How to Deploy with Microsoft Office Communications Server
This article refers to firmware 3.1 and higher, running on model 340 or higher, and Microsoft Office Communications Server 2007 R2 Enterprise Edition.
This article assumes you are connected to the Barracuda Load Balancer web interface and have an activated subscription.
The deployment tasks in this article are based on the example described in the article Microsoft® Office Communications Server Deployment Example.
For a description of supported deployment options, refer to Understanding Microsoft Office Communications Server Deployment.
If your Barracuda Load Balancers are clustered, the configuration between the active and passive systems is synchronized; there is no need to modify any passive Barracuda Load Balancers.
To deploy the Barracuda Load Balancer in an Office Communications Server environment, complete the following tasks:
Where | |
Do this on all active Barracuda Load Balancers, both internal and external. If your systems are clustered, the passive systems do not need to be configured separately. | |
Do this on the internal-facing Barracuda Load Balancers. | |
If you have an edge deployment, you must also complete the following tasks: | |
Do this on the internal-facing Barracuda Load Balancers. | |
Do this on the external-facing Barracuda Load Balancers. | |
Check this on all Edge Servers. | |
If you have deployed Director Servers, you must also do the following task: | |
Do this on the Director Barracuda Load Balancers. | |
If you have deployed Communicator Web Access, you must also complete the following task: | |
Do this on the CWA Barracuda Load Balancers. | |
Task 1. Modify the TCP and UDP Connections Settings
The Barracuda Load Balancer comes configured with default settings that work with most applications. Office Communications Server requires changes to the default advanced IP settings on the Barracuda Load Balancer to ensure it complies with Microsoft’s specifications.
To modify the TCP and UDP Connections settings on the System Settings page:
Go to the ADVANCED > System Settings tab in the web interface.
In the TCP Connections Timeout box, enter 1800 (30 minutes).
In the UDP Connections Timeout box, enter 1800 (30 minutes).
Task 2. Configure Enterprise Pool Services
To configure all Services needed for an internal OCS deployment:
Go to the BASIC > Services page in the web interface.
Add each Service listed in the table using the steps that follow; all of these Services are required :
For the DCOM WMI Front Service only, edit each Real Server associated with the Service by clicking the Edit icon next to each Real Server entry in the table. On the Real Server Detail page that appears:
In the Server Monitor section, set the Testing Method to TCP Port Check.
In the Port field, enter the value 5061. It is better to test port 5061 for this Service because port 135 always passes the TCP port check even if OCS Services are not responding.
To add a Service:
In the Service Name box, enter the name for the Service.
In the Virtual IP Address box, enter the IP address for the FQDN of your Internal OCS Pool.
Select the protocol and in the Port box, enter the port for the Service in the table.
In the Real Servers box, enter the IP address for every Front-End server in your OCS Pool.
The following Services are optional ; add each Service only if you have deployed that feature.
Service Name | Virtual IP Address | Protocol | Port | Real Servers |
Application Sharing (optional) | IP for FQDN of Internal enterprise OCS Pool | TCP | 5065 | IP addresses of your Front-End Servers |
QoE Agent (optional) | IP for FQDN of Internal Enterprise OCS Pool | TCP | 5069 | IP addresses of your Front-End Servers |
Response Group Service (optional) | IP for FQDN of Internal Enterprise OCS Pool | TCP | 5071 | IP addresses of your Front-End Servers |
Conferencing Attendant (optional) | IP for FQDN of Internal Enterprise OCS Pool | TCP | 5072 | IP addresses of your Front-End Servers |
Conferencing Announcement (optional) | IP for FQDN of Internal Enterprise OCS Pool | TCP | 5073 | IP addresses of your Front-End Servers |
Outside Voice Control (optional) | IP for FQDN of Internal Enterprise OCS Pool | TCP | 5074 | IP addresses of your Front-End Servers |
For each Service created, edit the Service by clicking the Edit icon next to the Service entry in the table. On the Service Detail page that appears:
In the General section, set Service Type to TCP Proxy.
In the Advanced Options section, set Session Timeout to 0 (session never times out).
Task 3. Configure Internal Edge Services
Complete this task if you have an edge deployment.
To configure all the Services needed for a load balanced OCS Edge deployment, perform the following steps on the internal-facing Barracuda Load Balancer:
Go to the BASIC > Services page in the web Interface.
Add each Service listed in the table using the steps that follow; all Services are required :
To add a Service:
In the Service Name box, enter the name for the Service.
In the Virtual IP Address box, enter the IP address for the FQDN of your Internal Edge OCS Pool.
Select the protocol and in the Port box, enter the port for the Service in the table.
In the Real Servers box, enter the internal IP address for every Edge server.
For each TCP Service created, edit the Service by clicking the Edit icon next to the Service entry in the table.
In the General section, set the Service Type to TCP Proxy.
In the Advanced Options section set Session Timeout to 0 (session never times out).
No change is required for RDP Media Edge, which is a UDP Service.
Task 4. Configure External Edge Services
Complete this task if you have an edge deployment.
The Real Servers should be physically connected to a switch which is connected to the LAN port of the Barracuda Load Balancer.
To configure all Services needed for a load balanced Edge Deployment of Office Communications Server, perform the following steps on the external-facing Barracuda Load Balancer:
Go to the BASIC > Services page in the web Interface.
Add each Service listed in the following table:
To add a Service:
In the Service Name box, enter the name for the Service.
