Lync mobility deployment – Quick reference guide


  •        Login to frontend server and ensure that mobility services are successfully installed. You can see new virtual directory (McX) created under internal and external web sites . 
  •        Verify following DNS records are resolving properly. lyncdiscoverinternal.<sipdomain from internal network and lyncdiscover.<sipdomain from public DNS. Ensure that these IP addresses are pointed to reverse proxy external           interface. 
  •         Ensure that port 5086 is allowed from internal network and port 5087 is allowed from internet for mobility service process. You should set the ports on external and internal web services using Set-CsWebServer commandlet. 
  •         Verify certificate subject alternative name on frontend , director and reverse proxy roles . Following SAN should be added on all boxes . lyncdiscoverinternal.<sipdomain , lyncdiscoverinternal.<sipdomain . Reverse proxy required only external auto discover SAN. 
  •        Verify web publishing rule on ISA box and ensure that external traffic is forwarding to frontend server as expected. Port 80-8080 forwarding doesn’t need a SAN entry on reverse proxy. However 443-4443 does required a SAN entry on reverse proxy server . 
  •          Have you tested peer to peer mobility instant messaging after deployment?  It should be working as expected. 
  •        WI-FI internal mobility connectivity required cookie-based persistence set on hardware LB for internal web service URL. 
  •      For push notification for apple IOS and windows phones required port 5223 from enterprise WI-FI network . 
  •       For joining conference and work call feature required enterprise voice feature to be enabled for users .

Comments (6)

  1. @Jward – Please refer below link http://www.microsoft.com/…/details.aspx  and have a look at "update certificates with new subject alternative names" . You can use Set-CsWebServer cmdlet to set the ports .

  2. @pyore – Yes , you are right , internal website should forward the connection to ISA external leg and get it connected.

  3. @JBoyd – I am going to highlight few sentences mentioned in the mobility deployment guide  mobility , The Microsoft Lync Server 2010 Autodiscover Service returns all the Web Services URLs for the user's home pool, including the Mobility Service URLs. However, both the internal Mobility Service URL and the external Mobility Service URL are associated with the external Web Services FQDN. Therefore, regardless of whether a mobile device is internal or external to the network, the device always connects to the Microsoft Lync Server 2010 Mobility Service externally through the reverse proxy.

    So what I meant was internal mobility client will eventually forwarded to reverse proxy.

  4. JWard says:

    Good post, we're finding it very useful. A couple questions though:

    How do you add SANs to internally issued certificates?

    How do you set the ports for internal/external access and check that they're listening correctly?

    Thanks,

    J

  5. JBoyd says:

    Verify following DNS records are resolving properly. lyncdiscoverinternal.<sipdomain from internal network and lyncdiscover.<sipdomain from public DNS. Ensure that these IP addresses are pointed to reverse proxy external           interface.

    Are you saying that both lyncdiscover.sipdomain and lyncdiscoverinternal.sipdomain should be pointed to the reverse proxy external interface?  I've read in other blogs that internal should be pointed to the director or front end.

  6. pyore says:

    Hi Saleesh,

    When I browse to
    lyncdiscover.external.x
    from the internet I get the external webservices url i.e. meetings.external.x

    However when I browse to
    lyncdiscoverinternal.internal.x
    I get passed our lync standard server fqdn lync.external.x… I would have expected to be passed the external webservices??

Skip to main content