Microsoft SharePoint



Similar documents
RSA Two Factor Authentication

Port Following. Port Following. Feature Description

GEO Sticky DNS. GEO Sticky DNS. Feature Description

Azure Multi-Factor Authentication. KEMP LoadMaster and Azure Multi- Factor Authentication. Technical Note

System Center Virtual Machine Manager 2012 R2 Plug-In. Feature Description

RSA Two Factor Authentication. Feature Description

Log Insight Manager. Deployment Guide

Hyper V Windows 2012 and 8. Virtual LoadMaster for Microsoft Hyper V on Windows Server 2012, 2012 R2 and Windows 8. Installation Guide

Virtual LoadMaster for Microsoft Hyper-V

SDN Adaptive Load Balancing. Feature Description

Virtual LoadMaster for VMware ESX, ESXi using vsphere

Remote Desktop Services

Remote Desktop Services

Kerberos Constrained Delegation. Kerberos Constrained Delegation. Feature Description

SSL Accelerated Services. SSL Accelerated Services for the LM5305-FIPS. Feature Description

Windows Server 2012 R2 DirectAccess

Adobe DNG Flat Field Plug-in (1.0) Software Notices and/or Additional Terms and Conditions

Open Source Used In Cisco D9865 Satellite Receiver Software Version 2.20

Portions derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm.

Boost Libraries Boost Software License Version 1.0

Apache Software Foundation This product includes software developed by the Apache Software Foundation (

Third Party Software Used In PLEK500 (Utility for Win) v1.x.xx.xxx

Open Source Used In Cisco Instant Connect for ios Devices 4.9(1)

RSA Data Security, Inc. Portions derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm.

NetVault : SmartDisk v1.0.1 Release Notes Contents

Norton Online Backup Third Party Attribution

FortiAuthenticator Agent for Microsoft IIS/OWA. Install Guide

BMC Remedy Action Request System 7.0 Open Source License Agreements

Integrated Citrix Servers

Adobe Connect Add-in for Microsoft Outlook Third Party Software Notices and/or Additional Terms and Conditions

Simba ODBC Driver with SQL Connector for Apache Cassandra

8.7. Resource Kit User Guide

What are cookies and how does Glendale Career College use them?

8.10. Required Ports

Open Source Used In Meeting integration for Jabber 9.6

Open Source Used In Cisco IronPort Encryption SDK

Installation Guide Supplement

HIGHSEC eid App Administration User Manual

Mayfair EULA for Journal Office

Sophos Anti-Virus for VMware vshield upgrade guide. Product version: 1.1

Enterprise Manager to Enterprise Console upgrade guide. Sophos Enterprise Manager version 4.7 Sophos Enterprise Console version 4.7.

Open Source Used In Cisco Digital Media Player 4310 Release 5.4.1

Fuse MQ Enterprise Broker Administration Tutorials

Installing the Shrew Soft VPN Client

Using SNMP with OnGuard

Dell One Identity Cloud Access Manager How to Configure vworkspace Integration

Strong Authentication for Microsoft SharePoint

All copyright, trade mark, design rights, patent and other intellectual property rights (registered or unregistered) in the Content belongs to us.

Pulse Redundancy. User Guide

Self Help Guides. Create a New User in a Domain

ANZ TRANSACTIVE MOBILE for ipad

Adobe Connect Collaboration SDK Third Party Notices and/or Additional Terms and Conditions

Advanced Planning PDP Client for Microsoft Excel 1.3 Install PeopleBook

[MD5 Message Digests] derived from the RSA Data Security, Inc. MD5 Message Digest Algorithm

Open Source Information

Release Notes for CounterPath X-Lite 4 for Windows Version 4.8

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0

Strong Authentication for Microsoft TS Web / RD Web

Sophos Anti-Virus for Linux startup guide. Product version: 9

Open Source Software used in the product

Configuring IKEv2 VPN for Mac OS X Remote Access to a GTA Firewall

Application Note. Intelligent Application Gateway with SA server using AD password and OTP

Appendix D. Rocks Copyright and Trademark

Self Help Guides. Setup Exchange with Outlook

R&S TSMW Radio Network Analyzer Open Source Acknowledgment

Installing the IPSecuritas IPSec Client

TERMS and CONDITIONS OF USE - NextSTEPS TM

TRITON - SECURITY HELP

Partners in Care Welch Allyn Connex Software Development Kit License Agreement

Dell One Identity Cloud Access Manager How to Configure Microsoft Office 365

Cisco TelePresence VCR Converter 1.0(1.8)

DOCUMENT VERSION 1.0 RELEASE a

Job Status Guide 3.0

On-Core Software, LLC. 893 Sycamore Ave. Tinton Falls, NJ United States of America

Promotion Model. CVS SUITE QUICK GUIDE 2009 Build 3701 February March Hare Software Ltd

Cisco Collaboration with Microsoft Interoperability

Open Source Used In LDSF 1.7.2

Installation and Configuration Guide Simba Technologies Inc.

