Chapter 15. Deployment Example

In Chapter 14, we presented a detailed planning process of a fictitious globally distributed company named Litware, Inc. The goal of this chapter is to demonstrate a deployment path for Litware, Inc. The focus is to explain the deployment sequence, starting with the preparatory steps. This chapter doesn’t provide step-by-step instructions to set up individual server roles. These are covered in various Microsoft Office Communications Server 2007 R2 deployment guides located at: http://go.microsoft.com/fwlink/?LinkID=133729.

On the Companion Media

On the Companion Media

Links to information related to this book are described in the section titled "Additional Resources" at the end of this chapter. These links are provided on this book’s companion CD.

Understanding Litware, Inc.’s Deployment Process for Office Communications Server 2007 R2

Preparation is the most critical aspect of an Office Communications Server deployment. Certain steps, such as developing a server naming convention, preparing Domain Name System (DNS) entries, creating certificates, and installing and configuring network interface cards (NICs), should be done before proceeding with the actual deployment. This approach saves you from having to come back to the preparation of the environment after each step. The advantage in doing all the server preparation up front is that when you deploy server roles later in your deployment path (for example, when deploying the Edge Server after you have set up the pool), you do not have to ask DNS administrators to create additional entries for them because you already took care of this a few days earlier. In environments where multiple administrators are involved, the deployment process becomes smoother if adequate preparation is done in advance. This chapter demonstrates an example deployment path for large multisite deployments.

Establishing a Server Naming Convention

At first, it is important to define the naming convention for all servers that Litware, Inc. wants to deploy. It’s essential to choose a naming convention that is easily understandable to all organizations involved in the deployment because doing so decreases the possibility of miscommunication. As Table 15-1 shows, Litware, Inc. chooses a naming convention for its servers that easily identifies each of the Office Communications Server 2007 R2 roles and their locations.

Table 15-1. Litware, Inc.’s Server Naming Convention

ATTRIBUTE

NAMING CONVENTION

Server name

X-Y-Z

Server-FQDN (fully qualified domain name)

x-y-z.litwareinc.com

X

Server locations are abbreviated as follows:

CHI = Chicago

PAR = Paris

SPO = Singapore

Y

Server roles are abbreviated as follows:

  • FE = Front-end server of an Office Communications Server 2007 R2 Enterprise Edition pool

  • BE = Back-end server of an Office Communications Server 2007 R2 Enterprise Edition pool

  • SE = Office Communications Server 2007 R2 Standard Edition

  • DIR = Director (Office Communications Server 2007 R2 Standard Edition)

  • ES = Edge Server

  • WCE = Web Component Edge Service (on Edge Server role)

  • AVE = Audio/Visual (A/V) Edge Service (on Edge Server role)

  • MED = Mediation Server

  • RP = Hypertext Transfer Protocol (HTTP) Reverse Proxy

  • UM = Exchange Unified Messaging Server

  • ARC = Archiving Server

  • MON = Monitoring Server

  • ARCBE = Archiving Server back-end SQL Server

  • MONBE = Monitoring Server back-end SQL Server

Z

Role number (if this is missing, the server is a load balancer)

Note that some exceptions to this naming convention exist for non–Office Communications Server 2007 R2 roles, such as load balancers.

If you have used Office Communications Server 2007, you will notice that a number of server roles seem to be missing from Table 15-1. The reason for this is that in Office Communications Server 2007 R2, the recommended topology has changed from an expanded Enterprise Edition topology to the collocated Enterprise Edition topology. In the collocated Enterprise Edition topology, all pool services are collocated on every front-end server. This greatly simplifies deployment and management.

Similarly, the recommended Edge Server topology is the collocated Edge Server. In fact, in Office Communications Server 2007 R2, you will not find the setup user interface (UI) to deploy an expanded Enterprise pool or the non-collocated Edge Servers. This option is available only via a command line tool called LcsCmd.exe. For more information, refer to the Office Communications Server 2007 R2 Command Line Reference documentation found at http://go.microsoft.com/fwlink/?LinkID=133728.

Table 15-2 through Table 15-4 show the server names, IP addresses, and FQDNs of the servers for the three Litware, Inc. sites.

Table 15-2. Litware, Inc. Server Names for Chicago

SERVER ROLE

SERVER NAME

IP ADDRESS

SERVER FQDN

Consolidated Enterprise Edition (EE) pool name (load balancer Virtual Internet Protocol (VIP) for the pool)

CHI-POOL

10.18.10.1

chi-pool.litwareinc.com

EE front-end server 1

CHI-FE-01

10.18.10.2

chi-fe-01.litwareinc.com

EE front-end server 2

CHI-FE-02

10.18.10.3

chi-fe-02.litwareinc.com

EE front-end server 3

CHI-FE-03

10.18.10.4

chi-fe-03.litwareinc.com

EE front-end server 4

CHI-FE-04

10.18.10.5

chi-fe-04.litwareinc.com

EE front-end server 5

CHI-FE-05

10.18.10.6

chi-fe-05.litwareinc.com

EE front-end server 6

CHI-FE-06

10.18.10.7

chi-fe-06.litwareinc.com

Back-end SQL cluster name

CHI-BE

10.18.10.10

chi-be.litwareinc.com

Back-end Node 1

CHI-BE-01

10.18.10.11

chi-be-01.litwareinc.com

Back-end Node 2

CHI-BE-02

10.18.10.12

chi-be-02.litwareinc.com

Archiving Server

CHI-ARC-01

10.18.10.20

chi-arc-01.litwareinc.com

Archiving Server Back-end SQL

CHI-ARCBE-01

10.18.10.21

chi-arcbe-01.litwareinc.com

Monitoring Server

CHI-MON-01

10.18.10.22

chi-mon-01.litwareinc.com

Monitoring Server Back-end SQL

CHI-MONBE-01

10.18.10.23

chi-monbe-01.litwareinc.com

EE Director pool name (load balancer VIP for EE Director pool)

CHI-DIR

10.18.10.32

chi-dir.litwareinc.com

EE Director front-end server 1

CHI-DIR-01

10.18.10.30

chi-dir-01.litwareinc.com

EE Director front-end server 2

CHI-DIR-02

10.18.10.31

chi-dir-02.litwareinc.com

Back-end SQL cluster name (for Director pool)

CHI-DIRBE

10.18.10.40

chi-dirbe.litwareinc.com

Back-end Node 1 (for Director pool)

CHI-DIRBE-01

10.18.10.41

chi-dirbe-0l.litwareinc.com

Back-end Node 2 (for Director pool)

CHI-DIRBE-02

10.18.10.42

chi-dirbe-02.litwareinc.com

Exchange Unified Messaging (UM) Server

CHI-UM-01

10.18.10.70

chi-um-01.contoso.com

Load balancer VIP for collocated Edge Server (internal)

CHI-ES

192.168.10.40

chi-es.litwareinc.com

Load balancer VIP for collocated Edge Server (external)

64.65.66.1 (Access Edge Service)

sip.litwareinc.com

  

64.65.66.2 (Web Conferencing Edge Service)

chi-wcs.litwareinc.com

  

64.65.66.3 (A/V Edge Service)

chi-ave.litwareinc.com

Edge Server 1 (internal NIC)

CHI-ES-01

192.168.10.41

chi-es-01.litwareinc.com

Edge Server 1 (external NIC)

64.65.66.11 (Access Edge Service)

  

64.65.66.21 (Web Conferencing Edge Service)

 
  

64.65.66.31 (A/V Edge Service)

 

Edge Server 2 (internal NIC)

CHI-ES-02

192.168.10.42

chi-es-02.litwareinc.com

Edge Server 2 (external NIC)

64.65.66.12 (Access Edge Service)

  

64.65.66.22 (Web Conferencing Edge Service)

 
  

64.65.66.32 (A/V Edge Service)

