I have read how Windows Mobile ActiveSync Autodiscovery is supposed to work and I am attempting to test this in a lab but the client behaviour doesn't seem correct. I am simulating the environment with a firewall/router where the AD components are on the 'inside' and the Clients are on the 'outside'. Only HTTPS is allowed to the Exchange server from outside-to-inside. DNS is handled externally which I have configured up correctly (I think?) - I have the 'autodiscover.domain.com' entry pointing to the Exchange server as well as a SRV record of '_autodiscover._tcp.domain.com' again pointing to the Exchange server. Testing directly for the URL works from a PC.
When I attempt the autodiscovery on a Windows Mobile 6.1 device I can see a DNS lookup for 'domain.com' and the correct reply of the AD servers, the device then attempts a HTTPS connection to one of the DC's but this doesn't work as the traffic isn't allowed by the firewall. I was expecting the device to then try a DNS lookup for 'autodiscover.domain.com' however it doesn't. If I allow HTTPS access to the AD server then it works however the AD server isn't running any HTTP/HTTPS services. I can see on a sniffer trace when the traffic isn't allowed the HTTPS traffic to the AD server go unreplied, but when the restriction is removed the AD server replies but I assume the responses are wrong as after three attempts the device then does a DNS lookup for 'autodiscover.domain.local' and the discovery completes correctly.
I think I may have misunderstood something, but I can't allow HTTPS access to a DC from an unsecured network?
Andy
When I attempt the autodiscovery on a Windows Mobile 6.1 device I can see a DNS lookup for 'domain.com' and the correct reply of the AD servers, the device then attempts a HTTPS connection to one of the DC's but this doesn't work as the traffic isn't allowed by the firewall. I was expecting the device to then try a DNS lookup for 'autodiscover.domain.com' however it doesn't. If I allow HTTPS access to the AD server then it works however the AD server isn't running any HTTP/HTTPS services. I can see on a sniffer trace when the traffic isn't allowed the HTTPS traffic to the AD server go unreplied, but when the restriction is removed the AD server replies but I assume the responses are wrong as after three attempts the device then does a DNS lookup for 'autodiscover.domain.local' and the discovery completes correctly.
I think I may have misunderstood something, but I can't allow HTTPS access to a DC from an unsecured network?
Andy