Solved

Exchange connection to remote sites

Posted on 2006-11-15
6
294 Views
Last Modified: 2008-03-10
I have an exchange server at one location and have 3 remote sites.  There are DC's at all sites and are setup as Global Catalogs.  When I setup an email for new users, OWA works but configuring Outlook I cannot connect the the exchange server.  It tells me that the server is not online or not responding.  They can ping the exchange server, they can even open shared files on the exchange server.  The remote sites are connected with a T1 connection to the main office.  What port does Outlook use to connect to an Exchange server.  I was thinking it might be with the router not letting a certain packets in due to a port not opened or configured?
0
Comment
Question by:infranetsupport
  • 5
6 Comments
 
LVL 7

Expert Comment

by:knightrider2k2
ID: 17949510
It is probably port 135

http://support.microsoft.com/kb/833799
0
 
LVL 7

Expert Comment

by:dlangr
ID: 17949518
forward https to an external ip of the main office to the exchange server in your firewall/router and configure the exchange server so that it accepts https connections.

see http://office.microsoft.com/en-us/ork2003/HA011402731033.aspx for client configuration

see http://www.msexchange.org/tutorials/Implementing-RPC-over-HTTPS-single-Exchange-Server-2003-environment.html for configuring your exchange server

It can be done without https, but then i would recommend setting up a vpn between the offices (if not already implemented)

If you do have an vpn, you will have to open up quite some ports if the traffic tunneld trough the vpn between the 2 locations is filtered.
0
 
LVL 7

Expert Comment

by:dlangr
ID: 17949533
>Both Microsoft Outlook and Microsoft Exchange use the remote procedure call (RPC) >protocol to communicate. When an Exchange server starts, each of its services are >dynamically assigned to a port. The port number that each Exchange server listens >on can change every time that the Exchange server starts. When an Exchange server >starts, it registers itself with the End Pont Mapper, and prompts the End Pont Mapper >to assign it a port number.

>When Outlook starts, it must determine the port where the TCP/IP end-point on the >Exchange server has been assigned. To find the port number that Outlook must >communicate with, Outlook contacts the Exchange server's End Pont Mapper that >tracks what service is listening on what port. The End Pont Mapper always listens on >port 135.

as stated above, it uses a lot of ports, not just port 135. unless all unprivileged ports are already open, opening port 135 will probably not solve your problem.
0
Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

 
LVL 7

Expert Comment

by:dlangr
ID: 17949562
for a more complete list of ports and things to do, see "Preparing Exchange Server 2003 for OWA" at http://www.msexchange.org/tutorials/OWA_Exchange_Server_2003.html

It also describes a way to limit the amount of ports used.
0
 
LVL 7

Accepted Solution

by:
dlangr earned 500 total points
ID: 17950047
in one of my previous posts i said:

forward https to an external ip of the main office to the exchange server in your firewall/router and configure the exchange server so that it accepts https connections.

This was written down a bit to hasty, what i meant is:

In your firewall, forward https of an external ip (at the main office) to the internal exchange server and configure the exchange server so that it accepts https connections.
0
 
LVL 7

Expert Comment

by:dlangr
ID: 18327487
Did you resolve your issue? Let us know how so others can learn from it.
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

Meet the world's only “Transparent Cloud™” from Superb Internet Corporation. Now, you can experience firsthand a cloud platform that consistently outperforms Amazon Web Services (AWS), IBM’s Softlayer, and Microsoft’s Azure when it comes to CPU and …
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now