In the Virtual IP Address box, enter the IP address for the FQDN of your Internal Edge Lync Pool.
In the Port box, enter the port for that Service in the table.
In the Real Servers box, enter the internal IP address for every Edge Server.
No modifications need to be made to the default settings for these Services.
Task 5. Confirm the Configure Edge Server Wizard Setting
Complete this task if you have an edge deployment.
Verify the following on the Edge Servers:
When completing the Configure Edge Server Wizard, the Internal Interface dialog displays the following message:
“If you are using a load balancer, specify the IP address of the local server and the FQDN of the load balancer’s VIP."
In the FQDN for the internal interface field, enter the FQDN for the Access Edge DNS entry that external users are to use.
When correctly set, when the Edge Servers are queried for their host name strings, they return the FQDN of the VIP address for the external Access Edge instead of the FQDN of the internal interface. This ensures that the Subject Alternative Name (SAN) on the certificate assigned to this internal interface for the Access Edge matches the host string of the Edge server.
Task 6. Configure Director Services
Complete this task if you have deployed Director Servers.
To configure all the Services needed for Director Services, perform the following steps on the Director Barracuda Load Balancer:
Go to the BASIC > Services page in the web interface.
Add each Service listed in the following table:
To add a Service:
In the Service Name box, enter the name for the Service.
In the Virtual IP Address box, enter the IP address for the FQDN of your Director Service.
In the Port box, enter the port for that Service in the table.
In the Real Servers box, enter the internal IP address for every Director Server.
For each Service created, edit the Service by clicking the Edit icon next to the Service entry in the table. On the Service Detail page that appears, complete the following:
In the General section, set Service Type to TCP Proxy.
In the Advanced Options section, set Session Timeout to 0 (session never times out).
Task 7. Configure Communicator Web Access Services
Complete this task if you have deployed Communicator Web Access.
Communicator Web Access (CWA) is an optional feature of Office Communication Server that allows users who do not have access to the Office Communicator Client to access many of the features of Office Communications Server from a browser. Installations of CWA that have greater than 5000 users should deploy a load balancer for this feature. Microsoft recommends that you dedicate one or more load balancers that are used only for CWA for acceptable performance.
Configure the CWA servers to use HTTP rather than HTTPS. This allows the Barracuda Load Balancer to do SSL offloading, which improves the performance of the CWA Service. Also, this allows end user connections to be maintained using cookies, as recommended by Microsoft.
To configure the Services needed for a load balanced Communicator Web Access Server, perform the following steps on the Communicator Web Access Barracuda Load Balancer:
Go to the BASIC > Certificates page in the web interface, and upload the CWA certificate to the Barracuda Load Balancer.
Go to the BASIC > Services page in the web interface.
Add the Service listed in the following table:
To add a Service:
In the Service Name box, enter the name for the Service.
In the Virtual IP Address box, enter the IP address for the FQDN of your CWA Service.
In the Port box, enter the port for that Service in the table.
In theReal Servers box, enter the internal IP address for every CWA Server.
Edit the Service by clicking the Edit icon next to the Service entry in the table. On the Service Detail page that appears, complete the following:
In the General section, set Service Type to Layer 7 - HTTP.
In the Service Monitor section, in the Testing Method list, click HTTP. In the Test Target box, enter http://<fqdn of your CWA website>/
For example,
http://cwa.domain.local/In the Test Match box, enter Microsoft Corporation.
In the Persistence section, change the Persistence Type to HTTP Cookie.
In the SSL Offloading section, set Enable HTTPS/SSL to Yes. In the SSL Certificate list, select the name of the certificate you uploaded for CWA.
In the Advanced Options section, set Session Timeout to 0 (session never times out).
For each Real Server added, edit the Real Server by clicking the Edit icon next to each Real Server entry in the table. In the Real Server Detail section, change the value for Port to 80.
To create a rewrite rule, go to the Advanced > URL Rewrites page in the web interface and create a rule to replace outgoing http://<fqdn of your CWA Web site> with https://<fqdn of your CWA Web site>. This rewrites absolute paths written by CWA so that they all appear as encrypted links; this rule prevents unsecure content errors in the browser:
In the Layer 7 - HTTP Services section, select the CWA Service from the list.
In the Response Body Rewrite section, create a new rule with the following options:
Rule Name: cwa
Rule Order: 1
Host Match: <fqdn of your CWA Web site>, e.g.
cwa.domain.localURL Match: /cwa/client/*
Search String: http://<fqdn of your CWA Web site>, e.g.
http://cwa.domain.localReplace String: https://<fqdn of your CWA Web site>, e.g.
https://cwa.domain.local
Create the CWA Redirect Service; this Service ensures that end users are redirected from HTTP to the HTTPS Service:
Go to the BASIC > Services page in the web interface.
In the Service Name field, enter the CWA Redirect Service name.
In the Virtual IP Address field, enter the IP address for the FQDN for your CWA Service.
Select the protocol TCP, and in the Port field enter 80.
Edit the CWA Redirect Service by clicking the Edit icon next to the Service entry in the table:
In the General section, set the Service Type to Layer 7 - HTTP.
Set Enable HTTP Redirect toYes.
Test the CWA installation:
Open a browser and enter: https://<fqdn of your CWA Web site>, e.g.
https://cwa.domain.localEnsure that all images load and that you are able to log into the CWA application without errors.
Your installation is now complete.
Refer to the Microsoft TechNet online library for more information on the following topics: