We're using Ironport WSA as our Web Proxy and we're experiencing problems with Lync. The problem appears when we're invited from other external companies to a Lync meeting. When you click the invitation URL the meeting try to start but as soon as it does it shuts down.
If we connect without the Ironport WSA Everything works perfect and we have come to the conclusion that it is SSL inspection that is the problem, so my question is:
Is it possible to disable SSL inspection on all Lync traffic? Since we have no idea who will invite us, so it's not an option to just exclude single addresses, we need to find a way to identify all Lync traffic and let it through with no interferance.
I hope someone can help me.
I think this will work:
In Web Security/Decryption Policies, add a policy above your global policy. Leave it a all identities, but click on advanced, and add "\(Microsoft Lync\)" to the User Agents box. Set URL filtering to all passthrough, disable web reputation, set default action to passthrough.
It should look like this:
Your categories in "Access Policies" will still apply, this is just what to do with the SSL traffic.
Thank you very much for your answer, I had to wait for a guy at our Communication department to test this.
Unfortunatly it didn't work though. The signal goes through because it goes outside the WSA on port 5061, but when the https stream are setting up the meeting breaks instantly.
Thank you for taking your time to try :o) We will continue to try and if we find a solution I will post it.
The 5061 traffic is SIP protocol. The WSA has no idea what to do with that traffic. You need to allow that traffic out through your firewall and not redirected to the WSA at all.
Absolutly, 5061 do not go through the Proxy. I just tried to explaine what happens when we try to start a meeting. 5061 works, so the invite is fine, but after that the datastream over 443 will setup and that traffic goes through the Proxy and because it terminates the traffic the meeting ends.
You can try bypassing Lync Traffic from HTTPS Decryption in the following ways:
1. Create a Custom URL Category and add the following to the Sites, then submit the change;
.onmicrosoft.com, .microsoftonline.com, .microsoftonline-p.com, .sharepoint.com, .outlook.com, .lync.com, onmicrosoft.com, microsoftonline.com, microsoftonline-p.com, sharepoint.com, outlook.com, lync.com, osub.microsoft.com, 126.96.36.199/25, 188.8.131.52/27, 184.108.40.206/24, 220.127.116.11/27, 18.104.22.168/26, 22.214.171.124/25, 126.96.36.199/27, 188.8.131.52/25, 184.108.40.206/26, 220.127.116.11/16, 18.104.22.168/25, 22.214.171.124/27, 126.96.36.199/26, 188.8.131.52/27, 184.108.40.206/27, 220.127.116.11/26, 18.104.22.168/25, 22.214.171.124/24, 126.96.36.199/27, 188.8.131.52/25, 184.108.40.206/28, 220.127.116.11/28, 18.104.22.168/26, 22.214.171.124/28
2. For HTTPS proxy create a decryption policy using the new Custom URL Category and set it to Pass Through for the Custom Category and submit the change.
Cisco PDI TA
Is the solution you're proposing for Office365 solutions? Just want to be sure before asking my collegue to try.
I guess I missed to give that information in the first place. We're running Lync on-premise and the problem occures when a non federated external part invites us to a meeting.
The companies we've invited so far works fine, there is no problem at all, because their Proxys do not interfer with the https traffic.
Feels like a har nut to crack this....