard and Lync Edge Server
http://1.bp.blogspot.com/-egaDLf83V1o/TyWxv4PlEYI/AAAAAAAAC2M/vE_RNC7aUPw/s640/edge13.png
Rule 3: *Access Front End releasing protocols * CMS Replica, MRAS WebConf Authentication and Traffic originating from the Lync Standard for Edge Server
http://4.bp.blogspot.com/-DU8cLw7jvPc/TyWxviIU0RI/AAAAAAAAC2E/gX_QFRGPkyA/s640/edge12.png
To facilitate testing of routing between the DMZ and an Internal Network created a rule allowing ping.
http://1.bp.blogspot.com/-plOUP1Xn3v4/TynHtS9BLEI/AAAAAAAAC7w/DGL-jmIodKo/s640/edge58.png
Configuring External Access Policy
To allow users to connect to the Edge Server need to change the policy for external access.
Log in Lync Management Console on page External User Access tab, click the Access Edge Configuration. Edit Default Policy and Global
http://3.bp.blogspot.com/-z6Rj4Dz9OWw/TyW6XZn77oI/AAAAAAAAC2o/Jqa-cEo6LfU/s320/edge16.png
Select Enable remote user access and save the changes
http://3.bp.blogspot.com/-CjarISGNzLA/TyW6X-8SzeI/AAAAAAAAC2w/doY0RIaO9Bk/s320/edge17.png
Creation of Pool Edge
To create the Edge Pool start the Topology Builder and select Download Topology from existing deployment.
http://4.bp.blogspot.com/-wSh2CR2Y4DI/TyXUkLZ_YpI/AAAAAAAAC3A/WsD5eeFINoM/s320/edge20.png
Select the folder Edge Pool and click New Edge pool ....
http://3.bp.blogspot.com/-mLPp18SMpuw/TyXUk7M0BXI/AAAAAAAAC3I/q4HPuxsJsm0/s320/edge21.png
The setup wizard Edge Pool starts, proceed to configure the service
http://1.bp.blogspot.com/-MnOulP_xwSg/TyXUlSzBV6I/AAAAAAAAC3Q/HvoROwIZwFM/s320/edge22.png
Select Single Computer pool and set the internal fqdn Edge Server in this case the name fqdn *HmEdge.home.intranet * (this record must be created manually in the DNS Active Directory Domain )
http://3.bp.blogspot.com/-UFoLwrssKHU/TyXUl5rHAdI/AAAAAAAAC3Y/hH2j1GJU0M4/s320/edge23.png
I set the Edge through a NAT, so I selected The external IP address of Edge this pool is translated by NAT
http://3.bp.blogspot.com/-hvwv4pwSCBE/TyXUmZuBayI/AAAAAAAAC3g/VHGEI0MTSV4/s320/edge24.png
Set up fqdn's will be used and the doors of each service
Sip.home.com.br 443
WebConf.home.com.br 443
AV.home.com.br 443
http://4.bp.blogspot.com/-i8IxqWwlGMA/TyXUmwuG2QI/AAAAAAAAC3o/4-lj9yacq7E/s320/edge25.png
Set the IP address configured on the internal network card of the Edge
172.16.0.200
http://1.bp.blogspot.com/-ctVfuiz4QBc/TyXUnaBK0lI/AAAAAAAAC3w/oqskZeMHM6U/s320/edge26.png
Configure the IP addresses of the network card's external Edge server
10.0.0.200
10.0.0.201
10.0.0.202
http://1.bp.blogspot.com/-Ze1xAyknoxs/TyXUn6sejJI/AAAAAAAAC34/SYkk7xh2p98/s320/edge27.png
Enter the valid ip firewall configured in Internet
http://1.bp.blogspot.com/-6qVFcgZSnVE/TyXUoPAH2sI/AAAAAAAAC4A/R5J5oPGOC-A/s320/edge28.png
Join the new service to existing pool
http://3.bp.blogspot.com/-cNgdbPTJ1PQ/TyXUovrPz8I/AAAAAAAAC4I/dWumkvQYoPA/s320/edge29.png
Select the Front End's pool and finish the wizard.