 

Mediation Server (internal NIC)

CHI-MED-01

10.18.10.50

chi-med-01.litwareinc.com

Mediation Server (external NIC)

CHI-MED-01

10.18.10.51

chi-med-01.litwareinc.com

HTTP reverse proxy server (internal NIC)

CHI-RP-01

192.168.10.60

chi-rp-01.litwareinc.com

HTTP reverse proxy server (external NIC)

64.65.66.30

chi-rp-01.litwareinc.com

Table 15-3. Litware, Inc. Server Names for Paris

SERVER ROLE

SERVER NAME

IP ADDRESS

SERVER FQDN

Consolidated EE Pool Name (load balancer VIP for the pool)

PARPOOL

10.17.10.1

par-pool.litwareinc.com

EE front-end server 1

PAR-FE-01

10.17.10.2

par-fe-01.litwareinc.com

EE front-end server 2

PAR-FE-02

10.17.10.3

par-fe-02.litwareinc.com

EE front-end server 3

PAR-FE-03

10.17.10.4

par-fe-03.litwareinc.com

EE front-end server 4

PAR-FE-04

10.17.10.5

par-fe-04.litwareinc.com

Back-end SQL cluster name

PAR-BE

10.17.10.10

par-be.litwareinc.com

Back-end Node 1

PAR-BE-01

10.17.10.11

par-be-01.litwareinc.com

Back-end Node 2

PAR-BE-02

10.17.10.12

par-be-02.litwareinc.com

Archiving Server

PAR-ARC-01

10.17.10.20

par-arc-01.litwareinc.com

Archiving Server Back-end SQL

PAR-ARCBE-01

10.17.10.21

par-arcbe-01.litwareinc.com

Monitoring Server

PAR-MON-01

10.17.10.22

par-mon-01.litwareinc.com

Monitoring Server Back-end SQL

PAR-MONBE-01

10.17.10.23

par-monbe-01.litwareinc.com

Load balancer VIP for collocated Edge Access Server (internal)

PAR-ES

192.167.10.40

par-es.litwareinc.com

Load balancer VIP for collocated Edge Access Server (external)

64.64.66.1 (Access Edge Service)

par-es-ext.litwareinc.com

  

64.64.66.2 (Web Conferencing Edge Service)

par-wcs.litwareinc.com

  

64.64.66.3 (A/V Edge Service)

par-ave.litwareinc.com

Edge Server 1 (internal NIC)

PAR-ES-01

192.167.10.41

par-es-01.litwareinc.com

Edge Server 1 (external NIC)

64.64.66.11 (Access Edge Service)

  

64.64.66.21 (Web Conferencing Edge Service)

 
  

64.64.66.31 (A/V Edge Service)

 

Edge Server 2 (internal NIC)

PAR-ES-02

192.168.10.42

par-es-02.litwareinc.com

Edge Server 2 (external NIC)

64.64.66.12 (Access Edge Service)

  

64.64.66.22 (Web Conferencing Edge Service)

 
  

64.64.66.32 (A/V Edge Service)

 

HTTP reverse proxy server (internal NIC)

PAR-RP-01

192.167.10.60

par-rp-01.litwareinc.com

HTTP reverse proxy server (external NIC)

64.64.66.30

par-rp-01.litwareinc.com

Table 15-4. Litware, Inc. Server Names for Singapore

SERVER ROLE

SERVER NAME

IP ADDRESS

SERVER FQDN

SE Server (with archiving and monitoring servers collocated)

SPO-SE-01

10.15.10.1

spo-se-01.litwareinc.com

Archiving and Monitoring Server back-end SQL

SPO-ARCMONBE-01

10.15.10.21

spo-arcmonbe-01.litwareinc.com

Edge Server (internal NIC)

SPO-ES-01

192.165.10.41

spo-ep-01.litwareinc.com

Edge Server (external NIC)

64.62.66.11 (Access Edge Service)

spo-es-ext.litwareinc.com

  

64.62.66.21 (Web Conferencing Edge Service)

spo-wcs.litwareinc.com

  

64.62.66.31 (A/V Edge Service)

spo-ave.litwareinc.com

HTTP reverse proxy server (internal NIC)

SPO-RP-01

192.165.10.60

spo-rp-01.litwareinc.com

HTTP Reverse Proxy Server (external NIC)

64.62.66.30

spo-rp-01.litwareinc.com

Note

Because some of the users in the Chicago site are enabled for Voice in addition to the regular server roles, the Mediation Server, Session Initiation Protocol (SIP)/Public Switched Telephone Network (PSTN) gateway, and Exchange UM Server are also deployed in this site. Also note that Litware, Inc. decided to go with an Enterprise Edition pool to serve as a Director for higher availability and better performance.

Note

Because the user population at the Singapore site is small, Litware, Inc. decided to go with a Standard Edition server with Archiving and Monitoring Servers collocated on the same physical machine. Also note that for the Singapore site, the external IP addresses for the Edge Server also need an FQDNs assigned. This is because there is no external load balancer in Singapore, and therefore the external IP addresses have to be in the external DNS.

Preparing the Server Hardware

Each Litware, Inc. server role requires dedicated server hardware, as described in the Office Communications Server 2007 R2 Planning Guide. When preparing server hardware for an Office Communications Server 2007 R2 deployment, the required number of NICs in each server should be checked. Table 15-5 through Table 15-19, found later in this chapter, show where Litware, Inc. needs multiple NICs as required by the server roles.

Table 15-5. Summary of Chicago Infrastructure Requirements

SERVER ROLE

NAME

EXTERNAL DNS NAME (IP ADDRESS)

INTERNAL DNS NAME (IP ADDRESS)

EXTERNAL FIREWALL PORT (DIRECTION)

INTERNAL FIREWALL PORT (DIRECTION)

Edge Server—Access Edge Service (load balancer)

CHI-ES

sip.litwareinc.com

VIP = (64.65.66.1)_sip._tls. domain (SRV) 443 sip.litwareinc.com_sipfederation-tls._tcp.domain (SRV) 5061 sip.litwareinc.com

chi-es.litwareinc.com

VIP = (192.168.10.40)

443 Transmission Control Protocol (TCP) (inbound) (Internet → Access Edge Service for Remote User Access) 5061 TCP (both) (Internet ↔ Access Edge Service for federation)

5061 TCP (both) (Office Communications Server 2007 R2 pool ↔ Access Edge Service)

Edge Server—Web Conferencing Edge Service (load balancer)

CHI-ES

chi-wce.litwareinc.com

VIP = (64.65.66.2)

N/A (internal edge of Web Conferencing Service can’t be behind a load balancer

443 TCP (inbound) (Internet → Web Conferencing Edge Server)

8057 TCP (outbound) (Office Communications Server 2007 R2 pool → Web Conferencing Edge Service)

Edge Server—A/V Edge Service (load balancer)

CHI-ES

chi-ave.litwareinc.com

VIP = (64.65.66.3)

chi-es.litwareinc.com

VIP = (192.168.10.40)

443 TCP (inbound)

(Internet → A/V Edge Service) 3478 User Datagram Protocol (UDP) (inbound)

(Internet → A/V Edge Service) 50,000-59,999 TCP & UDP (both) (Internet ↔ A/V Edge Service)

443 TCP (outbound)

(Internal Net [all IPs] → A/V Edge Service) 3478 UDP (outbound)

(internal Net [all IPs] → A/V Edge Service) 5062 TCP (outbound) (internal Net [all IPs] → A/V Edge Service)

NODES (EDGE SERVER)

Node1

CHI-ES-01

N/A

(64.65.66.11, 64.65.66.21, 64.65.66.31)

chi-es-01.litwareinc.com (192.168.10.41)

