Professional Documents
Culture Documents
Deploying Brocade ServerIron ADX to Increase Availability, Scalability, and Security of Microsoft Lync Server 2010 Infrastructure
When installed in front of Microsoft Lync Server 2010 Enterprise Edition, Brocade ServerIron ADX Application Delivery Controllers increase application uptime, maximize server utilization, and shield the servers and applications from malicious attacks.
APPLICATION DELIVERY
SOLUTION GUIDE
CONTENTS
Unified Communications Application Delivery...................................................................................................................................................................... 3 Deployment Architecture.............................................................................................................................................................................................................. 5 General Requirements .................................................................................................................................................................................................................. 7 Affinity ............................................................................................................................................................................. 8 Cookie-Based Persistence ..................................................................................................................................... 8 Source IP Port Persistence .................................................................................................................................... 8 Further Design Considerations for the Lync Server 2010 Solution................................................................................................................................ 9 High Availability .............................................................................................................................................................. 9 Application Affinity Options............................................................................................................................................ 9 Security ........................................................................................................................................................................... 9 Brocade ServerIron ADX Configuration..................................................................................................................................................................................10 Appendix A: High Availability and Redundancy ..................................................................................................................................................................15 Setting Up Active-Hot Standby Redundancy ....................................................................................................... 15 Setting Up Active-Standby VIP Redundancy........................................................................................................ 16 Setting Up Active-Active Redundancy.................................................................................................................. 16 Appendix B: Running Configuration........................................................................................................................................................................................17 Appendix C: Microsoft Lync Server 2010 .............................................................................................................................................................................21 Appendix D: Brocade ServerIron ADX.....................................................................................................................................................................................22 Application Performance ............................................................................................................................................. 22 Application Availability ................................................................................................................................................. 22 Application and Server Farm Security......................................................................................................................... 23 Application and Server Farm Scalability ..................................................................................................................... 23 Higher Return on Investment (ROI) ............................................................................................................................. 23
Deploying Brocade ServerIron ADX to Increase Availability, Scalability, and Security of Microsoft Lync Server 2010 Infrastructure
2 of 23
APPLICATION DELIVERY
SOLUTION GUIDE
For more details on the Microsoft Lync Server 2010, see Appendix C. For technical overview and deployment and implementation details, visit: http://www.microsoft.com/en-us/lync/default.aspx.
Deploying Brocade ServerIron ADX to Increase Availability, Scalability, and Security of Microsoft Lync Server 2010 Infrastructure
3 of 23
APPLICATION DELIVERY
SOLUTION GUIDE
Active Directory
Enterprise Pool
SQL
Back-end server
HT T
HT
P/
TP
/H
HT T
P TT
PS
HT T
P/H
TTP
SIP
P SI
Microsoft Office Meeting Console
SR
P SO
M
Web conferencing edge server
P SO M
TP
SR
TP
S RT P
Microsoft Office Communica tor External DNS External firewall
Peripheral N etwork
Internal Network
Internet
Figure 1. Reference architecture
Enterprise Network
Brocade ServerIron ADX deployed in front of Microsoft Lync Server 2010 increases application uptime, maximizes server farm utilization, and shields servers and applications from malicious attacks. The switches receive all client requests and distribute them efficiently to the most available server in the pool. ServerIron ADX switches consider server availability, load, response time, and other user-configured performance metrics when selecting a server for incoming client connections. By performing sophisticated and customizable health checks to all the Lync Server 2010 servers, ServerIron ADX quickly identifies resource outages in real time and redirects client connections to other available servers. Server capacity can be increased or decreased on demand without impacting applications and client connections. When demand grows, IT engineers can simply add new server resources on the fly without service interruption, and then configure ServerIron ADX to use the new servers for client connections. Brocade ServerIron ADX is application aware and can inspect many types of application-level content to perform intelligent switching of client requests to appropriate servers. Application switching eliminates the need to replicate content and application functions on all servers and optimizes overall resource utilization, application performance, and availability. ServerIron ADX supports Layer 7 switching based on broad content types including URL, HTTP headers, HTTP cookies, SSL session IDs, and XML tags. For implementations in which session persistence across multiple TCP ports on the same server is a key requirement, the ADX supports the industrys most advanced and easily customizable load balancing interface. In addition, the performance delivered by ServerIron ADX ensures that applications provide optimal enduser response time and immense scalability even when enabled for Layer 4 7 switching. Using sticky sessions and track-group switching, a group of transactions from a given client are sent to the server that created the original session when the client first connected. A crucial benefit of using ServerIron ADX is its ability to ensure the client stays with one real server so that all real-time information is preserved as the client continues to communicate across several application ports.