How To Protect Your Privacy On Coolcampuschallenge.Org

SOFTWARE SOFTWARE ACKNOWLEDGEMENTS. SecuriSync. SecuriSync

Citrix ShareFile Sync for Mac

Dell One Identity Cloud Access Manager How to Configure for SSO to SAP NetWeaver using SAML 2.0

BES10 Self-Service. Version: User Guide

If you are submitting changes to the project, please see CONTRIBUTIONS file for more instructions.

Sample Configuration: Cisco UCS, LDAP and Active Directory

Scan to SharePoint. Administrator's Guide

1. Third Party Software or Free Software License Information

Cisco UCS Director Payment Gateway Integration Guide, Release 4.1

ANZ TRANSACTIVE - MOBILE

Open Source Used In Cisco TelePresence TC Console TC7.1

BlackBerry Desktop Manager Version: User Guide

Dell One Identity Cloud Access Manager How to Configure for High Availability

Open Source Licenses and Notices for Polycom HDX Systems

LoadMaster Deployment Guide

Universal File Mover Status Monitor Installation and Operation Manual

Application Note. Gemalto s SA Server and OpenLDAP

Sophos Enterprise Console quick startup guide. Product version: 5.1 Document date: June 2012

Software and Source Code License Agreement

ORACLE FUSION INTELLIGENCE FOR PEOPLESOFT ENTERPRISE 9.0 SUPPLEMENTAL INSTALLATION INSTRUCTIONS

ZIMPERIUM, INC. END USER LICENSE TERMS

Transcription:

Microsoft SharePoint VERSION: 1.1 UPDATED: JULY 2014 Copyright 2002-2014 KEMP Technologies, Inc. All Rights Reserved. Page 1 / 13

Copyright Notices Copyright 2002-2014 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered trademarks of KEMP Technologies, Inc.. KEMP Technologies, Inc. reserves all ownership rights for the LoadMaster product line including software and documentation. The use of the LoadMaster Exchange appliance is subject to the license agreement. Information in this guide may be modified at any time without prior notice. Microsoft Windows is a registered trademarks of Microsoft Corporation in the United States and other countries. All other trademarks and service marks are the property of their respective owners. Limitations: This document and all of its contents are provided as-is. KEMP Technologies has made efforts to ensure that the information presented herein are correct, but makes no warranty, express or implied, about the accuracy of this information. If any material errors or inaccuracies should occur in this document, KEMP Technologies will, if feasible, furnish appropriate correctional notices which Users will accept as the sole and exclusive remedy at law or in equity. Users of the information in this document acknowledge that KEMP Technologies cannot be held liable for any loss, injury or damage of any kind, present or prospective, including without limitation any direct, special, incidental or consequential damages (including without limitation lost profits and loss of damage to goodwill) whether suffered by recipient or third party or from any action or inaction whether or not negligent, in the compiling or in delivering or communicating or publishing this document. Any Internet Protocol (IP) addresses, phone numbers or other data that may resemble actual contact information used in this document are not intended to be actual addresses, phone numbers or contact information. Any examples, command display output, network topology diagrams, and other figures included in this document are shown for illustrative purposes only. Any use of actual addressing or contact information in illustrative content is unintentional and coincidental. Portions of this software are; copyright (c) 2004-2006 Frank Denis. All rights reserved; copyright (c) 2002 Michael Shalayeff. All rights reserved; copyright (c) 2003 Ryan McBride. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY THE ABOVE COPYRIGHT HOLDERS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE ABOVE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The views and conclusions contained in the software and documentation are those of the authors and should not be interpreted as representing official policies, either expressed or implied, of the above copyright holders.. Portions of the LoadMaster software are copyright (C) 1989, 1991 Free Software Foundation, Inc. -51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA- and KEMP Technologies Inc. is in full compliance of the GNU license requirements, Version 2, June 1991. Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Portions of this software are Copyright (C) 1988, Regents of the University of California. All rights reserved. Copyright 2002-2014 KEMP Technologies, Inc. All Rights Reserved. Page 2 / 13