N/A

N/A

Node2

CHI-ES-02

N/A

(64.65.66.12, 64.65.66.22, 64.65.66.32)

chi-es-02.litwareinc.com (192.168.10.42)

N/A

N/A

HTTP reverse proxy server

CHI-RP-01

chi-rp-0l.litwareinc.com (64.65.66.30)

chi-rp-01.litwareinc.com (192.168.10.60)

443 TCP (inbound) Internet → HTTP reverse proxy server

443 TCP (inbound) HTTP reverse proxy server → Office Communications Server 2007 R2 pool

EE Director pool (load balancer)

CHI-DIR

N/A

chi-dir.litwareinc.com (10.18.10.32)

N/A

5061 TCP (both)

(Access Edge [internal load balancer VIP] ↔ Director)

EE DIRECTOR FRONT-END NODES

Node1

CHI-DIR-01

N/A

chi-dir-01.litwareinc.com (10.18.10.30)

N/A

N/A

Node2

CHI-DIR-02

N/A

chi-dir-02.litwareinc.com (10.18.10.31)

N/A

N/A

Back-end SQL Server for Director pool (cluster name)

SQL-DIRBE

N/A

chi-dirbe.litwareinc.com

VIP =(10.18.10.40)

N/A

N/A

BACK-END SQL NODES (FOR DIRECTOR POOL)

Node 1

CHI-DIRBE-01

N/A

chi-dirbe-01.litwareinc.com (10.18.10.41)

N/A

N/A

Node 2

CHI-DIRBE-02

N/A

chi-dirbe-02.litwareinc.com (10.18.10.42)

N/A

N/A

EE pool (load balancer)

CHI-POOL

N/A

chipool.litwareinc.com VIP = (10.18.10.1)_sipinternal._tcp.domain (SRV) 5061 chi-pool.litwareinc.com_sipinternaltls_tcp.domain (SRV) 5061 chipool.litwareinc.com

N/A

N/A

EE FRONT ENDS

Node 1

CHI-FE-01

N/A

chi-fe-01.litwareinc.com (10.18.10.2)

N/A

N/A

Node 2

CHI-FE-02

N/A

chi-fe-02.litwareinc.com (10.18.10.3)

N/A

N/A

Node 3

CHI-FE-03

N/A

chi-fe-03.litwareinc.com (10.18.10.4)

N/A

N/A

Node 4

CHI-FE-04

N/A

chi-fe-04.litwareinc.com (10.18.10.5)

N/A

N/A

Node 5

CHI-FE-05

N/A

chi-fe-05.litwareinc.com (10.18.10.6)

N/A

N/A

Node 6

CHI-FE-06

N/A

chi-fe-06.litwareinc.com (10.18.10.7)

N/A

N/A

Back-end SQL Server (cluster name)

SQL-BE

N/A

chi-be.litwareinc.com VIP = (10.18.10.10)

N/A

N/A

BACK-END SQL NODES

Node 1

CHI-BE-01

N/A

chi-be-01.litwareinc.com (10.18.10.11)

N/A

N/A

Node 2

CHI-BE-02

N/A

chi-be-02.litwareinc.com (10.18.10.12)

N/A

N/A

Mediation Server

CHI-MED-01

chi-med-01.litwareinc.com (10.18.10.51)

chi-med-01.litwareinc.com (10.18.10.50)

N/A

N/A

Archiving Server

CHI-ARC-01

N/A

chi-arc-01.litwareinc.com (10.18.10.20)

N/A

N/A

Archiving Server Back-End SQL Server

CHI-ARCBE-01

N/A

chi-arcbe-01.litwareinc.com (10.18.10.21)

N/A

N/A

Monitoring Server

CHI-MON-01

N/A

chi-mon-01.litwareinc.com (10.18.10.22)

N/A

N/A

Monitoring Server Back-End SQL Server

CHI-MONBE-01

N/A

chi-monbe-01.litwareinc.com (10.18.10.23)

N/A

N/A

Litware, Inc.’s Deployment Path

Litware, Inc. decided to enable several scenarios with a high level of redundancy for its users. This resulted in a high number of individual servers and server roles needing to be deployed. Figure 15-1 through Figure 15-3 provide a graphical view of the target deployment for each of the Litware, Inc. sites.

Litware, Inc.’s target architecture in Chicago

Figure 15-1. Litware, Inc.’s target architecture in Chicago

Litware, Inc.’s target architecture in Paris

Figure 15-2. Litware, Inc.’s target architecture in Paris

Litware, Inc.’s target architecture in Singapore

Figure 15-3. Litware, Inc.’s target architecture in Singapore

Preparing Active Directory

Litware, Inc. decided to install the entire Office Communications Server 2007 R2 deployment in a single domain (Litware, Inc.com) because domain controllers are available at each of the sites. The Office Communications Server 2007 R2 Active Directory Guide, found at http://go.microsoft.com/fwlink/?LinkID=133727, explains in detail the steps that have to be taken to prepare Active Directory for an Office Communications Server 2007 R2 deployment.

In the future, Litware, Inc. would like to add Office Communications Servers in a different Active Directory domain at a new site. Because that site doesn’t have good connectivity to the root domain, Litware, Inc. decided to put its global settings in the Configuration Partition rather than in the System container.

Important

Active Directory administrators need to have good control over Active Directory schema updates because these events can affect the entire enterprise’s directory infrastructure. Therefore, you’ll need to coordinate with the Active Directory administrators to prepare Active Directory in an Office Communications Server 2007 R2 deployment. Depending on the enterprise and its business, there can be periods in which an Active Directory schema update is not allowed by company policy and therefore the Office Communications Server 2007 R2 deployment can be delayed. The effects of such policies on the deployment schedule need to be incorporated into the deployment plan.

Overview of Preparing Firewall Ports, Certificates, NICs, and DNS

In large enterprises, the configurations of DNS, certificates, and firewalls are sometimes, from an organizational perspective, separate from the administrators who install and configure Office Communications Servers. Therefore, the administrators responsible for deploying Office Communications Servers must collaborate with other administrators within the company.

As part of Litware, Inc.’s Office Communications Server 2007 R2 planning process, the number of individual server roles has been identified, as shown in Chapter 14. This enables Litware, Inc. to summarize all DNS and firewall port requirements so that the preparation of the surrounding infrastructure can be done at one time before the actual deployment takes place. Table 15-5 through Table 15-19 summarize all preparations that need to be done for Litware, Inc.’s Office Communications Server 2007 R2 deployment. In addition, a detailed view with all the infrastructure requirements—including certificate requirements for Chicago—will be shown later in the chapter.

Preparing DNS, Firewall Ports, and Certificates for the Chicago Deployment

Table 15-5 provides a summary of Litware, Inc.’s infrastructure requirements for Chicago.

Note that in Table 15-5, a total of 12 IP addresses are used, which point to the same two physical Edge Servers. Here is a summary to further clarify the addressing scheme for these servers:

  • One IP address for the Access Edge VIP (externally) = 64.65.66.1

  • One IP address for the Web Conferencing Edge VIP (externally) = 64.65.66.2

  • One IP address for the A/V Edge VIP (externally) = 64.65.66.3

  • One IP address for the Edge Server VIP (internally) shared by the Access Edge and A/V Edge = 192.168.10.40

  • Two IP addresses for the Access Edge (externally) = 64.65.66.11 and 64.65.66.12 (these addresses are the node addresses, and the VIPs point to them)

  • Two IP addresses for the Web Conferencing Edge (externally) = 64.65.66.21 and 64.65.66.22 (these addresses are the node addresses, and the VIPs point to them)

  • Two IP addresses for the A/V Edge (externally) = 64.65.66.31 and 64.65.66.32 (these addresses are the node addresses, and the VIPs point to them)

  • Two IP addresses for the Edge Server shared by Access Edge, Web Conferencing Edge, and A/V Edge (internally) = 192.168.10.41 and 192.168.10.42

Note that the internal edge of the Web Conferencing Service cannot be behind a load balancer. The individual FQDNs of two Web Conferencing Service boxes (chi-es-01.litwareinc.com and chi-es-02.liwareinc.com) must be addressable by all the Web Conferencing Services in the internal network.