Deploying Brocade ServerIron ADX to Increase Availability, Scalability, and Security of Microsoft Lync Server 2010 Infrastructure
4 of 23
APPLICATION DELIVERY
SOLUTION GUIDE
Another benefit of Brocade ServerIron ADX is its ability to protect server farms and applications from malicious attack. ServerIron ADX switches are proven to defeat wire-speed gigabit-rate Denial of Service (DoS) attacks, while maintaining peak application performance. They also provide high-performance content inspection and filtering for malicious content, including viruses and worms, which are distributed through application-level messages to cripple servers and take down applications. Brocade ServerIron ADX solutions provide immediate Return on Investment (ROI), while improving the ROI of the Lync Server 2010 infrastructure. They support significantly higher application traffic and number of user connections on existing server resources by maximizing utilization. On-demand and unlimited virtual server farm scalability eliminates the need for forklift upgrades and dramatically improves the ROI on the server infrastructure. Downtime associated with security breaches and scheduled maintenance is eliminated, resulting in improved availability, which in turn saves customers tens of thousands to millions of dollars a year. Application delivery has become a technology of choice to improve the scalability, availability, and security of IP applications. Brocade ServerIron ADX switches, with networking and application intelligence, provide the rich features and high performance required for building massively scalable and highly secure application infrastructure.
DEPLOYMENT ARCHITECTURE
A Microsoft Lync Server 2010 pool consists of one or more front-end servers, which provide IM, presence, and conferencing services and are connected to a Microsoft SQL Server database for storing user and conference information. Depending on the pool configuration, the database might reside on the same server. In addition, certain conferencing components might be deployed on the same physical computer, depending on the chosen pool configuration. Lync Server 2010 offers two pool configurations: one Standard Edition configuration and one consolidated Enterprise Edition configuration. The Enterprise Edition configuration consists of front-end servers, which are connected to a separate dedicated SQL Server backend database. NOTE: In an Enterprise pool, the back-end database must run on a dedicated server, separate from other Enterprise Edition servers.
Active Directory
Focus IM conferencing server Web conferencing server Telephony conferencing server A/V conferencing server
IIS servers
Deploying Brocade ServerIron ADX to Increase Availability, Scalability, and Security of Microsoft Lync Server 2010 Infrastructure
5 of 23
APPLICATION DELIVERY
SOLUTION GUIDE
Figure 3. Expanded configuration Also the access edge servers, HTTP reverse proxy, and A/V edge server can be load balanced in the perimeter network. In addition, the Communicator Web Access and Director can be deployed on multiple servers, which are load balanced. The scenario is shown in Figure 4.
UC Endpoints
Communica tor Live Meeting Communica tor Phone Edition
Load Balancer
Federated Networks
Pool
Passive Active
Interacti ve Apps
Load Balancer
Load Balancer
Load Balancer
Direc tor(s)
Front-end se rvers
(Registration/ presence se rver)
Archiving Pool IM CDR A/V Edge Server(s) Media Gateway(s) Mediation server(s) IIS servers Conferencing servers (A/V, Data, IM) Monitoring Fax PBX CTI se rver (RCC Ga teway)
PSTN
MMC
MOM
External
Perimeter Network
Internal
SIP PSTN p rotocol HTTP Media Archive EnterpriseVoice Component
Deploying Brocade ServerIron ADX to Increase Availability, Scalability, and Security of Microsoft Lync Server 2010 Infrastructure
6 of 23
APPLICATION DELIVERY
SOLUTION GUIDE
GENERAL REQUIREMENTS
A front-end server requires a hardware load balancer. If you are deploying a Standard Edition Server or a single Enterprise Edition Front End Server, a load balancer is not required. A hardware load balancer is also required for arrays of Lync Server 2010 edge servers or an array of Standard Edition Servers configured as a Director. These requirements are summarized in the Table 1. Table 1. Microsoft recommended hardware load balancer requirements for Lync Server 2010 Deployment A single Standard Edition Server Enterprise pool with multiple front-end servers Array of directors Array of edge servers Load Balancer Requirement Load balancer not required Hardware load balancer required Hardware load balancer required Hardware load balancer required
