Before you deploy your perimeter network, you need to verify
that your system infrastructure and the servers on which you will
install Edge Server meet hardware and software requirements. For
details about these requirements, see
Internal Office
Communications Server Component Requirements. When the
environment is ready, you set up the infrastructure for Edge
Servers, install the Edge Servers, activate and configure the Edge
Servers, set up certificates on the servers, and start the
services. Table 1 provides an overview of the required steps. For
details about the required steps, see
Deploying Edge Servers for External User
Accessin the Deploying Office Communications
Server 2007 R2 documentation.
Table 1. Edge Server Deployment Process
Phase |
Steps |
Permissions |
Documentation |
Set up the infrastructure for Edge Servers.
|
- Configure a reverse proxy in the perimeter network.
- Configure DNS.
- Configure firewalls.
- Configure a Director (recommended).
|
Administrators group
|
Set Up the Infrastructure for Edge
Serversin the Deploying Edge Servers for External
User Access documentation
|
Set up Edge Servers.
|
- Set up load balancers.
- Install the Edge Server software.
- Activate the Edge Servers.
- Configure the Edge Servers.
- Set up certificates for the Edge Servers.
- Start the Edge Server services.
|
Administrators group
|
Set Up Edge Serversin the Deploying Edge
Servers for External User Access documentation
|
Configure the environment.
|
- Configure federation.
- Configure settings for anonymous users.
- Configure users for federation, public IM connectivity, and
remote user access.
- Connect your internal servers with your Edge Servers.
|
Administrators group
|
Configure the Environmentin the
Deploying Edge Servers for External User Access documentation
|
Validate your edge configuration.
|
- Validate the Edge Server configuration.
- Validate that the internal servers can connect to the Edge
Servers.
|
Administrators group
|
Validate Your Edge Configurationin the
Deploying Edge Servers for External User Access documentation
|