http://1.bp.blogspot.com/-0PsG5IFPr9c/TyXUpNznoiI/AAAAAAAAC4Q/AyIOvqDB_Nk/s320/edge30.png
Back in the Topology Builder publish the changes in the topology.
http://2.bp.blogspot.com/-5gh19HR5MYk/TyXUp3ZcWRI/AAAAAAAAC4Y/MJajb_BxbjE/s320/edge31.png
http://3.bp.blogspot.com/-q9CRQiZk6so/TyXUqWn8C1I/AAAAAAAAC4g/8IcnY3Env80/s320/edge32.png
http://1.bp.blogspot.com/-3_Vct2MuiRY/TyXUrPNHeUI/AAAAAAAAC4o/2Zaf2L4RgxY/s320/edge33.png
With the pool set up and created the Central Store Management changes to export a file to be used in the service installation on the target server. Start Lync Server Management Shelland run the cmdlet
Export-CsConfiguration <file path>
http://2.bp.blogspot.com/-sF7Lok0eLrY/TyXUrg8AwRI/AAAAAAAAC4w/_CVVWiS30p4/s320/edge34.png
Access the portal server certificate and export the root certificate to a file.
http://1.bp.blogspot.com/-7XzxJlzuy4E/TyXUsNbAeOI/AAAAAAAAC44/GelZ0PmNS3M/s320/edge35.png
I saved the two files in the folder location C: \ InstallEdge. Copy this folder to the server where you install the Edge server services;
http://4.bp.blogspot.com/-AwSUojvIFAQ/TyXUsrmtUZI/AAAAAAAAC5A/GV0-2Y1h4QY/s320/edge36.png
Configuring the Edge Server
The server that services will be installed Edge Server was installed with two network cards, one card configured in the network a DMZ and a second DMZ
http://3.bp.blogspot.com/-QiSx_VST5FQ/TyXeau8ZQRI/AAAAAAAAC5M/TaC0K7emZ6k/s320/edge37.png
The internal network card was configured with the ip network a DMZ, was not configured any gateway or DNS server on this board.
Ip: 172.16.0.200/24
http://1.bp.blogspot.com/-UYkElHQl1Ls/TyXebDBqAMI/AAAAAAAAC5U/t9swfM-CmZ0/s320/edge38.png
On board configured with the ip network *DMZ 2, *the address has been configured firewall gateway that connects to the Internet and an external DNS server.
http://3.bp.blogspot.com/-kPiy34B09XY/TyXebXBx-tI/AAAAAAAAC5c/0fVPhuD1CiE/s320/edge39.png
The Edge server server need to access corporate network resources, with the network configuration server is unable to route requests to the network 192.168.1.0/24
http://1.bp.blogspot.com/-Rt8NFOmZHVM/TyXeb0ve-eI/AAAAAAAAC5k/HzTG0EWVxyA/s320/edge40.png
This is because the server has no route to the corporate network,
route print
http://4.bp.blogspot.com/-jCl9r45b4nk/TyXecic5oAI/AAAAAAAAC5s/i1_G14Z069U/s320/edge41.png
To allow communication server to the corporate network you need to add an exit route for the 192.168.1.0/24 network for internal network adapter of the Edge Server. To identify which interface will be used in the command route add run the ipconfig / all and note the physical address of the internal network card.
http://2.bp.blogspot.com/-xrFlyyS6wpY/TyXedZNMsYI/AAAAAAAAC5w/-94jBZUJmUI/s320/edge42.png
Identify the route print which is the interface number of the recorded physical address. In this case the internal network card has the ID IF 12
http://3.bp.blogspot.com/-5PXNU-AuBJc/TyXedr1vh8I/AAAAAAAAC54/-hLAB1mFDuE/s320/edge43.png
Use the command route add to add the route, use the option -p to make the route persistent and it will not be lost when the server restarts
route add mask <rede destino> <mascara of identificação> <IP gateway> if <identificação card <Network-p
http://2.bp.blogspot.com/-D6w69rgKpKU/TyXed6QTw-I/AAAAAAAAC6E/-52_Qwka-tA/s640/edge44.png
Set the suffix Edge dns server, dns suffix should be identical to the dns suffix of the Active Directory Domain .
