I am wondering if someone could correct and concepts i have that are incorrect about exchange!
sender Policy framework records are a step further than PTR records because the specify authorized mail servers that accept inbound mail for a domain. This would be the front end server in an FE/BE architecture?
In order for you to enforce other mail servers must have a SPF records is in your sender ID tab in the global message delivery dialog box.
In order for you to enforce mail servers sending mail to you have a PTR record is through the advance button on the SMTP virtual server tab that has a check box specifing to perfom reverse look up and there is nothing else you need to do.
in the smtp virtual server the authenication type is for other mail servers making a connection to our front end server for the purpose of sending email to us. this is Not authenitaction for email clients such as outlook.
An smtp domain is a domain where there is a mail server so would also be the same name as a companies domain.
---https and CA server
You have to request a certificate for you web server before it will allow you to reuqire a SSL connection for OWA or rpc-https?
although you must request a certificate for the web server before you can require a sercure channel (SSL), you can leave the option on the properties tab of the IIS website to not require the client to have a certificate. This would mean the websites access uses https but no certificates for the clients and server are required.
you can use the windows built in CA only if the computers and users accessing you exchange OWA website are from you company and or have had the opportunity to request a certificate from your internal windows ca server becuase they have computers and user account within the companies domain.
If you wish for the general public to access your website(any website) using a certificate your company must employ a third party internet Certificate Server like Verisign.
to use https you must open port 443 on the firewall and forward any https traffic to the private ip address of your front end server.
the fqdn the user types into their browser to use owa is not you private fqdn of your front end server, its the fqdn associated with the mx record followed by /exchange
using prc-https outlook users can also have access to their personal folders (this cannot be correct becuase they are on mapped drive and how would outlook know where their are with a vpn - less connection)
thanks for any corrections!
sender Policy framework records are a step further than PTR records because the specify authorized mail servers that accept inbound mail for a domain. This would be the front end server in an FE/BE architecture?
In order for you to enforce other mail servers must have a SPF records is in your sender ID tab in the global message delivery dialog box.
In order for you to enforce mail servers sending mail to you have a PTR record is through the advance button on the SMTP virtual server tab that has a check box specifing to perfom reverse look up and there is nothing else you need to do.
in the smtp virtual server the authenication type is for other mail servers making a connection to our front end server for the purpose of sending email to us. this is Not authenitaction for email clients such as outlook.
An smtp domain is a domain where there is a mail server so would also be the same name as a companies domain.
---https and CA server
You have to request a certificate for you web server before it will allow you to reuqire a SSL connection for OWA or rpc-https?
although you must request a certificate for the web server before you can require a sercure channel (SSL), you can leave the option on the properties tab of the IIS website to not require the client to have a certificate. This would mean the websites access uses https but no certificates for the clients and server are required.
you can use the windows built in CA only if the computers and users accessing you exchange OWA website are from you company and or have had the opportunity to request a certificate from your internal windows ca server becuase they have computers and user account within the companies domain.
If you wish for the general public to access your website(any website) using a certificate your company must employ a third party internet Certificate Server like Verisign.
to use https you must open port 443 on the firewall and forward any https traffic to the private ip address of your front end server.
the fqdn the user types into their browser to use owa is not you private fqdn of your front end server, its the fqdn associated with the mx record followed by /exchange
using prc-https outlook users can also have access to their personal folders (this cannot be correct becuase they are on mapped drive and how would outlook know where their are with a vpn - less connection)
thanks for any corrections!