This topic is designed to help you understand the infrastructure design required for deploying multiple Forefront Unified Access Gateway (UAG) servers. Multiple Forefront UAG servers can be joined together into an array, in which all array members share the same configuration and settings. An array deployment allows you to scale Forefront UAG capacity and provide high availability to remote endpoints that connect to Forefront UAG portals and sites. In addition, you can load balance traffic between array members, thus providing failover for connecting endpoints.
This deployment has the following infrastructure design requirements:
- Selecting a topology
location for the Forefront UAG server
- Joining the Forefront
UAG server to a domain or workgroup
- Configuring
network addressing and routing
- Configuring DNS servers
and settings
- Configuring the array
infrastructure
Selecting a topology location for the Forefront UAG server
The most common topology locations for Forefront UAG servers are:
- Behind a frontend firewall─The
Forefront UAG server is placed in the internal network, behind a
frontend firewall at the corporate edge. The Forefront UAG server
has one network adapter that routes to the frontend firewall, and
the other is in the internal network.
- Between a frontend firewall and a backend
firewall─The Forefront UAG server is placed in a perimeter
network, between a frontend firewall protecting the edge, and a
backend firewall protecting the internal network.
If Forefront UAG is located behind an edge or perimeter firewall, verify that the required ports and protocols are open on the firewall, as described in the table below.
Behind a frontend firewall
There are advantages and disadvantages to placing the Forefront UAG server behind the frontend firewall, as follows:
- It is the simplest solution, requiring the least amount of
hardware and configuration.
- It provides a single point of data, as the Forefront UAG
server, published servers, and infrastructure servers are all
located within the internal network.
- It provides a simple configuration for external users who
connect via Forefront UAG, and internal users in the internal
network can all view the same content.
- The main disadvantage of this design is that the corporate
internal network is separated from the Internet by a single
firewall. Note that the Forefront UAG server itself is protected by
Forefront TMG running as a firewall on the Forefront UAG server.
Forefront TMG is installed by default during Forefront UAG
setup.
If the Forefront UAG server is located behind a frontend firewall, the firewall must be configured to allow the following traffic through to the Forefront UAG server:
- HTTP traffic (port 80)
- HTTPS traffic (port 443)
Between a frontend firewall and a backend firewall
There are advantages and disadvantages to placing the Forefront UAG server between a frontend and backend firewall, as follows:
- Intranet content, such as servers published by Forefront UAG,
can be isolated in the perimeter network and separated from
corporate content intended for internal access only.
- If content in the perimeter network is compromised or corrupted
as a result of Internet access, the integrity of the content in the
corporate network is retained.
- If the Forefront UAG server is located in the perimeter
network, and published servers or infrastructure servers are
located in the internal network, the backend firewall must be
configured to let the required protocols and ports through the
firewall, so that Forefront UAG can effectively publish backend
applications, and access infrastructure servers, such as
authentication servers, as required.
To allow remote endpoints to access the Forefront UAG server located in a perimeter network behind a frontend firewall, the following traffic must be allowed through the frontend firewall:
- HTTP traffic (port 80)
- HTTPS traffic (port 443)
Configuring the backend firewall
Configuration of the backend firewall depends upon where the backend servers publishing via Forefront UAG are located, and on the location of infrastructure servers, such as Active Directory and authentication servers, used by Forefront UAG. If published backend servers are located in the internal network, allow the following traffic through the backend firewall:
- HTTP traffic (port 80)
- HTTPS traffic (port 443)
If infrastructure servers are located in the internal network, some of the following may be required depending upon the authentication methods used by Forefront UAG:
Infrastructure server | Protocol | Port |
---|---|---|
Domain controller |
Microsoft-DS traffic |
TCP 445 UDP 445 |
Kerberos authentication |
TCP 88 UDP 88 |
|
LDAP |
TCP 389 UDP 389 |
|
LDAPS |
TCP 636 UDP 636 |
|
LDAP to GC |
TCP 3268 UDP 3268 |
|
LDAPS to GC |
TCP 3269 UCP 3269 |
|
DNS |
TCP 53 UDP 53 |
|
RADIUS server |
RADIUS port |
UDP 1645 or 1812 |
SecureID ACE |
SecurID ACE port |
UJDP 5500 |
Joining the Forefront UAG server to a domain or workgroup
Each Forefront UAG server that you want to join to an array must be installed as a domain member, as follows:
- All array members must belong to the same domain.
- You can install Forefront UAG servers in an existing
domain.
- Alternatively, you can create a domain for Forefront UAG
servers. Then set up a one-way or two-way trust between the
Forefront UAG server domain and the main corporate domain.
For information about joining a domain, see How to join your computer to a domain (http://go.microsoft.com/fwlink/?LinkId=179039). For information about creating a domain, see Creating a domain design (http://go.microsoft.com/fwlink/?LinkId=179040). For information about setting up trusts, see, Checklist: Creating a forest trust (http://go.microsoft.com/fwlink/?LinkId=179041).
Configuring network addressing and routing
Network addressing and routing requirements for deploying an array of Forefront UAG servers include the following:
- Forefront UAG deployment is highly dependent on the correct
network configuration. When you configure the internal network
during deployment, it includes any subnets that are included in the
internal network. When you define the internal network you must
include all subnets that are reachable from the adapter. Note that
clients who connect to the internal network using a VPN client
connection (Forefront UAG SSL network tunneling) will be able to
access all subnets reachable through the internal network
adapter.
Configuring DNS servers and settings
DNS infrastructure requirements when deploying a Forefront UAG server include the following:
- A public DNS server must be able to resolve the public host
name specified by remote endpoints to reach Forefront UAG sites
that you create on the Forefront UAG server. If you are load
balancing an array using a VIP, the public host name must resolve
to the VIP.
- The Forefront UAG server requires internal name resolution to
resolve the names and IP addresses of backend published servers,
and infrastructure servers, such as authentication servers.
- Forefront UAG supports alternate access mapping when publishing
SharePoint. Alternate access mapping allows you to publish a single
SharePoint Web server using multiple different host names. Each
SharePoint application on the server is associated with a unique
public host name, which is used for remote access to the
application. Alternate access mapping requires a public DNS entry
for each public host name that might be specified by client
endpoints to reach published SharePoint applications.
- Forefront UAG supports a new feature that allows you to publish
an application using an application-specific host name instead of
the portal host name. In order for remote endpoints to reach these
applications, a public DNS server must be able to resolve each
application-specific host name that you configure. Note that the
application-specific host name must resolve to the same IP address
as the portal host name.
Configuring the array infrastructure
The infrastructure requirements for deploying a Forefront UAG array include the following:
- If you want to use a hardware load balancer for balancing
endpoint requests to array members, ensure that it is set up before
array deployment.
- In a Forefront UAG array, one of the array members acts as the
array manager and holds the configuration for all array members.
The array manager requires a user account that is used when it
communicates internally with array members. Before deploying an
array, ensure you have a domain account that is recognized by all
the Forefront UAG servers you will deploy in the array, and that it
has local administrator permissions on all Forefront UAG computers
that you will add to the array. It should be an account with a long
expiry period.