Solved

Data Transport in the Blackberry Environment

Posted on 2007-11-19
2
910 Views
Last Modified: 2013-11-30
Hi,

     I have a question about the data transport in the BES, BIS and ISP environment. If I understand correctly data transport for the BES, BIS and ISP on the application layer as HTTP or HTTPS and routed through network layer on the Internet as IP.
Where in the data transport does SMTP come into play? and MAPI?
What if a user wanted to get emails from Hotmail and use POP3 SSL, how is the data transported in the BES,BIS and ISP environment? If they use POP3 SSL, Are they still using HTTPS?
I need to have a clear understanding on how the data is transported and the security issues involved.

Thanks, MissyMadi


0
Comment
Question by:missymadi
2 Comments
 
LVL 12

Accepted Solution

by:
Kurt_Braeckmans earned 125 total points
ID: 20318086
For the BES:
This uses the mapi to connect to the mailbox but this is only used in your internal network.
To the outside only port 3101 is used to connect to the RIM servers.
As for SMTP, this is used by your exchange environment and not directly with the BES.
0
 

Author Comment

by:missymadi
ID: 20319705
Hi,

Thanks for the info.
In an Exchange environment, is SMTP only internal?
What if a user wanted to get emails from Hotmail and use POP3 SSL, how is the data transported in the BES,BIS and ISP environment? If they use POP3 SSL, Are they still using HTTPS?
I'm looking for the specific data transport route and the protocols, for example:
In a BES environment the data travels the mail server(SMTP)  > BES(TCP/IP) > Firewall(3101)  > Internet (IP) > NOCs(what protocol is the data being transported?) > Blackberry device(AES).

In BIS environment  accessing HotMail (POP3) what is the data transport path and the protocols for accessing HotMail(POP3) with and without a BES?

0

Featured Post

Active Directory Webinar

We all know we need to protect and secure our privileges, but where to start? Join Experts Exchange and ManageEngine on Tuesday, April 11, 2017 10:00 AM PDT to learn how to track and secure privileged users in Active Directory.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

For many people, the BlackBerry is an indispensable tool during their working day. The ability to have your emails delivered swiftly and securely to your hand can improve your personal efficiency immensely. So, how many people do you see with their …
Microservice architecture adoption brings many advantages, but can add intricacy. Selecting the right orchestration tool is most important for business specific needs.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

821 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question