Exchange 2007 Activesync

Hello, we manage 2 exchange sites one is 2K7 on server 2003 and the other is Exchange 2K7 on server 2008. I am having a problem with Activesync on exchange connecting to mobile phones.  All ports are open has I can resolve the client Access server from outside of LAN.  The SSL certificates are also ok.  The phone will connect to our 2003 environment however it will not our 2008 environment.  I ran a test inside the lan called "ACCESSMYLAN" and everything passes however it fails on Checking for Application ActiveSync. I feel like I am dancing around a simple solution.  Everything is enabled in the environment and is working as it should. OWA works great just can't sync to mobile phones.  The security also seems to be right and was compared to our working environment. Any ideas would be helpful!! :)
nateamAsked:
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Shreedhar EtteCommented:
Hi,

Perform a Active Sync test at https://www.testexchangeconnectivity.com/

Also are you getting error with active sync, post that error.

---------
Shree
0
nateamAuthor Commented:
So it does seem to be a problem with the certs      

Testing Exchange ActiveSync
       Exchange ActiveSync test Failed
       
      Test Steps
       
      Attempting to resolve the host name exchange.XXXX.com in DNS.
       Host successfully resolved
       
      Additional Details
       IP(s) returned: X.X.X.X
      Testing TCP Port 443 on host exchange.XXXX.com to ensure it is listening and open.
       The port was opened successfully.
      Testing SSL Certificate for validity.
       The SSL Certificate failed one or more certificate validation checks.
       
      Test Steps
       
      Validating certificate name
       Successfully validated the certificate name
       
      Additional Details
       Found hostname exchange.XXXX.com in Certificate Subject Common name
      Validating certificate trust for Windows Mobile Devices
       Certificate trust validation failed
       
      Additional Details
       The certificate chain has errors, Chain status = NotTimeValid
0
nateamAuthor Commented:
The certs are set to expire in DEC 2010.
0
Problems using Powershell and Active Directory?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

Justin DurrantSr. Engineer - Windows Server/VirtualizationCommented:
What kind of cert do you have installed? Single name or UC\SAN? See here:

http://blog.sembee.co.uk/archive/2008/05/30/78.aspx

One of the most important aspects of a successful Exchange messaging deployment is how you configure your SSL certificates for securing client communication to your Exchange infrastructure. This is because all communication between Outlook clients and the Autodiscover service  endpoint, in addition to communication between the Outlook client and Exchange services, occurs over an SSL channel. For this communication to occur without failing, you must have a valid SSL certificate installed. For  a certificate to be considered valid, it must meet the following criteria:

- The client can follow the certificate chain up to the trusted root.
- The name matches the URL that the client is trying to communicate with.
- The certificate is current and has not expired.

Remember,  the cert request needs to be generated by Exchange using PowerShell.
 http://technet.microsoft.com/en-us/library/aa998327.aspx

When you get the response back from the CA, use the import-certificate command to process  and enable it for SMTP, IIS, etc.
http://technet.microsoft.com/en-us/library/bb124424.aspx







0

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
Satya PathakLead Technical ConsultantCommented:
Suppose we want to create a UCC self-signed certificate. We will require the following names:

#NETBIOS name of Exchange: EX-2k7 (example)
#Internal FQDN: EX-2k7.abc.local (example)
#External FQDN (Public name): webmail.abc.com (example) (use nslookup/ping to verify the external FQDN)
#Autodiscover name: autodiscover.abc.com (example)
#SubjectName: cn=webmail.abc.com (example)

In EMS, run the following command to generate the new self-signed certificate:

New-ExchangeCertificate -FriendlyName "SelfSigned Cert" -SubjectName "cn=webmail.abc.com" -DomainName EX-2k7,EX-k7.abc.local,webmail.abc.com,autodiscover.abc.com -PrivateKeyExportable $True

Next enable the certificate with Enable-ExchangeCertificate cmdlet. Enable atleast IIS and SMTP.

Enable-ExchangeCertificate -Thumbprint xxxxxxxxxxxxxxx -Services POP,IMAP,SMTP,IIS

Next verify certificate has been installed using EMS/IIS Manager or both. (Sometimes you may have to remove the certificate and then install/enable certificate again).

Some important points:

1. If you are creating a self-signed certificate, it is always better to create one that has all the subject alternative names specified above. This will prevent any certificate security warnings related to name mismatch. If you are creating single-name self-signed certificate, you would have to modify internal URIs of multiple virtual directories as explained in KB940726. The other benefit of multiple SANs is avoiding event 12014 and similar events.

2. Autodiscover for non-domain joined machines will work only after record is created in external DNS

3. You will have to install the certificate in the trusted root on client machines else you will receive a certificate warning. On Vista machines, you will have to run IE with elevated privileges to be able to install the certificate when you open OWA.

4. You can use group policy to install the certificate in trusted root (applicable only to domain joined machines). Copy to file the self-signed certificate (ideally in .p7b format) and then edit the default domain policy and import the certificate into "Computer Settings\Windows Settings\Security Settings\Public Key Policies\Trusted Root Certification Authorities". No user intervention is required once you do this. (Users would have to install the certificate themselves on non-domain joined machines).

5. SBS2008 Information: When you install SBS 2008, setup Internet Address wizard uses self-issued certificate by default. You will find it is "Issued to" "external FQDN" of the server and "Issued by" would be "Internal FQDN-CA" (SBS setup configures CA by default). When the wizard generates the self-signed certificate, it also generates a Certificate distribution package. The package (Install Certificate Package.zip) is located under one of the default shares named Public (C:\Users\Public). Another point to remember about SBS2008 is that the default certificate is single-name certificate and if you create a new one with multiple subject alternative names using the procedure above, you will receive a warning while enabling SMTP on the certificate. This warning can be ignored. You can verify availability of STARTTLS verb using Telnet.

6. In Exchange 2007 SP2, validity of self-signed certificate has been increased to 5 years (earlier it was one year)

7. You can use Fix My Network Wizard in the SBS 2008 Console to renew self-signed certificate.

0
nateamAuthor Commented:
This was an issue with Verisign and they were able to resolve it.  ActiveSync is working correctly
0
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Smartphone Programming

From novice to tech pro — start learning today.