Table 15-6 through Table 15-8 provide detailed views of the infrastructure requirements for the Edge Server arrays in the Chicago perimeter network. An array is a set of servers running the same server roles.

Table 15-6. Details for Chicago External Load Balancer for Co-located Edge Servers

ROLE/FEATURE

QUANTITY/VALUE(S)

LOCATION/SETTING

NOTE/EXAMPLE

LOAD BALANCER

Access Edge

sip.litwareinc.com

Perimeter network

Externally facing hardware load balancer with 3 VIPs

Web Conferencing Edge

chi-wce.litwareinc.com

Perimeter network

Externally facing hardware load balancer with 3 VIPs

A/V Edge

chi-ave.litwareinc.com

Perimeter network

Externally facing hardware load balancer with 3 VIPs

VIPS

Access Edge VIP (external)

(1) 64.65.66.1

100-megabit Full

VIP address on the external load balancer for array of Access Edge Services

Web Conferencing Edge VIP (external)

(1) 64.65.66.2

100-megabit Full

VIP address on the external load balancer for array of Web Conferencing Edge Services

A/V Edge VIP (external)

(1) 64.65.66.3

100-megabit Full

VIP address on the external load balancer for array of A/V Edge Services

PORTS

Firewall (external)

443 TCP

Inbound

Traffic from Internet → Access Edge Service, Web Conferencing Edge Service, and A/V Edge Service external load balancer VIPs (sip.litwareinc.com, chi-wce.litware.com, and chi-ave.litware.com, respectively)

 

5061 TCP

Bi-directional

Traffic to/from Internet ↔ Access Edge Service external load balancer VIP (sip.litwareinc.com)

 

3478 UDP

Inbound

Traffic from Internet → A/V Edge Service external load balancer VIP (chi-ave.litwareinc.com)

 

50,000-59,999 TCP and UDP

Bi-directional

Traffic to/from Internet ↔ A/V Edge Service external load balancer VIP (chi-ave.litwareinc.com); if you don’t want to open the entire range of ports from 50,000 to 59,999, allow 6 ports for each concurrent external user

Certificates

Certificate Name (CN)/Subject Name (SN)

N/A

N/A

N/A

DNS (Internal)

(A)

N/A

N/A

N/A

DNS (External)

(A)

sip.litwareinc.com

64.65.66.1

 

(A)

chi-wce.litwareinc.com

64.65.66.2

 

(A)

chi-ave.litware.com

64.65.66.3

 

Table 15-7. Details for Chicago—Internal Load Balancer for Co-located Edge Servers

ROLE/FEATURE

QUANTITY/VALUE(S)

LOCATION/SETTING

NOTE/EXAMPLE

Load Balancer

Access Edge and A/V Edge (shared)

chi-es.litwareinc.com

Perimeter network

Internally facing hardware load balancer with 1 VIP.

Note that the internal edge of the Web Conferencing Edge Services is not load balanced.

VIPs

Access Edge and A/V Edge VIP (internal)

(1) 192.168.10.40

100-megabit Full

Virtual IP address on the internal load balancer for an array of Edge Servers (shared by all Edge Services).

Ports

Firewall (internal)

8057 TCP

Outbound

Traffic from Data Conferencing Servers of the EE pool → Web Conferencing Edge Service Node1 (chi-es-01.litwareinc.com) and Node2 (chi-es-02.litware-inc.com).

 

5061 TCP

Bi-directional

Traffic to/from Edge Server internal load balancer VIP (chi-es.litwareinc.com) ↔ Director load balancer VIP (chi-dir.litwareinc.com) and to Web Conferencing Servers and A/V Conferencing Servers in EE pool.

 

443 TCP

Outbound

Traffic from Internal Network (all) →A/V Edge Service internal load balancer VIP (chi-es.litwareinc.com).

 

3478 UDP

Outbound

Traffic from internal network (all) →A/V Edge Service internal load balancer VIP (chi-es.litwareinc.com).

 

5062 TCP

Outbound

Traffic from internal network (all) →A/V Edge Service internal load balancer VIP (chi-es.litwareinc.com).

Note that the internal firewall rule must enable traffic from any computer on the internal network that will be involved in A/V calls or A/V conferencing to reach the A/V Edge Service internal load balancer VIP over all three ports.

Certificates

CN/SN

N/A

N/A

N/A

DNS (Internal)

(A)

chi-es.litwareinc.com

192.168.10.40

N/A

DNS (External)

(A)

N/A

N/A

N/A

Table 15-8. Details for Chicago Edge Server Nodes

ROLE/FEATURE

QUANTITY/VALUE(S)

LOCATION/SETTING

NOTE/EXAMPLE

Server

Edge Server (Access Edge Service, Web Conferencing Edge Service, A/V Edge Service)

   

Node1

CHI-ES-01

Perimeter network

Workgroup servers in the perimeter network. Each node is running Access Edge Service, Web Conferencing Edge Service, and A/V Edge Service.

Node2

CHI-ES-02

Perimeter network

 

NICs

Node1 (internal-facing)

(1) 192.168.10.41

100-megabit Full

Shared by all Edge Services

Node2 (internal-facing)

(1) 192.168.10.42

100-megabit Full

Shared by all Edge Services

Node1 (external-facing)

(1/3) 64.65.66.11

100-megabit Full

Used by Access Edge Service. Can be behind a Network Address Translation (NAT) or port-forwarding firewall.

 

(2/3) 64.65.66.21

100-megabit Full

Used by Web Conferencing Edge Service. Can be behind a NAT or port-forwarding firewall.

 

(3/3) 64.65.66.31

100-megabit Full

Used by A/V Edge Service. Must be a publicly addressable IP address. Can be behind a port-forwarding firewall but not translated with NAT.

Note that the default gateway should be on the external NIC in each node and point to the Internet, or you might not get audio on remote Microsoft Office Communicator 2007 R2/Office Communicator Phone Edition calls.

Node2 (external-facing)

(1/3) 64.65.66.12

100-megabit Full

Used by Access Edge Service. Can be behind a NAT or port-forwarding firewall.

 

(2/3) 64.65.66.22

100-megabit Full

Used by Web Conferencing Edge Service. Can be behind a NAT or port-forwarding firewall.

 

(3/3) 64.65.66.32

100-megabit Full

Used by A/V Edge Service. Must be a publicly addressable IP address. Can be behind a port-forwarding firewall but not translated with NAT.

Ports

Firewall (internal)

N/A

N/A

All Edge Services on the Edge Server array will use ports opened for those services on the internal load balancer VIP (sip-es.litwareinc.com).

Firewall (external)

N/A

N/A

All Edge Services on the Edge Server array will use ports opened for those services on the external load balancer VIPs (sip.litwareinc.com, chi-wce.litwareinc.com, chi-ave.litwareinc.com).

Certificates (internal)

Internal certificate shared by all Edge Services (for both nodes)

CN/SN=chi-es.litwareinc.com

Enhanced Key Usage (EKU): Server/Client

Used for client/server Transport Layer Security (TLS)/Mutual Transport Layer Security (MTLS).

Certificates (external)

External certificate assigned to Access Edge Service (for both nodes)

CN/SN=sip.litware-inc.com

EKU: Server/ Client

First entry in Subject Alternative Name (SAN) must match the CN/SN of certificate.

 

SAN=sip.litwareinc.com; sip.additionalSIPDomainName.com

 

If federation is enabled, the certificate must be issued by a public CA.

Same physical certificate must be present on both nodes.