Redistribution and use in source and binary forms are permitted provided that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and other materials related to such distribution and use acknowledge that the software was developed by the University of California, Berkeley. The name of the University may not be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. Portions of this software are Copyright (C) 1998, Massachusetts Institute of Technology Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Portions of this software are Copyright (C) 1995-2004, Jean-loup Gailly and Mark Adler This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: 1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required. 2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software. 3. This notice may not be removed or altered from any source distribution. Portions of this software are Copyright (C) 2003, Internet Systems Consortium Permission to use, copy, modify, and/or distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies. THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. Used, under license, U.S. Patent Nos. 6,473,802, 6,374,300, 8,392,563, 8,103,770, 7,831,712, 7,606,912, 7,346,695, 7,287,084 and 6,970,933 Copyright 2002-2014 KEMP Technologies, Inc. All Rights Reserved. Page 3 / 13

Table of Contents 1 Introduction... 5 1.1 Document Purpose... 5 1.2 Intended Audience... 5 1.3 Prerequisites... 6 2 Configure the LoadMaster for SharePoint... 7 2.1 User Portal Site Virtual Service... 7 2.2 Central Administration Site Virtual Services... 9 2.3 Enabling the Edge Security Pack (ESP) with SharePoint... 11 References... 12 Document History... 13 Copyright 2002-2014 KEMP Technologies, Inc. All Rights Reserved. Page 4 / 13

1 Introduction Microsoft SharePoint is a web platform which provides many capabilities such as: Document management Version control File sharing Collaboration Social networking Enterprise search Business intelligence Workflow automation Website creation Figure 1-1: SharePoint Server Topology A SharePoint Server Farm can include application servers and Web Front End (WFE) servers. The WFE server is used to handle requests from clients. If the WFE server is receiving a lot of requests it may be necessary to build multiple WFE servers and distribute the load amongst them. To provide resiliency and high performance, these WFEs should be load balanced. 1.1 Document Purpose The purpose of this document is to provide guidance on how to configure the KEMP LoadMaster for Microsoft SharePoint. 1.2 Intended Audience This document is intended for use by anyone who is interested in learning about deploying a KEMP LoadMaster with SharePoint. Copyright 2002-2014 KEMP Technologies, Inc. All Rights Reserved. Page 5 / 13

1.3 Prerequisites It is assumed that if you are offloading SSL, an SSL certificate and key has already been obtained and installed on the LoadMaster. For help with SSL certificates, refer to the SSL Accelerated Services, Feature Description. It is also assumed that a working SharePoint environment has been installed. Copyright 2002-2014 KEMP Technologies, Inc. All Rights Reserved. Page 6 / 13

2 Configure the LoadMaster for SharePoint To configure the LoadMaster for SharePoint, two Virtual Services need to be set up: One is for the Central Administration website which is used to administer the SharePoint configuration overall. When you install the first server, it is created. However, when you add more servers you have the choice as an administrator to create more instances so that you can make it Highly Available (HA). The other Virtual Service is for the User Portal Site. This is for access to MySites and the rest of the SharePoint infrastructure. It may be possible to have a single Virtual Service for both that has extra ports, but you might want different settings on the two different Virtual Services, or you might want one to be only accessible internally, for example. The sections below give instructions on how to set up these two Virtual Services. The settings contained in this document are recommended by KEMP. However, your specific configuration may require different settings. For more information on what each of the fields mean, refer to the Web User Interface (WUI), Configuration Guide. 2.1 User Portal Site Virtual Service This section is detailing the addition of a Real WFE Server to a Virtual Service for encrypted traffic within the LoadMaster. The details for the provisioning/configuring of a Real WFE Server to a Virtual Service for unencrypted traffic within the LoadMaster is also outlined. Follow the steps below to configure a virtual service to load balance the user portal site: 1. Go to the LoadMaster Web User Interface (WUI) by navigating to the IP address in a web browser. Ensure to enter https:// before the address. 2. Enter the username and password. 3. In the main menu, select Virtual Services. 4. Select Add New. Figure 2-1: Virtual Service Parameters 5. Enter a valid, available IP address in the Virtual Address field. 6. Enter 443 as the Port. 7. Enter a recognisable Service Name, for example SharePointUserPortal. 8. Ensure that tcp is selected as the Protocol. Copyright 2002-2014 KEMP Technologies, Inc. All Rights Reserved. Page 7 / 13