Table 2. Hardware load balancer ports required for Lync Server 2010 Port Required 5060 (TCP) 5061 (TCP) Virtual IP Load balancer VIPs used by frontend servers and Director servers Load balancer VIPs used by frontend servers, Director servers, and internal and external interfaces used by edge servers Load balancer VIP used by Internal facing interface for the edge servers Load balancer VIP used by the front-end servers Load balancer VIP used by frontend servers Load balancer VIP used by frontend servers Load balancer VIP used by frontend servers Load balancer VIP used by frontend servers Load balancer VIP used by frontend servers Load balancer VIP used by frontend servers Load balancer VIP used by the internal and external interfaces of the edge servers Port Use Client-to-server SIP communication over TCP Client-to- server SIP communication over TLS and SIP communication between the front-end servers over MTLS
5062 (TCP)
Used for internal ports for SIP /MTLS authentication of IM communications flowing outbound through the internal firewall Used for incoming SIP listening requests for applications sharing Used by the QoE Agent on the front-end servers Used for incoming SIP listening requests for Response Group Service Used for incoming SIP listening requests for Conferencing Attendant Used for incoming SIP listening requests for Conferencing Announcement Service Used for incoming SIP listening requests for Outside Voice Control To move users and perform other pool-level WMI operations over DCOM Used for internal and external ports for STUN/UDP inbound and outbound media communications
5065 (TCP) 5069 (TCP) 5071 (TCP) 5072(TCP) 5073 (TCP) 5074 (TCP)
Deploying Brocade ServerIron ADX to Increase Availability, Scalability, and Security of Microsoft Lync Server 2010 Infrastructure
7 of 23
APPLICATION DELIVERY
SOLUTION GUIDE
Virtual IP Load balancer VIP used by frontend servers Load balancer VIP used by the Web components server
Port Use Communication between the internal components that manage conferencing and the conferencing servers HTTPS traffic to the pool URLs
The configurations provided in this document are configured for use to load balance groups of servers whether they are EE pools, access groups, or Director servers. The configuration is for a one-arm configuration in which the servers are not directly connected to ServerIron ADX (which requires source-nat to ensure return communication goes through ServerIron ADX).
Affinity
Affinity is the ability to associate a client to a specific Client Access Server (CAS) to ensure that all requests sent from that client go to the same edge or front-end server. The following affinity methods are supported on the Brocade ServerIron ADX and are required for Microsoft Lync Server 2010: Cookie-based persistence Source IP port persistence
Cookie-Based Persistence
This method is very reliable for tying a client session to a Lync Server 2010 edge server. The load balancer inserts a cookie into the client-server protocol that is associated with a Lync Server 2010 edge server. The session continues to forward traffic to the same Lync Server 2010 server until the session is over. The cookie-based persistence method is supported for Microsoft Lync Server 2010 edge server protocols that run on top of HTTP in Lync Server 2010 edge server, but has these limitations: The load balancer needs to have the ability to read and interpret the HTTP stream. With SSL, the load balancer must decrypt traffic to examine its content. To use this method, the client must support receiving arbitrary cookies from the server and then including them in all future requests to that server.
Deploying Brocade ServerIron ADX to Increase Availability, Scalability, and Security of Microsoft Lync Server 2010 Infrastructure
8 of 23
APPLICATION DELIVERY
SOLUTION GUIDE
Security
The built-in DoS Protection (when enabled with the ip tcp syn-proxy command) identifies and blocks DoS attacks, protecting the network from service failures and downtime. As a TCP SYN request comes in, a TCP SYN/ACK is returned with a special SEQ number. If a TCP ACK is not returned or if it is incorrect the session is never added to the session table, preventing wasted resources. If the proper TCP ACK is returned with a proper SEQ number, a connection is established and the entry is written to the session table, This method of SYN protection allows Brocade to provide the highest level of DOS protection in the industry mitigating attacks of over 120 million SYN attacks per second, in the case of a fully loaded ServerIron ADX 10000. This equates to thwarting a real time 100 GB line attack in real time without affecting legitimate traffic flows and user connections. Appendix D provides more details about Brocade ServerIron ADX.