The SAN must contain additional entries for each SIP domain that federated partners and/or remote users will access.

External certificate assigned to Web Conferencing Edge Service (for both nodes)

CN/SN=chi-wce.litwareinc.com

EKU: Server/ Client

The same certificate can be applied to both nodes.

If federation is enabled, the certificate must be issued by a public CA.

Authentication certificate assigned to the A/V Edge Service (for both nodes)

CN/SN=chi-ave.litwareinc.com

EKU: Server

A certificate is used to create Media Relay Access Server (MRAS) access tokens. They are not exposed to the client.

The same physical certificate must be present on both nodes.

DNS (Internal)

(A)

chi-es-01.litwareinc.com

192.168.10.41

This is the internal FQDN of the Edge Server (Node1).

(A)

chi-es-02.litwareinc.com

192.168.10.42

This is the internal FQDN of the Edge Server (Node2).

DNS (External)

(A)

N/A

N/A

External NICs in Node1 and Node2 are externally accessible only via the respective load balancer VIPs; use internal IP addresses for managing each node.

(SRV)

_sip._tls.litwareinc.com

_sipfederationtls._tcp.litwareinc.com

_tls for port 443

_tcp for port 5061

 

 

Table 15-9 provides a detailed view of the infrastructure requirements for the HTTP reverse proxy server in the Chicago perimeter network.

Table 15-9. Details for Chicago HTTP Reverse Proxy Server

ROLE/FEATURE

QUANTITY/VALUE(S)

LOCATION/SETTING

NOTE/EXAMPLE

Server

HTTP reverse proxy server

CHI-RP-01

Perimeter network

Workgroup server running Internet Security and Acceleration (ISA) Standard Edition in the perimeter network.

NICs

Internal

(1) 192.168.10.60

100-megabit Full

 

External

(1) 64.65.66.30

100-megabit Full

The HTTP Reverse Proxy Server role can be behind a NAT or port-forwarding firewall.

Ports

Firewall (internal)

443 TCP

Inbound

Traffic from HTTP reverse proxy server (chi-rp-01.litwareinc.com) → Office Communications Server 2007 R2 Enterprise Edition load balancer VIP (chi-pool.litwareinc.com).

Firewall (external)

443 TCP

Inbound

Traffic from Internet HTTP → reverse proxy server (chi-rp-01.litwareinc.com).

Certificates

Certificate assigned on reverse proxy

CN/SN=chi-rp-01.litwareinc.com

EKU: Server

Exportable Machine certificate: used for client/server TLS/MTLS.

DNS (Internal)

(A)

chi-rp-01.litwareinc.com

192.168.10.60

This is the internal FQDN of the HTTP reverse proxy server.

DNS (External)

(A)

chi-rp-01.litwareinc.com

64.65.66.30

This is the external FQDN of the HTTP reverse proxy server.

Note

That if internal and external facing Internet Security and Acceleration (ISA) Server NICs reside in the perimeter network, port 443 needs to be open inbound from the ISA Server to the Office Communications Server 2007 R2 Enterprise Edition Load Balancer VIP.

Table 15-10 and Table 15-11 provide detailed views of the infrastructure requirements for the Director servers in Chicago.

Table 15-10. Details for Chicago Load Balancer for Office Communications Server 2007 R2 Enterprise Edition Director Pool

ROLE/FEATURE

QUANTITY/VALUE(S)

LOCATION/SETTING

NOTE/EXAMPLE

Load Balancer

Office Communications Server R2 Enterprise Edition pool

chi-dir.litwareinc.com

Internal network

Hardware load balancer with 1 VIP.

VIPs

EE Director pool VIP (external)

(1) 10.18.10.32

100-megabit Full

VIP Address on the load balancer for EE Director pool.

Ports

Firewall (internal)

5061 TCP

Bi-directional

Traffic to/from Access Edge Server internal load balancer VIP (chi-es.litwareinc.com) ↔ EE Director pool load balancer VIP (chi-dir.litwareinc.com).

Firewall (external)

N/A

N/A

N/A

Certificates

N/A

N/A

N/A

N/A

DNS (Internal)

(A)

N/A

N/A

N/A

DNS (External)

(A)

chi-dir.litwareinc.com

10.18.10.32

Note that this DNS entry must be made both in the internal corp network as well as the perimeter network so that it is resolvable by internal EE servers as well as the Edge Servers.

Table 15-11. Details for Chicago EE Director Pool

ROLE/FEATURE

QUANTITY/VALUE(S)

LOCATION/SETTING

NOTE/EXAMPLE

Server

EE Director Pool Front-End Server

   

Node1

Node2

CHI-DIR-01

CHI-DIR-02

Internal network

Internal network

Domain members on the internal network. Each node is running a copy of Office Communications Server 2007 R2 Enterprise Edition.

NICs

Node1

(1) 10.18.10.30

100-megabit Full

 

Node2

(1) 10.18.10.31

  
  

100-megabit Full

 

Ports

Firewall (internal)

N/A

N/A

N/A

Certificates

Certificate assigned to both front-end nodes

CN/SN=chi-dir.litwareinc.com

EKU: Server

 

DNS (Internal)

(A)

chi-dir-01.litwareinc.com

10.18.10.30

This is the internal FQDN of each front-end server in the EE Director pool.

(A)

chi-dir-02.litwareinc.com

10.18.10.31

 

DNS (External)

(A)

N/A

N/A

N/A

Note that the infrastructure requirements for the back-end SQL cluster for the Director pool are not described in detail. These requirements are the same as the back-end SQL cluster for the EE pool described in Table 15-14.

Table 15-12 and Table 15-13 provide detailed views of the infrastructure requirements for the expanded Office Communications Server 2007 R2 Enterprise Edition pool in Chicago.

Table 15-12. Details for Chicago Load Balancer for Office Communications Server 2007 R2 Enterprise Edition Pool

ROLE/FEATURE

QUANTITY/VALUE(S)

LOCATION/SETTING

NOTE/EXAMPLE

Load Balancer

Office Communications Server 2007 R2 Enterprise Edition pool

chi-pool.litwareinc.com

Internal network

Hardware load balancer with 1 VIP; accessed by way of the Director.

VIPs

EE pool VIP (internal)

(1) 10.18.10.1

100-megabit Full

Virtual IP address on the load balancer for the Office Communications Server 2007 R2 Enterprise Edition front-end servers.

Ports

Firewall (internal)

N/A

N/A

N/A

Certificates

CN/SN

N/A

N/A

N/A

DNS (Internal)

(A)

chi-pool.litwareinc.com

10.18.10.1

 

DNS (External)

(A)

N/A

N/A

N/A

Table 15-13. Details for the Chicago Office Communications Server 2007 R2 Enterprise Edition Front-End Servers

ROLE/FEATURE

QUANTITY/VALUE(S)

LOCATION/SETTING

NOTE/EXAMPLE

Server

EE Front-End Server

Node1

chi-fe-01.litwareinc.com

Internal network

Domain member Office Communications Server 2007 R2 Enterprise Edition expanded pool.

Node2

chi-fe-02.litwareinc.com

Internal network

Node3

chi-fe-03.litwareinc.com

Internal network

Each front-end server in the pool contains all the server roles that belong to an EE pool (for example, Front End role, Web Conferencing Server role, A/V Conferencing Server role, Web Component Server role) and is configured exactly the same way. The pool name is CHI-POOL.

Node4

chi-fe-04.litwareinc.com

Internal network

Node5

chi-fe-05.litwareinc.com

Internal network

Node6

chi-fe-06.litwareinc.com

Internal network

NICs

Node1 (internal)

(1) 10.18.10.2

100Mb Full

 

Node2 (internal)

(1) 10.18.10.3

100Mb Full

 

Node3 (internal)

(1) 10.18.10.4

100Mb Full

 

Node4 (internal)

(1) 10.18.10.5

100Mb Full

 

Node5 (internal)

(1) 10.18.10.6

100Mb Full

 

Node6 (internal)

(1) 10.18.10.7

100Mb Full

 

Ports

Firewall (internal)

N/A

N/A

N/A

Certificates

Certificate assigned to every front-end node

CN/SN = chi-pool.litwareinc.com

EKU: Server

Used for client/server TLS/MTLS.

 

SAN = chi-pool.litwareinc.com

sip.litwareinc.com

sip.additionalSIPDomainName.com

The first entry in the SAN must match the CN/SN of the certificate.

The SAN must contain additional entries for each SIP domain that federated partners and/or remote users will access.

DNS (Internal)

(A)

chi-fe-01.litwareinc.com

10.18.10.2

This is the internal FQDN of each EE front-end server in the pool.

(A)

chi-fe-02.litwareinc.com

10.18.10.3

 

(A)

chi-fe-03.litwareinc.com

10.18.10.4

 

(A)

chi-fe-04.litwareinc.com

10.18.10.5

 

(A)

chi-fe-05.litwareinc.com

10.18.10.6

 

(A)

chi-fe-06.litwareinc.com

10.18.10.7

 

(SRV)

_sipinternal._tcp.litwareinc.com

_tcp for port 5061

 
 

_sipinternaltls._tcp.litwareinc.com

_tcp for port 5061

 

DNS (External)

(A)

N/A

 

The Office Communications Server 2007 R2 EE pool is not addressable externally accept via the Access Edge Service/Director pool.

Table 15-14 provides a detailed view of the infrastructure requirements for the back-end SQL cluster in the Chicago pool.

Table 15-14. Details for Chicago Back-End SQL Cluster

ROLE/FEATURE

QUANTITY/VALUE(S)

LOCATION/SETTING

NOTE/EXAMPLE

Server

SQL Server cluster

chi-be.litwareinc.com

Internal network

This is the virtual name for the SQL Server cluster.

Node1

CHI-BE-01

Internal network

Domain member SQL Server (EE pool back end).

Node2

CHI-BE-02

Internal network

Domain member SQL Server (EE pool back end).

NICs

Node1 (internal)

(1) 10.18.10.11

100-megabit Full

 

Node2 (internal)

(1) 10.18.10.12

100-megabit Full

 

Ports

Firewall (internal)

N/A

N/A

N/A

Certificates

N/A

N/A

N/A

N/A

DNS (Internal)

(A)

chi-be.litwareinc.com

10.18.10.10

This is the internal FQDN of the SQL Server cluster.

(A)

chi-be-01.litwareinc.com

10.18.10.11

 

(A)

chi-be-02.litwareinc.com

10.18.10.12

 

DNS (External)

(A)

N/A

 

The SQL Server is not addressable externally.

Table 15-15 provides detailed views of the infrastructure requirements for the Archiving Server in Chicago.

Table 15-15. Details for the Chicago Archiving Server

ROLE/FEATURE

QUANTITY/VALUE(S)

LOCATION/SETTING

NOTE/EXAMPLE

Server

Archiving

CHI-ARC-01

Internal net-work

Domain member.

NiCs

Internal

(1) 10.18.10.20

100-megabit Full

 

Ports

Firewall (internal)

N/A

N/A

N/A

Certificates

N/A

N/A

N/A

The Archiving Server doesn’t require a certificate

DNS (Internal)

(A)

chi-arc-01.litwareinc.com

10.18.10.20

 

DNS (External)

(A)

N/A

N/A

N/A

Table 15-16 provides a detailed view of the infrastructure requirements for the Archiving Server’s back-end SQL Server cluster.

Table 15-16. Details for Chicago Back-End SQL Cluster

ROLE/FEATURE

QUANTITY/VALUE(S)

LOCATION/SETTING

NOTE/EXAMPLE

Server

SQL

CHI-ARCBE-01

Internal network

Domain member SQL Server.

NICs

Internal

(1) 10.18.10.21

100-megabit Full

 

Ports

Firewall (internal)

N/A

N/A

N/A

Certificates

N/A

N/A

N/A

N/A

DNS (Internal)

(A)

chi-arcbe.litwareinc.com

10.18.10.21

This is the internal FQDN of the SQL Server.

DNS (External)

(A)

N/A

 

The SQL Server is not addressable externally.

Note that the infrastructure requirements for the Monitoring Server and the Monitoring Server back-end SQL are exactly the same as those of the Archiving Server and the Archiving Server back-end SQL.

Table 15-17 provides a detailed view of the infrastructure requirements for the Mediation Server in Chicago.

Table 15-17. Details for the Chicago Mediation Server

ROLE/FEATURE

QUANTITY/VALUE(S)

LOCATION/SETTING

NOTE/EXAMPLE

Server

Mediation

chi-med-01.litwareinc.com

Internal network

Domain member running the Office Communications Server 2007 R2 Mediation Server role.

NICs

Internal

(1) 10.18.10.50

100-megabit Full

 

External

(1) 10.18.10.51

100-megabit Full

Carries unsecured PSTN traffic to/from the IP/PSTN gateway. Enables 64 Kbps per concurrent PSTN call.

Ports

Firewall (internal)

N/A

N/A

N/A

Firewall (gateway network)

N/A

N/A

N/A

Certificates

Certificate assigned to the Mediation Server

CN/SN =chi-med-01.litwareinc.com

EKU: Server

Used for Server MTLS/ Secure Real-Time Protocol (SRTP).

DNS (Internal)

(A)

chi-med-01.litwareinc.com

10.18.10.50

This is the internal FQDN of the Mediation Server. (Ping resolves to this IP address.)

(A)

chi-med-01.litwareinc.com

10.18.10.51

This is the IP address used for the Mediation Server ↔ SIP/PSTN gateway communication.

Considered an external interface by the Mediation Server.

DNS (External)

(A)

N/A

  

Preparing DNS and Firewall Ports for the Paris Deployment

Table 15-18 contains the summary view of all infrastructure requirements for the deployment in Paris.

Table 15-18. Summary of Paris Infrastructure Requirements

SERVER ROLE

NAME

EXTERNAL DNS NAME (IP ADDRESS)

INTERNAL DNS NAME (IP ADDRESS)

EXTERNAL FIREWALL PORT (DIRECTION)

INTERNAL FIREWALL PORT (DIRECTION)

Edge Server—Access Edge Service (load balancer)

PAR-ES

par-es-ext.litwareinc.com

VIP =(64.64.66.1)

par-es.litwareinc.com

VIP = (192.167.10.40)

443 TCP (inbound) (Internet → Access Edge Service for remote access) 5061 TCP (both) (Internet ↔ Access Edge Service for federation)

5061 TCP (both) (Office Communications Server 2007 R2 pool ↔ Access Edge Service)

Edge Server—Web Conferencing Edge Service

PAR-ES

par-wce.litwareinc.com VIP = (64.64.66.2)

N/A

443 TCP (inbound) (Internet → Web Conferencing Edge Server)

8057 TCP (outbound) (Office Communications Server 2007 R2 pool → Web Conferencing Edge Service)

Edge Server—A/V Edge Service (load balancer)

PAR-ES

par-ave.litwareinc.com

VIP = (64.64.66.3)

par-es.litwareinc.com

VIP = (192.167.10.40)

443 TCP (inbound) (Internet → A/V Edge Service) 3478 UDP (inbound)

(Internet → A/V Edge Service) 50,000-59,999 TCP & UDP (both) (Internet ↔ A/V Edge Service)

443 TCP (outbound) (Internal Net [all IPs] → A/V Edge Service) 3478 UDP (outbound)

(internal Net [all IPs] → A/V Edge) 5062 TCP (outbound) (internal Net [all IPs] → A/V Edge Service)

NODES (EDGE SERVER)

Node1

PAR-ES-01

N/A

(64.64.66.11, 64.64.66.21, 64.64.66.31)

par-es-01.litwareinc.com (192.167.10.41)

N/A

N/A

Node2

PAR-ES-02

N/A

(64.64.66.12, 64.64.66.22, 64.64.66.32)

par-es-02.litwareinc.com (192.167.10.42)

N/A

N/A

HTTP reverse proxy server

PAR-RP-01

par-rp-01.litwareinc.com (64.64.66.30)

par-rp-01.litwareinc.com (192.167.10.60)

443 TCP (inbound) Internet → HTTP reverse proxy server

443 TCP (inbound) HTTP reverse proxy server → Office Communications Server 2007 R2 pool

EE pool (load balancer)

PAR-POOL

N/A

chipool.litwareinc.com VIP = (10.17.10.1)

N/A

N/A

EE FRONT ENDS

Node1

PAR-FE-01

N/A

par-fe-01.litwareinc.com (10.17.10.2)

N/A

N/A

Node2

PAR-FE-02

N/A

par-fe-02.litwareinc.com (10.17.10.3)

N/A

N/A

Node3

PAR-FE-03

N/A

par-fe-03.litwareinc.com (10.17.10.4)

N/A

N/A

Node4

PAR-FE-04

N/A

par-fe-04.litwareinc.com (10.17.10.5)

N/A

N/A

Back-end SQL Server (cluster name)

SQL-BE

N/A

par-be.litwareinc.com VIP = (10.17.10.10)

N/A

N/A

BACK-END SQL NODES

Node 1

PAR-BE-01

N/A

par-be-01.litwareinc.com (10.17.10.11)

N/A

N/A

Node 2

PAR-BE-02

N/A

par-be-02.litwareinc.com (10.17.10.12)

N/A

N/A

Archiving Server

PAR-ARC-01

N/A

par-arc-01.litwareinc.com (10.17.10.20)

N/A

N/A

Archiving Server back-end SQL Server

PAR-ARCBE-01

N/A

par-arcbe-01.litwareinc.com (10.17.10.21)

N/A

N/A

Monitoring Server

PAR-MON-01

N/A

par-mon-01.litwareinc.com (10.17.10.22)

N/A

N/A

Monitoring Server back-end SQL Server

PAR-MONBE-01

N/A

par-monbe-01.litwareinc.com (10.17.10.23)

N/A

N/A

Preparing DNS and Firewall Ports for the Singapore Deployment

Table 15-19 contains the summary view of all infrastructure requirements for the deployment in Singapore.

Table 15-19. Summary of Singapore Infrastructure Requirements

SERVER ROLE

NAME

EXTERNAL DNS NAME (IP ADDRESS)

INTERNAL DNS NAME (IP ADDRESS)

EXTERNAL FIREWALL PORT (DIRECTION)

INTERNAL FIREWALL PORT (DIRECTION)

Edge Server—Access Edge Service

SPO-ES-01

spo-es-ext.litwareinc.com (64.62.66.11)

spo-es.litwareinc.com (192.165.10.41)

443 TCP (inbound) (Internet → Access Edge Service for remote access) 5061 TCP (both)

(Internet ↔ Access Edge Service for federation)

5061 TCP (both) (Office Communications Server 2007 R2 pool ↔ Access Edge Service)

Edge Server—Web Conferencing Edge Service

SPO-ES-01

spo-wce.litwareinc.com (64.62.66.21)

spo-es.litwareinc.com (192.165.10.41)

443 TCP (inbound) (Internet → Web Conferencing Edge Server)

8057 TCP (outbound) (Office Communications Server 2007 R2 pool → Web Conferencing Edge Service)

Edge Server—A/V Edge Service (load balancer)

SPO-ES-01

spo-ave.litwareinc.com (64.62.66.31)

spo-es.litwareinc.com (192.168.10.41)

443 TCP (inbound) (Internet → A/V Edge Service) 3478 UDP (inbound)

(Internet → A/V Edge Service) 50,000-59,999 TCP & UDP (both) (Internet ↔ A/V Edge Service)

443 TCP (outbound) (Internal Net [all IPs] → A/V Edge Service) 3478 UDP (outbound)

(Internal Net [all IPs] → A/V Edge) 5062 TCP (outbound) (Internal Net [all IPs] → A/V Edge Service)

HTTP reverse proxy server

SPO-RP-01

spo-rp-01.litwareinc.com (64.62.66.30)

spo-rp-01.litwareinc.com (192.165.10.60)

443 TCP (inbound) Internet → HTTP reverse proxy server

443 TCP (inbound)

HTTP reverse proxy server → Office Communications Server 2007 R2 pool

SE Server (with archiving and monitoring servers collocated)

SPO-SE-01

N/A

spo-se-01.litwareinc.com (10.15.10.1)

N/A

N/A

Archiving Server and Monitoring Server back-end SQL Server

SPO-ARC-MONBE-01

N/A

spo-arcmonbe-01.litwareinc.com (10.15.10.21)

N/A

N/A

Litware, Inc.’s Deployment Path for Chicago

After preparing the server hardware and surrounding infrastructure—such as DNS and firewall configuration—Litware, Inc. can begin its Office Communications Server 2007 R2 deployment. Litware, Inc. decides to start with the deployment in the Chicago headquarters and follows the deployment path presented in Table 15-20. For each server role deployment, Litware, Inc. reads the information in the corresponding Office Communications Server 2007 R2 Deployment Guides at http://go.microsoft.com/fwlink/?LinkID=133726.

Table 15-20. Deployment Path for Chicago

STEP

SERVER

ACTION

1

CHI-BE

Install SQL cluster.

2

CHI-BE-01

Install SQL back end.

3

CHI-BE-02

Install SQL back end.

4

 

Create Enterprise Edition pool by using the Create Pool step from the Office Communications Server 2007 R2 setup program on the installation media (point to CHI-BE when prompted for a SQL Server).

5

CHI-POOL

Install and configure the pool load balancer

6

CHI-FE-01

Install the first front-end server. Install and assign the certificate on the server.

7

CHI-FE-02

Install the second front-end server. Install and assign the certificate on the server.

8

CHI-FE-03

Install the third front-end server. Install and assign the certificate on the server.

9

CHI-FE-04

Install the fourth front-end server. Install and assign the certificate on the server.

10

CHI-FE-05

Install the fifth front-end server. Install and assign the certificate on the server.

11

CHI-FE-06

Install the sixth front-end server. Install and assign the certificate on the server.

12

 

Test basic IM/presence functionality: Create two test user accounts and home them on the new pool. Test Office Communicator 2007 R2 client IM access first with one or more front-end servers offline and then with all of them online. Test the client with both manual and automatic configuration options. Sign in using two clients.

13

 

Test Web Access: Test Office Communicator 2007 R2 client Group Expansion and Global Address List download first with one IIS (installed on the front-end servers) offline and then with both online.

14

 

Test Web Conferencing: Install two Microsoft Office Meeting 2007 R2 clients to test Web Conferencing first with one or more Web Conferencing Services (installed on the front-end box) offline and then with all of them online.

15

 

Test A/V: Test Office Live Meeting 2007 R2 and Office Communicator 2007 R2 A/V Conferencing first with one or more A/V Conferencing Services (installed on the front-end box) offline and then with all of them online.

16

CHI-ARCBE-01

Install SQL Server for the Archiving back end.

17

CHI-ARC-01

Install Archiving Server (point to CHI-ARCBE-01 when prompted to specify a SQL Server).

18

 

Test IM archiving: Use Office Communicator 2007 R2 clients to send test messages and ensure the messages are being archived in the archiving database on the CHI-ARCBE-01 server.

19

CHI-MONBE-01

Install SQL Server for the Monitoring back end.

