UCPrimer
  • Tech Blog
  • About UCPrimer.com

Migrating to Lync2013 Edge Server 

3/13/2013

9 Comments

 
In a previous article, we discussed the steps to deploy a new Lync2013 Edge server into a Lync2013 FE pool that was coexisting with a legacy Lync2010 Pool with Lync2010 Edge. Users homed on the Lync2013 FE pool continued to use the legacy Edge server for remote access and federation. Although having both the legacy Edge and the 2013 Edge providing remote access is possible, such a configuration would be more difficult to manage and moreover, only one Edge can be used for federation. In this article, the steps to migrate completely to the new 2013 Edge will be discussed. Users still homed on the legacy Lync2010 FE pool as well as those homed on the new Lync2013 FE pool  will use the new 2013 Edge for Remote Access and Federation. The end result should look like the diagram below:
Picture
In a production environment, changing the federation route and media traffic route requires downtime for the Lync Server 2013 and Lync Server 2010 Edge Servers. Federated access will be unavailable for the duration of the outage.

Configure the Lync2013 FE Pool to use the new 2013 Edge

In topology builder, edit the properties of the Lync2013 FE and associate the Edge pool with the new 2013 Edge:
Picture
The Edge pool (for media) should now list the new 2013 Edge as shown below:
Picture
Now edit the properties of the 2013 Edge server and verify that the next hop pool now points to the Lync2013 FE pool as shown below:
Picture
For those users still homed on the legacy Lync2010 FE pool, we also want them to use the new Lync2013 Edge for media traffic. In topology builder, edit the properties of the Lync2010 FE pool and associate the edge pool to the new 2013 Edge:
Picture
Next. since we want to migrate federation services from the legacy Edge to the 2013 Edge, we edit the properties of the Edge2013 to enable federation:
Picture
Note the warning that the topology already contains other federation-enabled Edge pools. This is because we have not yet disabled federation on the legacy Edge server, a step which will be done later. For now, we publish the topology:
Picture
After successfuly publishing the topology, click to open the to-do list to see which servers require updating of Lync components and then update by opening the Deloyment Wizard on those servers and running "Install or Update Lync Server System" and "Setup or Remove Lync Server Components".

Changing the Federation Route

We now want to migrate the federation route from the legacy Edge to the new 2013 Edge. Using topology builder, we edit the properties of the Site and select the new 2013 Edge under the "Enable SIP Federation" checkbox:
Picture
Topology will now display at the top level node "Lync Server" a "Topology validation warning" that there is more than one Federated Edge Server which is normally the case for migrations, but as stated, only one Edge would be actively used for federation and the correct external DNS SRV records, ie :sipfederationtls._tcp.domain.com needs to be pointing to the correct Edge server. In our case this should point to the new 2013 Edge.
Picture
Note that the federation is still enabled on the legacy Edge as shown below:
Picture
Edit the properties of the legacy Edge and uncheck the federation box:
Picture
Finally, we publish the topology and make sure it is successful. The "Topology validation warnings" seen earlier should dissappear now. At this stage we should verify that all the following remote access and federation scenarios work for both Lync2010 and Lync2013 users:

1. Users from at least one federated domain, an internal user on Lync Server 2013, and a user on Lync Server 2010. Test instant messaging (IM), presence, audio/video (A/V), and desktop sharing.

2. Verify that anonymous users are able to join conferences.

3. A user hosted on Lync Server 2010 using remote user access with a user on Lync Server 2013, and a user on Lync Server 2010. Test IM, presence, A/V, and desktop sharing.

4. A user hosted on Lync Server 2013 using remote user access with a user on Lync Server 2013, and a user on Lync Server 2010. Test IM, presence, A/V, and desktop sharing.

Conclusion

This article along with the preceding article desribed how to introduce the Lync2013 Edge into an existing Lync2010/2013 deployment and how to migrate to the new 2013 Edge. The steps outlines are targeted for lab environment testing scenarios. For actual production migrations it is highly recommended to follow the detailed instructions contained in the official Lync documentation.
9 Comments
Zachary
10/3/2013 01:32:17 am

Great post, but had a question, how did you test your new edge server with federation before you made the switch to your new edge pool?

Reply
Brennon
10/3/2013 04:41:05 am

There's no way to test federation with the new Edge without actually moving federation to it. Migration of the Federation Route would typically be done during scheduled downtime and if there are any problems with the new Edge, then Federation has to be switched back to legacy Edge. Not really a good answer to your question but that's how it is today.

Reply
Canada Bob link
10/18/2016 05:29:58 pm

Test federation by telnetting to 5061 on the Access Edge public IP from external. That proves the federation port is working, unless the firewall is configured to perform SIP ALG packet insprction.