tab for the computed mudaça name, click More
http://1.bp.blogspot.com/-AuiUUtlYmrk/TyXjZBw2DxI/AAAAAAAAC6Q/mpflKn_u1E8/s320/edge45.png
In the dialog box set the Primary DNS suffix of this computer to add the same suffix of the Active Directory Domain . Do not forget to create a record in dns zone home.intranet pointing to the ip of Edge server, you need to set this manually input the DNS server for the Lync Edge is not part of the domain Active Directory .
http://1.bp.blogspot.com/-O9U26VLU3jU/TyXjZp5dCwI/AAAAAAAAC6Y/QmW0gC_tm94/s320/edge46.png
Configure the file hosts server and add the name and address ip fqdn of the domain controller and Lync Server Standard
C: \ Windows \ System32 \ drivers \ etc \ hosts
http://1.bp.blogspot.com/-9qYXbvPwaPI/TyXlG4mq36I/AAAAAAAAC6g/dxU_9fedkPE/s320/edge47.png
Copy the folder to the root certificate of the certification and configuration file generated in the Front End server to the root;
http://4.bp.blogspot.com/-AwSUojvIFAQ/TyXUsrmtUZI/AAAAAAAAC5A/GV0-2Y1h4QY/s320/edge36.png
Start an administration console by running mmc in the run, and select the Certificates Snap-In
http://4.bp.blogspot.com/-l35_sdmJ28M/TyXmrAnvGeI/AAAAAAAAC6o/QtPMaBX5TKE/s320/edge48.png
Manages the Select *Computer account *
http://4.bp.blogspot.com/-hKNpLiribFs/TyXmrY4WjBI/AAAAAAAAC6w/PtSiZs_gNtI/s320/edge49.png
Select Local Computer
http://1.bp.blogspot.com/-jrCPm1a0s54/TyXmr1puKZI/AAAAAAAAC64/5VhFTxbesUs/s320/edge50.png
In the console right-click on Trusted Root Certification Authorities select All Tasks and click Import
http://4.bp.blogspot.com/-JY8firMy4m8/TyXmsYEN-PI/AAAAAAAAC7A/kimXXEo8Xvg/s320/edge51.png
Select the root certificate and end the console
http://2.bp.blogspot.com/-7GDg6kMplso/TyXms6rmSqI/AAAAAAAAC7I/79K6gOk4F_M/s320/edge52.png
With the change of route in the hosts file and ping by fqdn name of Lync Standard is successfully completed.
http://2.bp.blogspot.com/-QtAE9Yu2TAA/TynHtG8FUWI/AAAAAAAAC7o/f9jGD70smbQ/s320/edge57.png
Before proceeding with the installation of the Edge Server service is recommended to restart the server to apply all changes made.
Installation Services Edge Server
Creation of Local Configuration Store
To start the service installation mount the Edge Server installation media Lync server and start the installation wizard. The wizard installs the *Visual C + + 2008 *
http://3.bp.blogspot.com/-4_Lo74WXspU/TynLajceOAI/AAAAAAAAC8A/dMoGZdy5ME8/s320/edge60.png
Then install the core components of the Lync Server
http://2.bp.blogspot.com/-Vk54oD7uzGw/TynLbOYbIYI/AAAAAAAAC8I/w62IfweoAWg/s320/edge61.png
http://1.bp.blogspot.com/-aHB867661Qw/TynLb1qOVNI/AAAAAAAAC8Q/xbHhlvugQKE/s320/edge62.png
In the installation wizard click Install or Update Lync Server System
http://1.bp.blogspot.com/-I4gYk7oct-I/TynP8xH-DqI/AAAAAAAAC8Y/Hkc3grxdbdA/s320/edge63.png
Start the first step *Install Configuration Local Store *
http://4.bp.blogspot.com/-o5TdhmxyaSw/TynP9j7wMxI/AAAAAAAAC8g/Ve7bnUQETLg/s320/edge64.png
Select the file created with the Export-CsConfiguration
http://4.bp.blogspot.com/-42PrqlScP3M/TynP-RKm3aI/AAAAAAAAC8o/yb9G23qQiF0/s320/edge65.png
Verify that no error occurred and complete the first step
http://2.bp.blogspot.com/-9cWh0PwJMFg/TdB_ZwCaQyI/AAAAAAAAAhY/9Sc6N980VWQ/s400/edg09.png
Start the second step *Lync Server Setup or Remove Components *
http://2.bp.blogspot.com/-8lph0H6wMSE/TynP_F5x1_I/AAAAAAAAC8w/hKbl88Bx564/s320/edge66.png
Installation Services and Components
Proceed to begin installation
http://3.bp.blogspot.com/-vjv9fuwslHA/TynP_hPiSaI/AAAAAAAAC84/oWVlRYKF9aY/s320/edge67.png
Verify that no errors were logged in and complete the second step
http://2.bp.blogspot.com/-FvtR6bhmzro/TynQBSaSyeI/AAAAAAAAC9A/c6dctDGJP1k/s320/edge68.png
Creation of Digital Certificates
The third step, the wizard configures the digital certificates used in communicating with clients and other servers in the pool.
