Scenario: Secure network - KMS or MAK activation of Office 2010
Applies to: Office 2010
Topic Last Modified: 2011-05-07
The activation method recommended for this scenario is Key Management Services (KMS) or Multiple Activation Key (MAK). This volume activation scenario is more detailed than the examples in Plan KMS activation of Office 2010, Plan MAK proxy activation of Office 2010, and Plan MAK independent activation of Office 2010.
Important
This information applies to volume-licensed editions of Office 2010. It does not apply to Office Professional Plus for Office 365, which is licensed through subscription.
Secure network
If your organization has a secure network — for example, a branch office network or an extranet behind a firewall — we recommend the guidelines shown in the following table for both KMS and MAK activation of Microsoft Office 2010.
Secure network setup | Recommended activation method |
---|---|
The firewall can be opened to access the core network. |
Use Plan KMS activation of Office 2010 through a KMS host within the core network. |
Policy prevents the firewall from being opened. |
|
For information about the KMS activation method, see Plan KMS activation of Office 2010.
For information about the MAK proxy activation method, see Plan MAK proxy activation of Office 2010.
For information about the MAK independent activation method, see Plan MAK independent activation of Office 2010.
Considerations
When you prepare a secure network for volume activation of Office 2010, consider the following factors:
The firewall should be configured as RPC over TCP and use TCP port 1688.
The configuration of the client computer firewall can be initiated by the client computer.