Configuring The Windows Server 2012 Web Application Proxy As A Reverse Proxy For Lync Server
Configuring The Windows Server 2012 Web Application Proxy As A Reverse Proxy For Lync Server
Configuring The Windows Server 2012 Web Application Proxy As A Reverse Proxy For Lync Server
Abstract: This whitepaper describes how to configure the Windows Server 2012 R2 Web Application
Proxy as a reverse proxy for Lync Server. The service allows internal applications such as Microsoft Lync
and Exchange to be published for external access. The Web Application Proxy service functions as both
a reverse proxy and an Active Directory Federation Services (AD FS) proxy.
This document is provided “as-is”. Information and views expressed in this document, including
URL and other Internet Web site references, may change without notice.
Some examples depicted herein are provided for illustration only and are fictitious. No real
association or connection is intended or should be inferred.
This document does not provide you with any legal rights to any intellectual property in any
Microsoft product. You may copy and use this document for your internal, reference purposes.
Copyright © 2014 Microsoft Corporation. All rights reserved.
Contents
1 Introduction.............................................................................................................................. 1
2 Requirements........................................................................................................................... 1
2.1 Hardware requirements..................................................................................................... 1
2.2 Software requirements...................................................................................................... 1
3 Planning................................................................................................................................... 2
3.1 Architectural Components................................................................................................. 2
3.2 Firewall Considerations..................................................................................................... 3
3.3 Load Balancing.................................................................................................................. 3
3.4 Name resolution................................................................................................................ 3
3.5 Certificates........................................................................................................................ 3
3.6 Authentication.................................................................................................................... 5
4 Installation and Configuration................................................................................................... 5
4.1 Networking configuration................................................................................................... 5
4.2 DNS Suffix......................................................................................................................... 5
4.3 Internal Name Resolution.................................................................................................. 6
4.4 Importing Certificates......................................................................................................... 6
4.5 Installing the Web Application Proxy feature.....................................................................7
4.6 Configure the Web Application Proxy feature....................................................................7
4.7 Launch the Remote Access Management Console.........................................................11
4.8 Create a Publishing Rule for Lync Autodiscover..............................................................11
4.9 Create Publishing Rules for Lync Simple URLs...............................................................15
4.10 Create Publishing Rules for External Lync Web Services............................................19
4.11 Create Publishing Rule for Office Web Apps................................................................24
4.12 Summary List of Publishing Rules................................................................................30
5 Lync Phone Edition Devices................................................................................................... 30
5.1 Configure a Fallback Certificate......................................................................................31
Configuring the Windows Server 2012 Web Application Proxy as a Reverse Proxy for Lync Server
1 Introduction
Windows Server 2012 R2 includes a new service called the Web Application Proxy as part of the Remote
Access role. The service allows internal applications such as Microsoft Lync and Exchange to be
published for external access. The Web Application Proxy service functions as both a reverse proxy and
an Active Directory Federation Services (AD FS) proxy.
Note: The Web Application Proxy service does not provide firewall capabilities, nor does it function as an
authenticating proxy for outbound internet connections.
2 Requirements
The following table lists the roles and features that are required for Web Application Proxy and describes
how they support it.
Active Directory Domain Services Active Directory® Domain Services is required as a prerequisite before
(AD DS) you can deploy AD FS. It is also required for Web Application Proxy
deployments that use Kerberos constrained delegation.
Active Directory Federation Services AD FS is required to provide authentication and authorization services
(AD FS) to Web Application Proxy and to store the Web Application Proxy
configuration
Remote Access (DirectAccess, Remote Access is the role containing the Web Application Proxy role
Routing and Remote Access) service
1
Configuring the Windows Server 2012 Web Application Proxy as a Reverse Proxy for Lync Server
Deploying Web Application Proxy on the server requires local administrator permissions on the
server. In addition, when you connect the Web Application Proxy server to the AD FS server, you
require the credentials of the local administrator on the AD FS servers.
You must deploy AD FS on a server running Windows Server 2012 R2 in your organization
before you can deploy Web Application Proxy.
If you want to remotely manage Web Application Proxy servers, you must enable remote
PowerShell management on the Web Application Proxy servers. See Running Remote
Commands.
3 Planning
Deploying Web Application Proxy as a reverse proxy for Lync Server 2013 requires detailed planning.
This section describes several of the deployment considerations that are associated with using Web
Application Proxy as a reverse proxy for Lync Server 2013. The following image shows a high-level
network diagram including the Web Application proxy.
2
Configuring the Windows Server 2012 Web Application Proxy as a Reverse Proxy for Lync Server
3.5 Certificates
To successfully publish AD FS services and establish SSL connectivity with Active Directory Federation
Services, the Web Application Proxy must be configured with a public certificate that contains the FQDN
of the AD FS service. If you plan to publish web service URLs for other applications such as Lync and
Exchange, the Web Application Proxy must be configured with a public certificate that contains the web
service FQDNs of those applications.
It is possible to use a single certificate to publish all web services via the Web Application Proxy.
However, for the purposes of this document, the Web Application Proxy server will be configured with two
public certificates. One certificate will be used for the ADFS Proxy service certificate, while the other
3
Configuring the Windows Server 2012 Web Application Proxy as a Reverse Proxy for Lync Server
certificate will be used to publish web services for Lync, Exchange, and Office Web Apps. For more
information, see Planning to Publish Applications Using Web Application Proxy.
To successfully publish Lync Web Services URLs for external access, a public web server certificate must
be installed on the Web Application Proxy server. This certificate should be configured with the published
external web service fully qualified domain names (FQDNs) of each pool that is home to users that are
enabled for remote access. The subject alternative name value from this certificate must also contain the
meeting simple URL, the dial-in simple URL, the web scheduler simple URL, and external Autodiscover
Service URL.
The root certification authority certificate and any intermediate certification authority certificates from the
CA that issued the public certificate must be installed on the Web Application Proxy server. Likewise,
certificates from internal Enterprise or Standalone certificate authorities should be installed on the Web
Application Proxy server.
The following table describes how the public certificate should be configured for publishing the various
web services that are consumed by the Lync 2013 client:
Certificate values required for this scenario
For more details on Lync Server 2013 specific certificate requirements for reverse proxy servers, please
see Request and configure a certificate for your reverse HTTP proxy in Lync Server 2013.
Note: It is not supported to use a certificate with a wildcard entry as the subject name (also referred to as
the common name or CN) in Lync Server 2013. If you need to use wildcard values on your reverse proxy
certificate, the wildcard values must appear in the list of subject alternative names on the certificate
assigned to the Web Application Proxy server.
For more information about using wildcard certificates in Lync Server 2013, please see Wildcard
certificate support in Lync Server 2013.
4
Configuring the Windows Server 2012 Web Application Proxy as a Reverse Proxy for Lync Server
3.6 Authentication
Although Web Application Proxy supports several authentication methods, pass-through authentication
should be used for publishing any web service URL that is used by the Lync client. In environments
where both Lync Server and Exchange Server are deployed, Web Application Proxy should be configured
to use pass-through authentication for both Lync and Exchange web services URLs.
Note: The external network adapter should be configured with a default gateway value and external DNS
server values. The Internal network adapter should be configured only with an internal DNS server. The
internal network adapter should not be configured with a default gateway value, but rather connectivity to
internal subnets should be provided through the use of persistent routes.
5
Configuring the Windows Server 2012 Web Application Proxy as a Reverse Proxy for Lync Server
6
Configuring the Windows Server 2012 Web Application Proxy as a Reverse Proxy for Lync Server
7
Configuring the Windows Server 2012 Web Application Proxy as a Reverse Proxy for Lync Server
8
Configuring the Windows Server 2012 Web Application Proxy as a Reverse Proxy for Lync Server
3. Enter the federation service name that you specified in the AD FS configuration as well as
credentials for accessing AD FS.
9
Configuring the Windows Server 2012 Web Application Proxy as a Reverse Proxy for Lync Server
4. On the AD FS Proxy Certificate dialog, in the list of certificates currently installed on the Web
Application Proxy server, select a certificate to be used for the AD FS Proxy service, and then
click Next.
10
Configuring the Windows Server 2012 Web Application Proxy as a Reverse Proxy for Lync Server
11
Configuring the Windows Server 2012 Web Application Proxy as a Reverse Proxy for Lync Server
Note: External Lync clients send requests to Lync Web Services over TCP/443, however, external Lync
Web Services listens for client requests on TCP/4443. This means that a reverse proxy must bridge the
client request to the Lync server from TCP/443 to TCP/4443.
To create a Publishing rule for Lync autodiscover
1. Open the Remote Access Management Console and select Publish.
12
Configuring the Windows Server 2012 Web Application Proxy as a Reverse Proxy for Lync Server
4. On the Publishing Settings page, do the following, and then click Next:
o In the Name box, enter a friendly name for the application
o In the External URL box, enter the external URL for the application
o In the External certificate list, select a certificate that contains the external URL
o In the Backend server URL field, enter the URL, port, and path of the target backend server
13
Configuring the Windows Server 2012 Web Application Proxy as a Reverse Proxy for Lync Server
Note: After appending :4443 to the external Lync Web Services URL, the Web Application Proxy
server will display a warning that the published internal and external URLs do not match. As long as
both the internal and external fully qualified domain name (FQDN) and path values are the same, you
can safely ignore this warning.
5. Confirm the settings you entered, and then click Publish to create the new publishing rule.
14
Configuring the Windows Server 2012 Web Application Proxy as a Reverse Proxy for Lync Server
15
Configuring the Windows Server 2012 Web Application Proxy as a Reverse Proxy for Lync Server
16
Configuring the Windows Server 2012 Web Application Proxy as a Reverse Proxy for Lync Server
4. On the Publishing Settings page, do the following, and then click Next:
o In the Name box, enter a friendly name for the application
(for example, Lync Dial-in Simple URL)
o In the External URL box, enter the external URL for the application
(for example, http://dialin.fabrikam.com)
o In the External certificate list, select a certificate that contains the external URL
o In the Backend server URL field, enter the URL, port, and path of the target backend server
(for example, https://dialin.fabrikam.com:4443)
Note: After appending :4443 to the external Lync Web Services URL, the Web Application Proxy
server will display a warning that the published internal and external URLs do not match. As long as
both the internal and external fully qualified domain name (FQDN) and path values are the same, you
can safely ignore this warning.
17
Configuring the Windows Server 2012 Web Application Proxy as a Reverse Proxy for Lync Server
18
Configuring the Windows Server 2012 Web Application Proxy as a Reverse Proxy for Lync Server
5. Confirm the values you entered, and then click Publish to create the new publishing rule.
6. Repeat these steps to create additional publishing rules for the Meet and Web Scheduler Simple
URLs.
19
Configuring the Windows Server 2012 Web Application Proxy as a Reverse Proxy for Lync Server
20
Configuring the Windows Server 2012 Web Application Proxy as a Reverse Proxy for Lync Server
4. On the Publishing Settings page, do the following, and then click Next:
o In the Name box, enter a friendly name for the application
(for example, External Lync Web Services – Bostom Pool)
o In the External URL box, enter the external URL for the application
(for example, https://lyncweb01.fabrikam.com)
o In the External certificate list, select a certificate that contains the external URL
o In the Backend server URL box, enter the URL, port, and path of the target backend server
(for example, https://lyncweb01.contoso.com:4443)
21
Configuring the Windows Server 2012 Web Application Proxy as a Reverse Proxy for Lync Server
Note: Since the A (host) record for the External Lync Web Services FQDN on the internal DNS
server will resolve to the external IP address of the reverse proxy server, the Backend server URL for
External Lync Web Services publishing rules should be populated with the Internal Lync Web Services
FQDN for each Enterprise Edition pool or the FQDN of each Standard Edition server. Additionally, the
Backend server URL value must be appended with :4443 so that the request will be bridged correctly
to the backend server.
22
Configuring the Windows Server 2012 Web Application Proxy as a Reverse Proxy for Lync Server
5. After reviewing your settings for accuracy, click Publish to create the new publishing rule.
6. Since this publishing rule contains a discrepancy in the External URL and Backend server URL
values, the publishing rule must be configured to disable translation of URL values in request
headers. This setting can be disabled by running the following cmdlets using Windows
PowerShell:
$Rule = (Get-WebApplicationProxyApplication “External Lync Web Services
– Boston Pool”).ID
23
Configuring the Windows Server 2012 Web Application Proxy as a Reverse Proxy for Lync Server
7. Repeat these steps to create additional publishing rules for the External Lync Web Services
FQDN of each Lync Enterprise Edition pool and Standard Edition server.
24
Configuring the Windows Server 2012 Web Application Proxy as a Reverse Proxy for Lync Server
25
Configuring the Windows Server 2012 Web Application Proxy as a Reverse Proxy for Lync Server
4. On the Publishing Settings page, do the following, and then click Next:
o In the Name box, enter a friendly name for the application
(for example, Office Web Apps – Boston Pool)
o In the External URL box, enter the external URL for the application
(for example, https://wacweb01.fabrikam.com)
o In the External certificate list, select a certificate that contains the external URL
o In the Backend server URL box, enter the URL, port, and path of the target backend server
(for example, https://naboswac01.contoso.com)
26
Configuring the Windows Server 2012 Web Application Proxy as a Reverse Proxy for Lync Server
Note: The Backend server URL for External Lync Web Services publishing rules should be
populated with the FQDN of the Office Web Apps server. Also, it is not necessary to bridge the
connection to a different port since the Office Web Apps server listens for client connections on
TCP/443.
27
Configuring the Windows Server 2012 Web Application Proxy as a Reverse Proxy for Lync Server
5. After reviewing your settings for accuracy, click Publish to create the new publishing rule.
6. Since this publishing rule contains a discrepancy in the External URL and Backend server URL
values, the publishing rule must be configured to disable translation of URL values in request
headers. This setting can be disabled by running the following cmdlets using Windows
PowerShell:
$Rule = (Get-WebApplicationProxyApplication "Office Web Apps - Boston
Pool").ID
28
Configuring the Windows Server 2012 Web Application Proxy as a Reverse Proxy for Lync Server
29
Configuring the Windows Server 2012 Web Application Proxy as a Reverse Proxy for Lync Server
30
Configuring the Windows Server 2012 Web Application Proxy as a Reverse Proxy for Lync Server
to serve to the client. A key benefit of SNI is that is allows a server to host multiple certificates on the
same IP/port pair instead of needing a different IP per certificate (assuming you are using port 443).
SNI relies on the client supporting SNI and sending the Server Name extension in the SSL Client Hello. If
the SSL Client Hello does not contain the SNI header then http.sys is unable to determine which
certificate to serve and will reset the connection.
While most clients do support SNI, Lync Phone Edition devices do not support SNI. As such, Lync Phone
Edition devices will fail to sign in externally unless a fallback certificate is configured for http.sys on the
Office Web Apps server.
31