Any internal host C1
1 2
Good client C2
TCP SYN TCP SYN ACK - Special SEQ TCP ACK - Special SEQ
Host A
3 1 2 3
TCP SYN TCP SYN ACK - Special SEQ BAD TCP ACK - Special SEQ
No TCP connection
Host B
Bad client
Deploying Brocade ServerIron ADX to Increase Availability, Scalability, and Security of Microsoft Lync Server 2010 Infrastructure
9 of 23
APPLICATION DELIVERY
SOLUTION GUIDE
Server virtual FEVIP 10.10.57.13 Lync Server 2010 edge servers Server real ED1 10.5.57.11 Server real ED2: 10.5.57.12 Lync Server 2010 Directors Server real DIR1: 10.10.57.8 Server real DUR2: 10.10.57.9
Lync Server 2010 front-end servers Server real FE1: 10.10.57.11 Server real FE2: 10.10.57.12
Ports load balanced: Server port 5060 tcp Server port 5061tcp Server port 5063 tcp Server port 135 tcp Server port 80 tcp Server port 443 tcp Server port 444 tcp Server port 5069 tcp
Figure 6. Logical Brocade ServerIron ADX for load balancing Lync Server 2010 servers To manage Brocade ServerIron ADX via the Command-Line Interface (CLI):
ServerIron> enable
At the opening CLI prompt, enter enable. Access the configuration level of the CLI by entering the following command:
ServerIron (config)# ip address 10.10.58.250 255.255.255.0 ServerIron (config)# ip default-gateway 10.10.58.2 ServerIron (config)# hostname ADX1 ADX(config)# username admin password ADX(config)# no enable aaa console ADX(config)# telnet server
Deploying Brocade ServerIron ADX to Increase Availability, Scalability, and Security of Microsoft Lync Server 2010 Infrastructure
10 of 23
APPLICATION DELIVERY
SOLUTION GUIDE
To exit from the configuration level of the CLI, enter the following command:
ADX (config)# exit ADX# write memory
Initial configuration:
ADX (config)# vlan 999 ADX (config-vlan-1)# untag e16
ADX(config-vlan-1)# no spanning-tree
ADX(config)# tcp
Deploying Brocade ServerIron ADX to Increase Availability, Scalability, and Security of Microsoft Lync Server 2010 Infrastructure
11 of 23
APPLICATION DELIVERY
SOLUTION GUIDE
Define the SSL profiles (ensure that certificates are loaded into the ServerIron ADX):
ssl profile clientside_1 keypair-file cert certificate-file LB1.cer cipher-suite all-cipher-suites verify-client-cert per-connection request session-cache off ssl profile serverside_1 cipher-suite all-cipher-suites ca-cert-file contoso.crt session-cache off
APPLICATION DELIVERY
SOLUTION GUIDE
server real DIR2 10.10.58.22 port sips port sip ! server real ES_NIC2_EX1 10.10.57.247 port ssl port ssl server-id 1206 port ssl group-id 1 1 port sips port 3478 ! server real ES_NIC2_EX2 10.10.57.248 port ssl port ssl server-id 1205 port ssl group-id 1 1 port sips port 3478 ! ! server virtual Internal_ES 10.10.58.12 predictor round-robin port ssl no port ssl sticky port ssl persist-hash port ssl ssl-proxy clientside_1 serverside_1 port sips port 5062 port 3478 bind ssl ES1 ssl ES2 ssl bind sips ES1 sips ES2 sips bind 5062 ES1 5062 ES2 5062 bind 3478 ES1 3478 ES2 3478
APPLICATION DELIVERY
SOLUTION GUIDE
bind 5074 FE1 5074 FE2 5074 ! server virtual dirvip 10.10.58.23 predictor least-conn port sips port sip bind sips DIR2 sips DIR1 sips bind sip DIR1 sip DIR2 sip ! server virtual ES_External 10.10.57.245 predictor round-robin port ssl no port ssl sticky port ssl persist-hash port ssl ssl-proxy clientside_1 serverside_1 port ssl csw-policy "Cookie1_action" port ssl csw port sips port 3478 bind ssl ES_NIC2_EX1 ssl ES_NIC2_EX2 ssl bind sips ES_NIC2_EX1 sips ES_NIC2_EX2 sips bind 3478 ES_NIC2_EX1 3478 ES_NIC2_EX2 3478
One-armed mode setup requirements Source NAT (to ensure that traffic passes back through the ServerIron ADX and not from server to client):
key 10000
key 10000
key 10000
key 10000
Deploying Brocade ServerIron ADX to Increase Availability, Scalability, and Security of Microsoft Lync Server 2010 Infrastructure
14 of 23
APPLICATION DELIVERY
SOLUTION GUIDE
(This is the same primary MAC address used on both ServerIron switches.)
