Solved

Accessing Outlook thru SSL VPN (port to be Enabled)

Posted on 2009-07-12
4
600 Views
Last Modified: 2012-05-07
We are in the process of configuring SSL VPN, we have enabled MS outlook to be available for VPN users thru tunneling. our SSL VPN box is in DMZ, and right now traffic is enabled for port any to any from VPN box to our Backend exchange server which is in different zone and vice-versa.

As part of security, we want only to enable those port which is required to get outlook working thru RPC from SSL VPN box to exchange serrver and vice-versa.

Our Exchange Farm:
Front end server in DMZ (Web mail configured)
Backend server in Server Zone
No RPC over HTTPs configured
0
Comment
Question by:TJOSY
  • 2
4 Comments
 
LVL 1

Expert Comment

by:lucidica-jamal
Comment Utility
Hiya,

If you are using a VPN, then all you need to open is the VPN port, no other ports need to be open to allow exchange information to pass through, as it will all pass through the VPN port.

Hope that helps!

0
 

Author Comment

by:TJOSY
Comment Utility
thats from external to VPN box. My requirement is from VPN box to Exchange Server
0
 
LVL 1

Assisted Solution

by:lucidica-jamal
lucidica-jamal earned 50 total points
Comment Utility
Oh ok...
Exchange uses alot of ports!

A list of them are available here: http://www.petri.co.il/ports_used_by_exchange.htm

Hope that helps!
0
 
LVL 65

Accepted Solution

by:
Mestha earned 75 total points
Comment Utility
What you should do is remove the frontend server from the DMZ. Whatever your reason for putting it there, I can guarantee that it is wrong. It does nothing for your security and actually weakens it.

Put the frontend server inside, configure RPC over HTTPS. It only needs one port then - 443.
You could look at using SSL offloading, which would then only need port 80, but requires very careful configuration. A lot of people have problems with it, so usually end up using conventional RPC over HTTPS with a certificate on the frontend server and just using the SSL VPN as an additional wrapper.

Simon.
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
If you don't know how to downgrade, my instructions below should be helpful.
The video tutorial explains the basics of the Exchange server Database Availability groups. The components of this video include: 1. Automatic Failover 2. Failover Clustering 3. Active Manager
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now