windows-itpro-docs/mdop/appv-v4/internet-facing-server-scenarios-for-perimeter-networks.md
xiaoyinl f4bb542824 Update fwlink to use HTTPS
In this patch, I replaced all occurrences of http://go.microsoft.com with https://go.microsoft.com
2016-08-30 03:02:30 -04:00

126 lines
4.4 KiB
Markdown
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

---
title: Internet-Facing Server Scenarios for Perimeter Networks
description: Internet-Facing Server Scenarios for Perimeter Networks
author: jamiejdt
ms.assetid: 8a4da6e6-82c7-49e5-b9b1-1666cba02f65
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
ms.prod: w8
---
# Internet-Facing Server Scenarios for Perimeter Networks
App-V 4.5 supports Internet-facing server scenarios, in which users who are not connected to the corporate network or who disconnect from the network can still use App-V. As shown in the following illustration, only the use of secure protocols on the Internet (RTSPS and HTTPS) is supported.
![app-v firewall positioning diagram](images/appvfirewalls.gif)
You can set up an Internet-facing solution, using an ISA Server, where the App-V infrastructure is on the internal network in the following ways:
- Create a Web Publishing rule for the IIS server that is hosting the ICO and OSD files—and optionally, the packages for streaming—located on the internal network. Detailed steps are provided at <https://go.microsoft.com/fwlink/?LinkId=151982>.
- Create a Server Publishing rule for the App-V Web Management Server (RTSPS). Detailed steps are provided at [https://go.microsoft.com/fwlink/?LinkId=151983&](https://go.microsoft.com/fwlink/?LinkId=151983).
As shown in the following illustration, if the infrastructure has implemented other firewalls between the client and the ISA Server or between the ISA Server and the internal network, both RTSPS (TCP 322) and HTTPS (TCP 443) firewall rules must be created to support the flow of traffic. Also, if firewalls have been implemented between the ISA Server and the internal network, the default traffic required for domain members must be permitted to tunnel through the firewall (DNS, LDAP, Kerberos, SMB/CIFS).
![app-v perimeter network firewall diagram](images/appvperimeternetworkfirewall.gif)
Because the firewall solutions vary from environment to environment, the guidance provided in this topic describes the traffic that would be required to configure an Internet-facing App-V environment in the perimeter network. This information also includes the recommended internal network servers.
Place the following servers in the perimeter network:
- App-V Management Server
- IIS server for publishing and streaming
**Note**  
It is a best practice to place the Management Server and IIS server on separate computers.
 
Place the following servers in the internal network:
- Content server
- Data store (SQL Server)
- Active Directory Domain Controller
## Traffic Requirements
The following tables list the traffic requirements for communication from the Internet and the perimeter network and from the perimeter network to the internal network.
<table>
<colgroup>
<col width="50%" />
<col width="50%" />
</colgroup>
<thead>
<tr class="header">
<th align="left">Traffic Requirements from Internet to Perimeter Network</th>
<th align="left">Details</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<td align="left"><p>RTSPS (publishing refresh and streaming packages)</p></td>
<td align="left"><p>TCP 322 by default; this can be changed in App-V Management Server.</p></td>
</tr>
<tr class="even">
<td align="left"><p>HTTPS (publishing ICO and OSD files and streaming packages)</p></td>
<td align="left"><p>TCP 443 by default; this can be changed in the IIS configuration.</p></td>
</tr>
</tbody>
</table>
 
<table>
<colgroup>
<col width="50%" />
<col width="50%" />
</colgroup>
<thead>
<tr class="header">
<th align="left">Traffic Requirements from Perimeter Network to Internal Network</th>
<th align="left">Details</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<td align="left"><p>SQL Server</p></td>
<td align="left"><p>TCP 1433 is the default but can be configured in SQL Server.</p></td>
</tr>
<tr class="even">
<td align="left"><p>SMB/CIFS</p></td>
<td align="left"><p>If the content directory is located remotely from the Management Server(s) or IIS server (recommended).</p></td>
</tr>
<tr class="odd">
<td align="left"><p>Kerberos</p></td>
<td align="left"><p>TCP and UDP 88</p></td>
</tr>
<tr class="even">
<td align="left"><p>LDAP</p></td>
<td align="left"><p>TCP and UDP 389</p></td>
</tr>
<tr class="odd">
<td align="left"><p>DNS</p></td>
<td align="left"><p>For name resolution of internal resources (can be eliminated with the use of hosts file on perimeter network servers)</p></td>
</tr>
</tbody>
</table>