Configure VLAN 999, used for the sync connection between the ServerIron switches. Note you must turn off spanning tree.
ServerIron (config)# vlan 999 ServerIron (config)# untagged ethernet 1 ServerIron (config)# no spanning-tree
To set the number of minutes on the primary ServerIron that it waits before retaking the primary role back over after an outage, enter the following command (only on the primary ServerIron): (5 minutes is minimum value)
ServerIron# server backup-preference 5
Deploying Brocade ServerIron ADX to Increase Availability, Scalability, and Security of Microsoft Lync Server 2010 Infrastructure
15 of 23
APPLICATION DELIVERY
SOLUTION GUIDE
Deploying Brocade ServerIron ADX to Increase Availability, Scalability, and Security of Microsoft Lync Server 2010 Infrastructure
16 of 23
APPLICATION DELIVERY
SOLUTION GUIDE
APPLICATION DELIVERY
SOLUTION GUIDE
! ! server real ES1 10.10.58.13 port ssl port sips port 3478 port 5062 ! server real ES2 10.10.58.14 port ssl port sips port 3478 port 5062 ! server real FE1 10.10.58.16 port http port http url "HEAD /<NULL>" port http l4-check-only port 444 port ssl port 135 port sips port sip port 5069 port 5065 port 5071 port 5072 port 5073 port 5074 ! server real FE2 10.10.58.17 port http port http url "HEAD /" port http l4-check-only port 444 port ssl port 135 port sips port sip port 5069 port 5065 port 5071 port 5072 port 5073 port 5074 ! server real DIR1 10.10.58.21 port sips port sip ! server real DIR2 10.10.58.22 port sips port sip ! server real ES_NIC2_EX1 10.10.57.247 port ssl port ssl server-id 1206
match "cookie" persist offset 0 length 4 group-or-server-id match "catchall" forward 1 match "lync" forward 1 match "lync" rewrite insert-cookie "ServerID" default forward 1 default rewrite insert-cookie "ServerID"
Deploying Brocade ServerIron ADX to Increase Availability, Scalability, and Security of Microsoft Lync Server 2010 Infrastructure
18 of 23
APPLICATION DELIVERY
SOLUTION GUIDE
! server real ES_NIC2_EX2 10.10.57.248 port ssl port ssl server-id 1205 port ssl group-id 1 1 port sips port 3478 ! ! server virtual Internal_ES 10.10.58.12 predictor round-robin port ssl no port ssl sticky port ssl persist-hash port ssl ssl-proxy clientside_1 serverside_1 port sips port 5062 port 3478 bind ssl ES1 ssl ES2 ssl bind sips ES1 sips ES2 sips bind 5062 ES1 5062 ES2 5062 bind 3478 ES1 3478 ES2 3478 ! server virtual fevip 10.10.58.15 predictor round-robin port http port http persist-hash port 444 port ssl no port ssl sticky port ssl persist-hash port 135 port sips port sip port 5069 port 5065 port 5071 port 5072 port 5073 port 5074 bind http FE1 http FE2 http bind 444 FE1 444 FE2 444 bind ssl FE1 ssl FE2 ssl bind 135 FE1 135 FE2 135 bind sips FE1 sips FE2 sips bind sip FE1 sip FE2 sip bind 5069 FE1 5069 FE2 5069 bind 5065 FE1 5065 FE2 5065 bind 5071 FE1 5071 FE2 5071 bind 5072 FE1 5072 FE2 5072 bind 5073 FE1 5073 FE2 5073 bind 5074 FE1 5074 FE2 5074 ! server virtual dirvip 10.10.58.23 predictor least-conn port sips port sip bind sips DIR2 sips DIR1 sips bind sip DIR1 sip DIR2 sip !