Click Run To start *Request, Install or Assing Certificates *
http://4.bp.blogspot.com/-8G3ljur3b3o/TynZH-YwIyI/AAAAAAAAC9I/94R112VflSY/s320/edge69.png
Select the Internal Edge to issue the certificate used in the internal network card. Click Request
http://3.bp.blogspot.com/-4sp8L0uB_xM/TynZIQ4-7PI/AAAAAAAAC9M/Pykdo_VsLwE/s320/edge70.png
Go to start the wizard of the certificate
http://3.bp.blogspot.com/-DwHzDg1jBNo/TynZI7JllEI/AAAAAAAAC9U/wHpqVe20bRI/s320/edge71.png
Select Prepare the request now, but send it later (offline certificate request). This option generates a file to be imported into the certificate
http://4.bp.blogspot.com/-2bMA5X35lpo/TynZJJ3gHmI/AAAAAAAAC9g/d56uMv4hw9c/s320/edge72.png
Select the file path
http://3.bp.blogspot.com/-Cq6suHUI45k/TynZJwBsN2I/AAAAAAAAC9o/OMmrlJDJaSE/s320/edge73.png
Do not change any setting in Certificate Template
http://2.bp.blogspot.com/-XyvaBRS-alY/TynZKVuQiLI/AAAAAAAAC9w/HC0gPz7qMvs/s320/edge74.png
Set Friendly Name for the certificate and check the Mark the certificate's private key exportable. The Friendly Name of the certificate can be configured with any name, this value does not change any functionality of the certificate
http://2.bp.blogspot.com/-64d1MrDRkeI/TynZKz3bV7I/AAAAAAAAC94/7s8rKckUKMw/s320/edge75.png
Configure the organization's information in the certificate
http://3.bp.blogspot.com/-Wo8fXOzrN1I/TynZLQaE5zI/AAAAAAAAC-A/Ek1x5fzMAMc/s320/edge76.png
Configure geographic information
http://4.bp.blogspot.com/-cQJwLmQ5vH4/TynZLzWE2sI/AAAAAAAAC-I/KD_s2W5Qc0Y/s320/edge77.png
In the Subject Name must be configured with the name created in the fqdn DNS Active Directory Domain
http://2.bp.blogspot.com/-mAo6fTQkXq4/TynZMXesxvI/AAAAAAAAC-Q/ACyeJROBtmE/s320/edge78.png
It is not necessary to add any Subject Alternative Names
http://3.bp.blogspot.com/-RKHEhTCge2w/TynZOJTtLoI/AAAAAAAAC-Y/7xTQkjEIhDk/s320/edge79.png
Make sure all information is correct and finish the wizard
http://3.bp.blogspot.com/-iG-2E8QTcjk/TynZOuFCjtI/AAAAAAAAC-k/wFRMCUNcSE0/s320/edge80.png
http://1.bp.blogspot.com/-GZmXXIHjw0g/TynZPWaL18I/AAAAAAAAC-s/rRa157_vTNM/s320/edge81.png
Finish the wizard.