Reply
Wee Lun
2/18/2014 07:34:48 pm

Most helpful post, especially with the help of the diagrams. Thanks!! One question though, any issues for users who are still homed in 2010 pool using mobility with the 2013 Edge server? Can they still use Lync 2010 Mobile client to sign in thru Lync 2013 Edge and back to their Lync 2010 pool?

Reply
Brennon link
2/20/2014 03:24:09 am

Yes the Lync2013 Edge provides backward support for Lync2010 mobility clients. The Mcx web service is still included and operational on Lync 2013 servers for backward compatibility with Lync 2010 mobile clients, but the 2013 mobility clients will only leverage the UCWA web service. As a result 2013 mobile clients cannot sign in to a Lync 2010 Edge

Reply
Michael
2/19/2014 12:24:09 am

Hello... I have a question about your article. in it you show using your internal CA to issue certificates to be used on your External interfaces. in my legacy environment I purchases certificates from digicert (which are still in use) because we did not have an internal CA. I deployed an internal CA this year and used it to issue certs to my internal FE. I was under the impression I HAD to use purchased certs from a trusted CA to use on external interfaces. is that not the case?? your article is using an internal CA

Reply
Brennon link
2/20/2014 03:29:09 am

For actual deployments then internal CA certs should only be used for the Lync Edge internal interface. The Lync Edge external interface should always use public CA certs. I'm using internal CA certs for my Edge external interface only in my lab environment which is only used for internal testing, none of the traffic actually goes out to the internet. For federating to another Lync environment internally, I actually add the internal RootCA certs to the other Lync Edge as a trusted Root and vice-versa.

Reply
Frank Carius link
3/12/2015 12:25:25 am

Are you sure, that your slide Shows a supported topology ?. From my understanding, a lync 2010 homed user cannot use a lync 2013 edge. Changing the Edge for federation is fine but the lync 2010 edge can only be removed, after the last lync 2010 users was migrated.

Reply
Brennon link
3/12/2015 12:50:44 pm

Hi Frank

Have a look at https://technet.microsoft.com/en-us/library/jj688163.aspx.

This step of the migration is when the Lync 2013 edge server has already been deployed with the federation route, and the subsequent steps to test both Lync 2010 and 2013 users are able to use this new Edge.

Reply

Your comment will be posted after it is approved.


Leave a Reply.

    Picture
    Picture

    Important Links

    Microsoft Teams Docs
    Microsoft Learn

    ​Microsoft MVP Blogs

    Michael Tressler’s Blog
    Michael’s MTR Quick Tip Videos
    Jimmy Vaughan’s Blog
    Jeff Schertz
    Adam Jacobs
    James Cussen
    ​Damien Margaritis

    Archives

    September 2022
    August 2022
    March 2022
    February 2022
    January 2022
    December 2021
    November 2021
    October 2021
    September 2021
    August 2021
    June 2021
    April 2021
    March 2021
    December 2020
    October 2020
    September 2020
    August 2020
    April 2020
    March 2020
    February 2020
    January 2020
    December 2019
    November 2019
    October 2019
    September 2019
    August 2019
    July 2019
    March 2019
    November 2018
    October 2018
    September 2018
    August 2018
    June 2018
    March 2018
    February 2018
    January 2018
    December 2017
    November 2017
    August 2017
    July 2017
    April 2017
    March 2017
    February 2017
    January 2017
    November 2016
    October 2016
    September 2016
    August 2016
    July 2016
    June 2016
    May 2016
    April 2016
    March 2016
    January 2016
    November 2015
    October 2015
    September 2015
    August 2015
    July 2015
    June 2015
    May 2015
    April 2015
    March 2015
    February 2015
    January 2015
    December 2014
    November 2014
    October 2014
    September 2014
    August 2014
    July 2014
    June 2014
    May 2014
    April 2014
    March 2014
    February 2014
    January 2014
    December 2013
    November 2013
    October 2013
    September 2013
    August 2013
    July 2013
    June 2013
    May 2013
    April 2013
    March 2013
    February 2013
    January 2013
    December 2012
    November 2012
    September 2012
    August 2012

    Categories

    All
    Edge
    Exchange 2013
    Hybrid
    Lpe
    Lync 2010
    Lync 2013
    Mobility
    Oauth
    Office365
    Polycom
    Ucs

    RSS Feed

    This website uses marketing and tracking technologies. Opting out of this will opt you out of all cookies, except for those needed to run the website. Note that some products may not work as well without tracking cookies.

    Opt Out of Cookies