Microsoft Skype for Business Server 2015
Problem this snippet solves:
New release candidate iApp template and deployment guide for Microsoft Skype for Business Server 2015 (formerly Lync Server 2010/2013). For more information and complete guidance on configuring the iApp template, see the associated deployment guide: http://www.f5.com/pdf/deployment-guides/microsoft-skype-for-business-dg.pdf
f5.microsoft_skype_server_2015.v1.0.0rc9: posted to downloads.f5.com in 11/2017
RC-9 was posted to downloads.f5.com (as will most new versions of this template). It contained the following changes: new BIG-IP AFM IP Intelligence threat categories to support BIG-IP v13.1 and support for route domain 0 from non-Common partitions.
f5.microsoft_skype_server_2015.v1.0.0rc7: posted 09/21/2016
RC-7 provides additional SIP domain support within reverse proxy, a monitor schema change for reverse proxy to make use of the 200 OK response when querying lyncdiscover/lyncdiscoverinternal, support for the director service standalone use case(separate LTM from Front End service), added support to ask for the IP phone update url to allow connections through reverse proxy and added a port 80 Virtual Server in addition to the existing 443 Virtual Server for reverse proxy.
RC 5 and 6 were never released to the public, this includes changes as a part of those RC's
f5.microsoft_skype_server_2015.v1.0.0rc4: posted 02/16/2016
RC-4 Fixes a security log profile error when deploying on versions of BIG-IP earlier than 11.4, where AFM is not available.
f5.microsoft_skype_server_2015.v1.0.0rc3: posted 01/22/2016
RC-3 attaches a supplemental ICMP monitor to the Edge internal UDP virtual server. See https://support.f5.com/kb/en-us/solutions/public/6000/100/sol6143.html for more information.
f5.microsoft_skype_server_2015.v1.0.0rc2: posted 01/11/2016
RC-2 contains only a small correction to the iRule produced by the iApp template. The iApp will now always force the FQDN written to lowercase in the iRule, even if the user enters CAPITAL letters.
f5.microsoft_skype_server_2015.v1.0.0rc1: posted 07/06/2015
New iApp template for Skype for Business.
Code :
70782
- The-messengerCirrostratus
Mike, I haven't opened a case with this, wanted to get the Skype environment build complete and tested. But I can see why the monitor fails. The host name in the monitor points to the dns name for the reverse proxy which resolves externally. So the monitor is hitting the VIP for the reverse proxy not the reverse proxy pool member. https://technet.microsoft.com/en-us/library/hh690030(v=ocs.15).aspx
- mikeshimkus_111Historic F5 Account
The monitor should send that request to the IP address of the pool members, not try to resolve it. Are you using FQDN nodes as your pool members?
- The-messengerCirrostratus
No, I configured normally using the iApp, pool members are all ip addresses.
- mikeshimkus_111Historic F5 Account
The monitor should use the pool member IP and forward the hostname as part of the host header. So no name resolution should be happening. You should open a case so we can get a look at your configuration, logs, etc.
You can also enable monitor logging on the node to see what BIG-IP is getting as a response: https://support.f5.com/csp/article/K12531
- The-messengerCirrostratus
Skype has been working fine with the iapp for awhile now. Today tried to do a file transfer with a federated contact and it fails, from inside the network. If I connect outside it is successful. Skype diagrams call for UPD 50000-59999, the iapp has not created a VS to provide this. I can see the external client trying to make a connection on 52722.
- Joe_JordanRet. Employee
Hi Messenger, Have you created the forwarding virtual server for Edge server to client communication (see page 31 of https://www.f5.com/pdf/deployment-guides/microsoft-skype-for-business-dg.pdf)?”
- The-messengerCirrostratus
Thanks Joe - this makes sense from what I see in the traffic. Is development going to continue for this iapp to include the FastL4 VS?
- The-messengerCirrostratus
So I created a new fastL4 profile and wildcard server using the protocol, with F5 services help online - I created it set to disabled. I would need to wait for a change window to set the skype edge server's default route through the big-ip.
After this I could not connect to my portal/Remote Desktop. I've spent hours trying to see what I had changed that the RDP portal quit working, till I found someone else with the same issue. The wildcard VS, even though it was disabled, broke my RDP application.
I hope this skype iapp is developed further, at this point there is too much maintenance. I'm going to have to point the firewall directly to the edge and reverse proxy servers for now.
- mikeshimkus_111Historic F5 Account
Hi The-Messenger, if your Edge servers weren't using the LTMs as the default GW, you don't need to create the wildcard virtual server. In that case, you shouldn't need to create ephemeral port VS either, as the traffic should be set up directly between the Edge and clients.
Can you clarify which side of the Edge LTM was seeing the requests on port 52722?
- The-messengerCirrostratus
Thanks for the clarification. I see the 50k range from the paloalto firewall, outside the edge. The palo has NATs configured for vips on the Big-IP. I see it when trying to share files, screen share to federated contacts.