http://3.bp.blogspot.com/-arziywYVwx4/TynZPxK1MvI/AAAAAAAAC-0/7-0Nv4fQHP8/s320/edge82.png
Back to the Certificate Wizard select External Edge certificate and click Request
http://3.bp.blogspot.com/-wttTpmrbzeo/TynZQrv6EdI/AAAAAAAAC-8/Mi5jvQNDf4w/s320/edge83.png
The process is done the same for the internal certificate, change only the filename from the request
http://3.bp.blogspot.com/-euBkRAaz6Ro/TynZRDlFSiI/AAAAAAAAC_E/3AGzqyI89dg/s320/edge84.png
And the names that will be configured the certificate, the wizard adds the names configured for services in the Standard Pool
http://2.bp.blogspot.com/-hQy4Wdkmwyo/TynZRfiBBHI/AAAAAAAAC_M/7ontYAGgcXg/s320/edge85.png
At the end of the process we have two files to generate digital certificates, copy both to some server on the internal network.
http://3.bp.blogspot.com/-74Wa4bZZ764/TynqW0Xe26I/AAAAAAAAC_Y/66m2tqIcNNo/s320/edge86.png
The contents of the files is similar
http://1.bp.blogspot.com/-rI6PXOvOTDw/TynsvtJC_iI/AAAAAAAADCI/iQmAEMFm2WQ/s320/edge86_2.png
Visit the Web Certificate Enrrolement this structure the domain controller has the certificate installed enterprise. Click *Request a certificate *
http://3.bp.blogspot.com/-aNiPotJP9Zw/TynqY9l7nvI/AAAAAAAAC_g/9dQao0F5Vig/s320/edge87.png
Select Advanced certificate request
http://3.bp.blogspot.com/--BA5WOsh9QE/TynqagSPXdI/AAAAAAAAC_o/yNnN3eByEN8/s320/edge88.png
Click Submit a certificate by using a base-64 encoded CMC or PKCS # 10 file, or submit a renewal request by using the base 64-encoded PKCS # 7 Faithful
http://2.bp.blogspot.com/-neK8KPHRgVk/TynqbaEShkI/AAAAAAAAC_w/O48GSfbDGB8/s320/edge89.png
In the Saved Request Copy the contents of a file request and paste this location. In the Certificate Template select Web Server and click Submit
http://1.bp.blogspot.com/-uicbHmBpBho/Tynqb3Boi-I/AAAAAAAAC_4/PkTShz-o1Hs/s320/edge90.png
The certificate is generated by the portal save to a file and repeat the process for certification of external network
http://2.bp.blogspot.com/-rhRwLwm58yE/TynqcsqWzFI/AAAAAAAADAA/8Tk_WCjkTPU/s320/edge91.png
In the destination folder have the two certificates issued
http://2.bp.blogspot.com/-4V7IXIC8MjA/TynqdIMRAaI/AAAAAAAADAI/1SHVZp9Q56U/s320/edge92.png
Copy the folder to the Edge server, access the management console with the Snap-In Certificate computed in local and import the two certificates
http://3.bp.blogspot.com/-MgfdH81XWfY/TynqdvzM7CI/AAAAAAAADAQ/lkF-_KXrOeg/s320/edge93.png
Select the file path
http://1.bp.blogspot.com/-Za6hgYGWncY/Tynqd7m-rzI/AAAAAAAADAY/yOLurzBY5Gs/s320/edge94.png
The imported certificates should be listed as follows, private keys must be part of the certificate so they can be used by the Edge Server services
http://4.bp.blogspot.com/-Dxj2c3Rnupk/Tynqfr0-a0I/AAAAAAAADAg/QkdQw5fWeJw/s320/edge95.png
Return to the installation wizard Lync, the tab of the Certificate Wizard. Select the Edge Internal and click Assign
http://2.bp.blogspot.com/-0FMj5521OxU/TynqgNwt2OI/AAAAAAAADAo/xyE-yS8LFaY/s320/edge96.png
Proceed to begin installation of the certificate
http://4.bp.blogspot.com/-SCBGoFmGjzY/TynqgkYHHtI/AAAAAAAADAw/LcRFC3chpPw/s320/edge97.png
Select the certificate generated for the internal network card
http://4.bp.blogspot.com/-E2ZljO9eVgw/Tynqho_0axI/AAAAAAAADA4/us_aqBU7W8M/s320/edge98.png
Verify the certificate information and the name fqdn is correct and go start importing
http://2.bp.blogspot.com/-KH1yOUcYVHs/TynqjhvnLnI/AAAAAAAADBA/GQNNghcGPNc/s320/edge99.png
Verify that no errors occurred and finish the wizard
http://3.bp.blogspot.com/-mMwEmL1YrRE/TynqkZ8XdgI/AAAAAAAADBI/H-axnTJepgw/s320/edge100.png
Back to the Assistant certificate perform the same procedure, only this time select the External Edge Certificate
http://4.bp.blogspot.com/-4mQoGSuiKio/Tynqk9vhJSI/AAAAAAAADBQ/C-NzjTfoTfc/s320/edge101.png
And check the generated certificate to the external network
http://1.bp.blogspot.com/-Qb0DdDceiWg/TynqlmbDKGI/AAAAAAAADBY/CRQhcR_fKMM/s320/edge102.png
Start Services Lync Edge
Perform step Start Service to start all services on Edge;
http://1.bp.blogspot.com/-WOoQctRcHP4/TynqnYhRdXI/AAAAAAAADBg/-DUCFZoCfOc/s320/edge103.png
http://4.bp.blogspot.com/-PUJFatks4lE/TynqoNsQQwI/AAAAAAAADBo/el3Pj7I6log/s320/edge104.png
Start the management console services and make sure that all services have been created
http://1.bp.blogspot.com/-LPLOmFWdjrw/Tynq4Ez92GI/AAAAAAAADCA/8w9Qi_PTUb4/s320/edge106.png
Replication Between Edge and Back End Server
Edge Server on the server the wizard created a shared folder called replica-xds. Changes in the topology and replication necessary for the Edge will be saved in this folder by Replication Service Back End and services installed on the Edge apply the necessary changes.
http://1.bp.blogspot.com/-_AQKuZVlQoE/TysoIZu18BI/AAAAAAAADCo/L23lwCxGAok/s1600/edge110.png
To start the replication process of the Back End for Local Store in Edge server run the cmdlet
Invoke-CsManagementStoreReplication
http://2.bp.blogspot.com/-OCxtEpdnFdk/TysoH7CeCHI/AAAAAAAADCY/AxGiTA_sp2c/s640/edge108.png
This forces the entire topology check for updates in the Back End, after the execution of the command.
Use the cmdlet:
Get-CsManagementStoreReplication
http://2.bp.blogspot.com/-2BvNyYAx4EA/TysoICaw6jI/AAAAAAAADCg/gEseVy8zPfw/s320/edge109.png
Depending on the size of the structure and the link between the available server roles, the status of the servers can take a while to upgrade to a simple environment with a Standard Pool and Edge Server update takes less than a minute. If all settings have been placed successfully the status should be updated to:
http://3.bp.blogspot.com/-IHVROeIzbbA/TysoHbNHwtI/AAAAAAAADCQ/_Od8XtYGnL0/s320/edge107.png
Publication of the Edge Server
The publication of services to customers using the Internet is necessary to release the following firewall ports for internet ip's network cards outside of the Edge server.
http://1.bp.blogspot.com/-ye7rR03_FtI/TysxISsySiI/AAAAAAAADCw/_h3TyxZ8gRk/s320/FWExt.jpg
Doors 50000 - 59999/TCP 50000-59999/UDP and are necessary only if the federation with Office Communicator 2007 and Live Messeger is configured.
Reference
http://technet.microsoft.com/en-us/library/gg425891.aspx
http://www.microsoft.com/download/en/details.aspx?id=6797
http://technet.microsoft.com/en-us/library/gg398918.aspx
This article was originally written by:
Fernando Lugão Veltem
**blog: **http://flugaoveltem.blogspot.com
**twitter: **@ flugaoveltem