Forum Discussion
sipple31_85114
Jan 16, 2012Nimbostratus
F5 and Lync
Hello,
I am working on a new Lync environment. We have a F5 LTM in front of our Lync edge servers in a DMZ. We do not have a Microsoft reverse proxy available nor the budget to build one... but we need certain traffic to get routed to the internal Lync servers, bypassing the edge. Can this be done through an iRule instead of a standalone proxy setup? Any info would be great.
thanks,
-Luke
- mikeshimkus_111Historic F5 AccountHi,
- Chad_103287NimbostratusAny ETA on when we might see something?
- sipple31_85114NimbostratusStill would love some help on this. Currently still struggling with using it as a reverse proxy. We have everything working with external web services and the Lync client or the web client. The last piece to the puzzle is mobility. Androids seem happy but iPhones are whining about the cert. They hit the F5 and immediately fail with cert errors. It's baffling!
- Who is your cert issued by? It is possible that clientside SSL profile on the BigIP is not chained correctly - if your certificate requires an intermediate certificate to be chained, some browsers/devices will give you untrusted warning because they don't have the right CA bundle/chain installed on them. I've seen issues where Windows devices would not complain of SSL, but mobile devices such as iPads would - thus I highly recommend verifying proper CA/Chain installed on the BigIP and the clientsideSSL profile.
- sipple31_85114NimbostratusPosted By Michael Koyfman on 02/21/2012 10:39 PM
Do you think it should be just cert or entire chain?
- Ed_Swindelles_2Nimbostratus@sipple31 Did you ever get this resolved? Having the same issue.
- sipple31_85114NimbostratusPosted By Ed Swindelles on 03/07/2012 10:56 AM
Basically it seems that SOME (notice I didn't say all) parts of Lync are unhappy with how the F5 is chaining or terminating the certs. We even tried putting a cert from our corporate CA on the outside edge of the F5, trusting it, and still wouldn't work. Definitely something F5 needs to work out.
They opened up an engineering ticket for us last night - I can let you know what happens.
- Ed_Swindelles_2NimbostratusThanks. I actually solved this problem yesterday afternoon, with help from the experts at Microsoft "tier 3" support. The engineer had me to packet captures on our F5 units for both an iPhone and a WP7 connection. The former fails, the latter succeeds. He compared the packet captures and found that the iPhone tries to initiate a TLS v1.2 connection, and the F5 closes the connection. The WP7 initiates a TLS v1.0 connection, and communication continues. With that information, I found this F5 KB article: https://support.f5.com/kb/en-us/solutions/public/13000/000/sol13037.html?sr=19939546. This article identifies a TLS bug in specific firmware versions when using TLS v1.1 or v1.2. The solution is to upgrade to at least BIG-IP v10.2.2 HF1. I was on the release version of 10.2.2. I updated to 10.2.2 HF4, and iPhones and iPads could suddenly connect fine.
- hooleylistCirrostratusThat's great info Ed. Thanks for posting the solution. TMM added support for TLS1.2 in versions 10.2.3 and 11.0 (and apparently 10.2.2 with a hotfix).
Recent Discussions
Related Content
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects