Topic Last Modified: 2011-05-09
Microsoft Lync Server 2010 uses TLS and MTLS to encrypt instant messages. All server-to-server traffic requires MTLS, regardless of whether the traffic is confined to the internal network or crosses the internal network perimeter. TLS is optional but strongly recommended between the Mediation Server and media gateway, If TLS is configured on this link, MTLS is required. Therefore, the gateway must be configured with a certificate from a CA that is trusted by the Mediation Server.
Requirements for client-to-client traffic depend on whether that traffic crosses the internal corporate firewall. Strictly internal traffic can use either TLS, in which case the instant message is encrypted, or TCP, in which case it is not.
The following table summarizes the protocol requirements for each type of traffic.
Traffic Protection
Traffic type | Protected by |
---|---|
Server-to-server |
MTLS |
Client-to-server |
TLS |
Instant messaging and presence |
TLS (if configured for TLS) |
Audio and video and desktop sharing of media |
SRTP |
Desktop sharing (signaling) |
TLS |
Web conferencing |
TLS |
Meeting content download, address book download, distribution group expansion |
HTTPS |
Media Encryption
Media traffic is encrypted using Secure RTP (SRTP), a profile of Real-Time Transport Protocol (RTP) that provides confidentiality, authentication, and replay attack protection to RTP traffic. In addition, media flowing in both directions between the Mediation Server and its internal next hop is also encrypted using SRTP. Media flowing in both directions between the Mediation Server and a media gateway is not encrypted. The Mediation Server can support encryption to the media gateway, but the gateway must support MTLS and storage of a certificate.
Note: |
---|
Audio/Video (A/V ) is supported with the new version of Windows
Live Messenger. If you are implementing A/V federation with Windows
Live Messenger, you must also modify the Lync Server encryption
level. By default, the encryption level is Required. You must
change this setting to Supported by using the Lync Server
Management Shell. For details, see Prepare for Support of
Public IM Connectivity in the Deployment documentation. Audio and video media traffic is not encrypted between Microsoft Lync 2010 and Windows Live clients. |
FIPS
Lync Server 2010 and Microsoft Exchange Server 2010 Service Pack 1 (SP1) operate with support for Federal Information Processing Standard (FIPS) 140-2 algorithms if the Windows Server 2008 Service Pack 2 (SP2) Windows Server 2008 R2 operating systems are configured to use the FIPS 140-2 algorithms for system cryptography. To implement FIPS support, you must configure each server running Lync Server 2010 to support it. For details about the use of FIPS-compliant algorithms and how to implement FIPS support, see Microsoft Knowledge Base article 811833, The effects of enabling the “System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing" security setting in Windows XP and in later versions of Windows at http://go.microsoft.com/fwlink/?linkid=3052&kbid=811833. For details about FIPS 140-2 support and limitations in Exchange 2010, see Exchange 2010 SP1 and Support for FIPS Compliant Algorithms at http://go.microsoft.com/fwlink/?LinkId=205335.