9. Click the Add this Virtual Service button. 10. Expand the Standard Options section. Figure 2-2: Virtual Service Properties Figure 2-3: Standard Options section 11. Select Source IP Address as the Persistence Mode. 12. Select weighted least connection as the Scheduling Method. 13. Enter 4000 in the Idle Connection Timeout field and click Set Idle Timeout. 14. Expand the SSL Properties section. Figure 2-4: SSL Properties 15. Select Enabled. 16. In order to allow SSL offloading, alternate access mappings within the SharePoint environment must be properly configured to allow SSL offloading. Expand the Real Servers section. Figure 2-5: Real Servers section Copyright 2002-2014 KEMP Technologies, Inc. All Rights Reserved. Page 8 / 13

17. Click the Add New button. Figure 2-6: Real Server parameters 18. Enter the required IP address in the Real Server Address field. 19. Click Add This Real Server. 20. Repeat the above steps to add other Real WFE Servers. 21. Check that the Virtual Service is up by selecting Virtual Services > View/Modify Services in the main menu and checking the Status. After this encrypted Virtual Service has been added, set up a Virtual Service for the unencrypted traffic by following the steps above but with the below differences: Enter a different Service Name Enter 80 as the Port Do not enable SSL Acceleration 2.2 Central Administration Site Virtual Services Follow the steps below to create and configure the Central Administration Site Virtual Service: 1. Go to the LoadMaster Web User Interface (WUI) by navigating to the IP address in a web browser. Ensure to enter https:// before the address. 2. Enter the username and password. 3. In the main menu, select Virtual Services. 4. Select Add New. Figure 2-7: Add a new Virtual Service 5. Enter a valid, available IP address in the Virtual Address field. 6. Enter the relevant Port. Copyright 2002-2014 KEMP Technologies, Inc. All Rights Reserved. Page 9 / 13

The port for this application is randomly generated by the application but can be set to any value. The value entered here in the LoadMaster must match the port configured when the SharePoint server was set up. To find out how to determine the randomly generated port, refer to Microsoft s SharePoint documentation. 7. Enter a recognisable Service Name, for example SharePointCentralAdmin. 8. Click the Add this Virtual Service button. 9. Expand the Standard Options section. Figure 2-8: Virtual Service Properties Figure 2-9: Standard Options section 10. Select Source IP Address as the Persistence Mode. 11. Select weighted least connection as the Scheduling Method. 12. Enter 4000 in the Idle Connection Timeout field and click the Set Idle Timeout button. 13. Configure any other settings on this page as needed. 14. Expand the Real Servers section. 15. Click the Add New button. Figure 2-10: Real Servers section Copyright 2002-2014 KEMP Technologies, Inc. All Rights Reserved. Page 10 / 13

Figure 2-11: Real Server Parameters 16. Enter the required IP address in the Real Server Address field. 17. Click Add This Real Server. 18. Repeat these steps to add the other Real WFE Servers. 19. Check that the Virtual Service is up by selecting Virtual Services > View/Modify Services in the main menu and checking the Status. After this unencrypted Virtual Service has been added, set up a Virtual Service for the encrypted traffic by following the steps above but with the below differences: Enter a different Service Name Enter the relevant Port for the encrypted traffic Enable SSL Acceleration in the SSL Properties section. 2.3 Enabling the Edge Security Pack (ESP) with SharePoint If desired, you can use ESP with SharePoint. To do this, follow the steps in the ESP, Feature Description but ensure to select either Permanent Cookies Always or Permanent Cookies only on Private Computers for the Use Session or Permanent Cookies option. Selecting a permanent cookie option ensures that Office documents can be opened correctly from SharePoint. Copyright 2002-2014 KEMP Technologies, Inc. All Rights Reserved. Page 11 / 13

References Unless otherwise specified, the following documents can be found at http://www.kemptechnologies.com/documentation. ESP, Feature Description Web User Interface (WUI), Configuration Guide SSL Accelerated Services, Feature Description Copyright 2002-2014 KEMP Technologies, Inc. All Rights Reserved. Page 12 / 13

Document History Date Change Reason for Change Version Resp. May 2014 Initial draft First draft of document 1.0 LB July 2014 Release updates Updates for 7.1-18a release 1.1 LB Copyright 2002-2014 KEMP Technologies, Inc. All Rights Reserved. Page 13 / 13