20

CHI-MON-01

Install the Monitoring Server (point to CHI-MONBE-01 when prompted to specify a SQL server).

21

 

Test Call Detail Record: Use Office Communicator 2007 R2 clients to send instant messages and Live Meeting clients to do A/V and Web Conferencing. Ensure these sessions are being recorded in the monitoring database on CHI-MONBE-01 server.

22

CHI-DIRBE

Install the SQL cluster for the Director pool.

23

CHI-DIRBE-01

Install the SQL back end.

24

CHI-DIRBE-02

Install the SQL back end.

25

 

Create Enterprise Edition Director pool by using the Create Pool step from the Office Communications Server 2007 R2 setup program (point to CHI-DIRBE when prompted for a SQL Server).

26

CHI-DIR

Install and configure the Director pool load balancer.

27

CHI-DIR-01

Install the first front-end server for the Director pool. Install and assign the certificate on the server.

28

CHI-DIR-02

Install the second front-end server for the Director pool. Install and assign the certificate on the server.

29

 

Test Office Communicator 2007 R2 client IM access first with one front-end server of the Director offline and then with both of them online. To ensure that the Office Communicator client hits the Director, manually configure Office Communicator to point to the Director pool.

30

CHI-ES

Install load balancers for the internal and external edges of the Edge Server.

31

CHI-ES-01

Install the first Edge Server. Install and assign the appropriate certificates. Configure the Edge Server to point to the Director pool.

32

CHI-ES-02

Install the second Edge Server. Install and assign the appropriate certificates. Configure the Edge Server to point to the Director pool.

33

 

Test Office Communicator 2007 R2 client IM external access first with one of the Access Edge Services offline and then with both online.

34

 

Test Live Meeting 2007 R2 client external Web Conferencing Edge Service access first with one of the Web Conferencing Edge Services offline and then with both online.

35

 

Test Office Communicator 2007 R2 client A/V Edge Service external access first with one of the A/V Edge Services offline and then with both online.

36

 

Test Live Meeting 2007 R2 client external A/V Edge Service access first with one or more A/V Edge Services offline and then with all of them online.

37

 

Install the SIP/PSTN gateway and connect it to the PSTN network.

38

CHI-MED-01

Install the Mediation Server. Install and assign certificates. Configure the Mediation Server to point to the Director pool (or EE pool) on the internal side and to an existing SIP/PSTN gateway on the external side.

39

 

Enable users for Voice and configure normalization rules, phone routes, and location profiles (refer to Chapter 11, for more details).

40

 

Test the Office Communicator 2007 R2 client by placing and receiving PSTN calls.

Litware, Inc.’s Deployment Path for Paris

The next location to be configured after the Chicago deployment in Litware, Inc.’s Office Communications Server 2007 R2 deployment is Paris. Litware, Inc. decides to deploy in the order described in Table 15-21.

Table 15-21. Deployment Path for Paris

STEP

SERVER

ACTION

1

PAR-BE

Install the SQL cluster.

2

PAR-BE-01

Install the SQL back end.

3

PAR-BE-02

Install the SQL back end.

4

 

Create the Enterprise Edition pool by following the "Create Pool" step from the Office Communications Server 2007 R2 setup program (point to PAR-BE when prompted for a SQL server).

5

PAR-POOL

Install and configure the pool load balancer.

6

PAR-FE-01

Install the first front-end server. Install and assign the certificate on the server.

7

PAR-FE-02

Install the second front-end server. Install and assign the certificate on the server.

8

PAR-FE-03

Install the third front-end server. Install and assign the certificate on the server.

9

PAR-FE-04

Install the fourth front-end server. Install and assign the certificate on the server.

10

 

Test basic IM/presence functionality: Create two test user accounts and home them on the new pool. Test Office Communicator 2007 R2 client IM access first with one or more front-end servers offline and then with all of them online. Test the client with both manual and automatic configuration options. Sign in using two clients.

11

 

Test Web Access: Test the Office Communicator 2007 R2 client Group Expansion and Global Address List download first with one IIS (installed on the Front End Servers) offline and then with both online.

12

 

Test Web Conferencing: Install two Live Meeting 2007 R2 clients to test Web Conferencing first with one or more Web Conferencing Services (installed on the front-end box) offline and then with all of them online.

13

 

Test A/V: Test Live Meeting 2007 R2 and Office Communicator 2007 R2 A/V Conferencing first with one or more A/V Conferencing Services (installed on the front-end box) offline and then with all of them online.

14

PAR-ARCBE-01

Install the SQL Server for the Archiving back end.

15

PAR-ARC-01

Install the Archiving Server (point to PAR-ARCBE-01 when prompted to specify a SQL Server).

16

 

Test IM Archiving: Use Office Communicator 2007 R2 clients to send test messages and ensure the messages are being archived in the archiving database on the PAR-ARCBE-01 server.

17

PAR-MONBE-01

Install the SQL Server for the Monitoring back end.

18

PAR-MON-01

Install the Monitoring Server (point to PAR-MONBE-01 when prompted to specify a SQL Server).

19

 

Test Call Detail Record: Use Office Communicator 2007 R2 Clients to send instant messages and Live Meeting clients to do A/V and Web Conferencing. Ensure these sessions are being recorded in the monitoring database on PAR-MONBE-01 server.

21

PAR-ES

Install internal and external load balancers Edge Server.

22

PAR-ES-01

Install the first Edge Server. Install and assign the appropriate certificates. Configure the Edge Server to point to the Director pool (in Chicago).

23

PAR-ES-02

Install the second Edge Server. Install and assign the appropriate certificates. Configure the Edge Server to point to the Director pool (in Chicago).

24

 

Test Office Communicator 2007 R2 client IM external access first with one or more Access Edge Services offline and then with all of them online.

25

 

Test Live Meeting 2007 R2 client external Web Conferencing Edge Service access first with one or more Web Conferencing Edge Services offline and then with all of them online.

26

 

Test Office Communicator 2007 R2 client A/V Edge Service external access first with one or more A/V Edge Services offline and then with all of them online.

27

 

Test Live Meeting 2007 R2 client external A/V Edge Service access first with one or more A/V Edge Services offline and then with all of them online.

Litware, Inc.’s Deployment Path for Singapore

The last pool location for Litware, Inc.’s Office Communications Server 2007 R2 deployment is Singapore. Litware, Inc. decides to deploy Office Communications Server 2007 R2 server roles in the order described in Table 15-22.

Table 15-22. Deployment Path for Singapore

STEP

SERVER

ACTION

1

SPO-SE-01

Install the Standard Edition Server. Install and set up certificates.

2

SPO-ARCMONBE-01

Install the SQL Server that will be shared by the Archiving and Monitoring back end.

3

SPO-SE-01

Install the Archiving and Monitoring Servers on the Standard Edition Server machine.

4

 

Test basic IM/presence functionality: Create two test user accounts and home them on the Standard Edition Server. Test Office Communicator 2007 R2 client IM access. Test the client with both manual and automatic configuration options. Sign in using two clients.

5

 

Test Web Access: Test the Office Communicator 2007 R2 client Group Expansion and Global Address List download.

6

 

Test Web Conferencing: Install two Live Meeting 2007 R2 clients to test Web Conferencing.

7

 

Test A/V: Test Live Meeting 2007 R2 and Office Communicator 2007 R2 A/V Conferencing.

8

SPO-ES-01

Install the Edge Server. Install and assign the appropriate certificates. Configure the Edge Server to point to the Director pool (in Chicago).

9

 

Test Office Communicator 2007 R2 client IM external access.

10

 

Test Live Meeting 2007 R2 client external Web Conferencing Edge Service access.

11

 

Test Office Communicator 2007 R2 client A/V Edge Service external access.

12

 

Test Live Meeting 2007 R2 client external A/V Edge Service access.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset