Logo
PREGNANCY
Windows XP
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
 
 
Windows Server

Microsoft Lync Server 2010 Edge : Reverse Proxy Configuration (part 2)

11/1/2011 3:21:59 PM

Publishing a Single Server Pool or Load Balancer

After the web listener is created, a web publishing rule can be created. The process for this rule creation differs slightly depending on whether the pool consists of only a single member, or whether the reverse proxy should publish the load balancer. In either of these cases, use the following steps. If the built-in load balancing features of Forefront Threat Management Gateway are used for external load balancing to create the rule.

1.
Right-click Firewall Policy, select New, and select Web Publishing Rule.

2.
Name the rule descriptively and click Next.

3.
Select Allow and then press Next.

4.
Select Publish a single web site or load balancer and click Next.

5.
Select Use SSL to connect to the published Web server or server farm and click Next.

6.
Enter the internal site name and the fully qualified name of the internal pool and click Next.

Tip

Be sure the Threat Management Gateway server can resolve the name in DNS. If not, enter the IP address of the internal server or load balancer.

7.
In the Path field, enter a /* to publish all internal paths behind the previously entered site name. Be sure to select the Forward the original host header instead of the actual one specified in the Internal site name field on the previous page check box. Click Next.

Caution

Forwarding the original host header was not important in OCS 2007, but is critical when using simple URLs for dial-in conferencing and meetings. If the original header is not forwarded, the Front End server can’t tell whether the client requested meet.companyabc.com or lyncwebservices.companyabc.com. This can prevent external users from joining meetings.

8.
In the Accept requests for selection, leave This domain name selected and enter the public FQDN of the external web services defined in the Topology Builder. Leave the Path field with the /* string, as shown in Figure 2, and then click Next.

Figure 2. Public Name for Rule


9.
In the Web Listener selection box, choose the web listener created in an earlier step, and then click Next.

10.
In the Authentication Delegation method, select No delegation, but client may authenticate directly, and then click Next.

11.
Leave the All Users set in the list and then click Next.

12.
Click Finish to complete the rule.

Publishing a Pool with Multiple Servers

If the load-balancing capabilities of Threat Management Gateway are used to publish multiple Front End Servers in a pool, use the following steps:

1.
Right-click the Firewall Policy, select New, and select Web Publishing Rule.

2.
Name the rule descriptively and click Next.

3.
Select Allow and click Next.

4.
Select Publish a server farm of load balanced Web servers and click Next.

5.
Select Use SSL to connect to the published Web server or server farm and click Next.

6.
Enter the internal site name and the fully qualified name of the internal pool and click Next.

7.
In the Path field, enter a /* to publish all internal paths behind the previously entered site name. Click Next.

8.
Click New to create a new web server farm.

9.
Name the web server farm and click Next.

10.
Click the Add button and enter the name of a Front End Server or IP address if Threat Management Gateway cannot resolve internal DNS. Click OK and repeat for any additional Front End Servers in the pool.

11.
Click Next after all servers are defined in the farm, as shown in Figure 3.

Figure 3. TMG Web Farm Definition

12.
In the method used to monitor server farm connectivity, select Establish a TCP connection and enter port 4443. Click Next.

13.
Click Finish to complete the web farm creation.

14.
Ensure Cookie-based Load Balancing is selected and then click Next.

15.
In the Accept requests for selection, leave This domain name selected and enter the public FQDN of the external web services defined in the Topology Builder. Leave the Path field with the /* string and then click Next.

16.
In the Web Listener selection box, choose the web listener created in an earlier step and click Next.

17.
In the Authentication Delegation method, select No delegation, but client may authenticate directly and click Next.

18.
Leave the All Users set in the list and click Next.

19.
Click Finish to complete the rule.

Other -----------------
- InfoPath Designer 2010 : Create an InfoPath 2010 Add-In & Create a Custom Task Pane
- InfoPath Designer 2010 : Access Your Form Within a Visual Studio Workflow
- Microsoft SQL Server 2008 R2 : Query Plan Caching (part 2) - Monitoring the Plan Cache
- Microsoft SQL Server 2008 R2 : Query Plan Caching (part 1) - Query Plan Reuse & Query Plan Aging
- Microsoft Dynamics AX 2009 : Processing Business Tasks - Posting general journals
- Microsoft Dynamics AX 2009 : Processing Business Tasks - Creating new general journals
- Windows Small Business Server 2011 : An Email Primer (part 2) - Connecting an Exchange Server to the Internet
- Windows Small Business Server 2011 : An Email Primer (part 1) - Understanding Email Addresses & Email Server Functions
- Exchange Server 2007 : Securing Access to ActiveSync with Secure Sockets Layer Encryption (part 3) - Installing a Root Certificate on a Windows Mobile Device
- Exchange Server 2007 : Securing Access to ActiveSync with Secure Sockets Layer Encryption (part 2) - Using an Internal Certificate Authority for OWA Certificates
- Exchange Server 2007 : Securing Access to ActiveSync with Secure Sockets Layer Encryption (part 1) - Installing a Third-Party CA on a CAS
- Enabling ActiveSync in Exchange Server 2007
- Microsoft Systems Management Server 2003 : Migration Issues - Planning the Site Structure (part 2) - Running the Deployment Readiness Wizard
- Microsoft Systems Management Server 2003 : Migration Issues - Planning the Site Structure (part 1)
- Managing Microsoft Windows Server 2003 Disk Storage : Implementing RAID
- Managing Microsoft Windows Server 2003 Disk Storage : Maintaining Disk Storage Volumes
- Securing Windows Server 2008 R2 : DirectAccess
- SharePoint 2010 Search : Setting Up the Crawler - Crawling Metadata
- SharePoint 2010 Search : Setting Up the Crawler - Crawler Impact Rules & Crawler Scheduling
- Securing Windows Server 2008 R2 : Active Directory Recycle Bin
 
 
Most view of day
- Windows Phone 8 : Configuring Basic Device Settings - Backing Up Your Phone (part 1) = Backing Up App Lists and Settings
- SQL Server 2008 R2 : Performance Monitoring Tools (part 1)
- Adobe Illustrator CS5 : Organizing Your Drawing - Working with Groups
- SQL Server 2008 R2 : Creating and Managing Stored Procedures - Viewing Stored Procedures
- BizTalk Server 2009 Operations : Maintaining the BizTalk Group (part 2) - Backup Procedures
- Managing Client Protection : User Account Control (part 3) - UAC Virtualization, UAC and Startup Programs, Compatibility Problems with UAC
- Windows Server 2003 on HP ProLiant Servers : Security Planning and Design (part 2) - Account Lockout
- SQL server 2008 R2 : Creating and Managing Stored Procedures - Using Input Parameters
- Windows Server 2012 Requirements and Installation : Installing Server 2012 (part 2) - Server with a GUI Install
- SharePoint 2010 : Packaging and Deployment Model - Working with Packages
Top 10
- Sharepoint 2013 : Working with the CSOM (part 6) - Working with the JavaScript client object model - Creating, reading, updating, and deleting in the JavaScript client object model
- Sharepoint 2013 : Working with the CSOM (part 5) - Working with the JavaScript client object model - Handling errors
- Sharepoint 2013 : Working with the CSOM (part 4) - Working with the JavaScript client object model - Returning collections
- Sharepoint 2013 : Working with the CSOM (part 3) - Working with the managed client object model - Creating, reading, updating, and deleting
- Sharepoint 2013 : Working with the CSOM (part 2) - Working with the managed client object model - Handling errors
- Sharepoint 2013 : Working with the CSOM (part 1) - Understanding client object model fundamentals
- Windows Phone 8 : Configuring Mailbox Settings (part 5) - Configuring Automatic Replies
- Windows Phone 8 : Configuring Mailbox Settings (part 4) - Lightening the Display,Changing the Mailbox Sync Settings
- Windows Phone 8 : Configuring Mailbox Settings (part 3) - Message Signatures, Blind CCing Yourself
- Windows Phone 8 : Configuring Mailbox Settings (part 2) - Unlinking Mailboxes, Conversation View
 
 
Windows XP
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
2015 Camaro