Deploying Brocade ServerIron ADX to Increase Availability, Scalability, and Security of Microsoft Lync Server 2010 Infrastructure 19 of 23
1 1
APPLICATION DELIVERY
SOLUTION GUIDE
server virtual ES_External 10.10.57.245 predictor round-robin port ssl no port ssl sticky port ssl persist-hash port ssl ssl-proxy clientside_1 serverside_1 port ssl csw-policy "Cookie1_action" port ssl csw port sips port 3478 bind ssl ES_NIC2_EX1 ssl ES_NIC2_EX2 ssl bind sips ES_NIC2_EX1 sips ES_NIC2_EX2 sips bind 3478 ES_NIC2_EX1 3478 ES_NIC2_EX2 3478 ! vlan 1 name DEFAULT-VLAN by port ! vlan 2 by port ! vlan 999 by port untagged ethe 16 no spanning-tree ! vlan 102 by port untagged ethe 1 to 4 no spanning-tree ! aaa authentication web-server default local boot sys fl sec no enable aaa console hostname ADX1 ip address 10.10.58.250 255.255.255.0 ip default-gateway 10.10.58.2 telnet server username admin password 8 $1$F24..pm4$BCF.gmzFo3V3gj7dj9Ej60 no-asm-block-till-bootup ! interface management 1 ip address 192.168.1.2 255.255.255.0 ! interface ethernet 1 link-aggregate configure key 10000 link-aggregate active ! interface ethernet 2 link-aggregate configure key 10000 link-aggregate active ! interface ethernet 3 link-aggregate configure key 10000 link-aggregate active ! interface ethernet 4 link-aggregate configure key 10000 link-aggregate active ! end
NOTE: If there is a backup ServerIron ADX, the configuration will be similar to the primary. In the following case, two commands are different: 1) No command server backup-preference 5 is entered on the secondary and 2) the command for server source NAT should reflect server source-nat-ip 32.254.0.231 255.255.255.0 32.254.0.230 port-range 1
Deploying Brocade ServerIron ADX to Increase Availability, Scalability, and Security of Microsoft Lync Server 2010 Infrastructure
20 of 23
APPLICATION DELIVERY
SOLUTION GUIDE
SQL Database
Web con ferencing servers
Load balancer
Figure 6. High-scalability, high-availability deployment supporting IM and conferencing for internal and external users
Deploying Brocade ServerIron ADX to Increase Availability, Scalability, and Security of Microsoft Lync Server 2010 Infrastructure
21 of 23
APPLICATION DELIVERY
SOLUTION GUIDE
Application Performance
ADX switches, with their intelligent application-aware load balancing and content switching, significantly improve overall performance by optimally utilizing server resources. Using customizable load balancing methods and metrics, application performance can be tuned to achieve best response time and maximum throughput. By taking advantage of HTTP1.1 protocol mechanisms, ADX supports Server Connection Offload, eliminating connection overhead from servers and providing robust security. Server resources are truly dedicated to maximize application performance and user response time.
Application Availability
High-performance load balancing using ADX switches ensures always-on applications by intelligently distributing application traffic among all available servers, and dynamically monitoring the ability of servers and applications running on them to deliver optimal performance. Using customizable health checks at various levels of granularity like host, port, application and transaction. ADX switches instantaneously and transparently react to increases and decreases in server resources by redirecting client traffic as needed. To protect applications from catastrophic failures, the switches can be deployed in multiple high-availability modes with stateful session failover. Applications are completely transparent to switch failures, and continue to function uninterrupted.
Deploying Brocade ServerIron ADX to Increase Availability, Scalability, and Security of Microsoft Lync Server 2010 Infrastructure
22 of 23
APPLICATION DELIVERY
SOLUTION GUIDE
2010 Brocade Communications Systems, Inc. All Rights Reserved. 11/10 GA-SG-355-00 Brocade, the B-wing symbol, BigIron, DCFM, DCX, Fabric OS, FastIron, IronView, NetIron, SAN Health, ServerIron, TurboIron, and Wingspan are registered trademarks, and Brocade Assurance, Brocade NET Health, Brocade One, Extraordinary Networks, MyBrocade, VCS, and VDX are trademarks of Brocade Communications Systems, Inc., in the United States and/or in other countries. Other brands, products, or service names mentioned are or may be trademarks or service marks of their respective owners. Notice: This document is for informational purposes only and does not set forth any warranty, expressed or implied, concerning any equipment, equipment feature, or service offered or to be offered by Brocade. Brocade reserves the right to make changes to this document at any time, without notice, and assumes no responsibility for its use. This informational document describes features that may not be currently available. Contact a Brocade sales office for information on feature and product availability. Export of technical data contained in this document may require an export license from the United States government. Deploying Brocade ServerIron ADX to Increase Availability, Scalability, and Security of Microsoft Lync Server 2010 Infrastructure 23 of 23