Forum Discussion
Firewall config for Skype for Business Reverse Proxy
- Jul 26, 2016
So when you have a split deployment as mentioned for reverse proxy traffic then big ip 1(DMZ) would receive traffic and forward to big ip 2 (internal, in front of FE servers) on the already translated port 4443. Big ip 2 will then pass that through to individual FE servers on the same 4443 port.
So the real answer to your question is between the two big ip's you should allow for 80, 8080, 443 and 4443 to ensure traffic processing.
So when you have a split deployment as mentioned for reverse proxy traffic then big ip 1(DMZ) would receive traffic and forward to big ip 2 (internal, in front of FE servers) on the already translated port 4443. Big ip 2 will then pass that through to individual FE servers on the same 4443 port.
So the real answer to your question is between the two big ip's you should allow for 80, 8080, 443 and 4443 to ensure traffic processing.
- JamesSevedge_23Jul 26, 2016Historic F5 Account
Although just to suplement that answer the traffic is going to be 443 when it hits dmz and then 4443 between big ip's. However opening up the other ports may be required depending on the other S4B services you are deploying.
- david_baumgart_Jul 26, 2016Cirrus
Followup question. I understand that i need to allow the traffic such as this:
WAN/NAT -> DMZ Reverse proxy VIP DMZ Big IP Self IP -> Internal Reverse Proxy VIP
But what about the return path? Do I allow the traffic back from the Internal Big IP VIP to the DMZ Big IP self IP? Or does it turn around and try to send from Internal BIG IP Self IP -> DMZ Self IP?
Or am I completely missing the target here?
Thanks again!
- JamesSevedge_23Jul 26, 2016Historic F5 Account
The return path will be the same (dmz self ip to internal vip). Snat auto map is applied on the DMZ vip for reverse proxy traffic, so internal reverse proxy vip sees traffic as sourced from dmz big ip self ip (as you stated).
- david_baumgart_Jul 26, 2016Cirrus
So just to be clear, because for some reason I am having a brain glitch when reading that reply (my apologies for being dense!), on the path BACK OUT to DMZ going from internal to external, the VIP is the IP sending back to the DMZ self ip rather than it passing the return process off to the internal self IP, correct?
This makes sense from a networking perspective, I just wanna make sure I'm 100% clear. Thanks again and sorry for being repetitive!
- JamesSevedge_23Jul 26, 2016Historic F5 Account
That is correct, clarifying is never being dense, just thorough! :)
- david_baumgart_Jul 26, 2016Cirrus
Thank you my friend!
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com