Solved

Reconfigure Exchange

Posted on 2011-03-01
3
390 Views
Last Modified: 2012-05-11
My manager gave me certain tasks in exchange

He gave me a paper mentioned something like below.

In my Exchange organization there are two servers

that run Exchange Server 2003. One Exchange

server is configured with two network adapters

and two SMTP virtual servers. One SMTP virtual

server is configured for internal e-mail, and

the other is the bridgehead server for an SMTP

connector that delivers all internet e-mail

messages. The internet SMTP virtual serveris

configured to use a DNS server at an ISP as an

external DNS server

The firewall configuration for MSTRAGERS.COM is

modified to permit only domain controllers to

make DNS queries to the internet. However, they

can receive e-mail messages from the internet

I need to ensure that users can use the

internet to send and receive e-mail messages?

First thing is I am unable to understand how the server is configured for network adapters? I have never configured this is a new concept to me. SMTP virtual Server I understand. It can be done by making new virtual server. Then I should go to server manager> protocols and connect the protocol to virtual server. Is this the procedure? Kindly help I am all confused in it. It is also a query that how any firewall be configured to make DNS queries to recieve messages from Internet?

I know things however I am not sure of what to do and Firstly the concept is bouncing away on me.

The network consists of a single Active

Directory domain MSTRADERS.COM that contains two

domain controllers. Each domain controller runs

Microsoft Windows Server 2003 and is configured

as a DNS server. Each DNS server is configured

with root hints for resolving internet hosts

names

Kindly tel me how root hints shall help for resolving internet hosts

names

a.Should I reconfigure the network adapter used by the

internet SMTP  virtual server to use the DNS

server at the ISP

b.Sholud I reconfigure the internet SMTP virtual server

to not use an external DNS server

c. Should I reconfigure the internet SMTP virtual server to

use a smart host to deliver e-mail messages. Use

the fully qualified domain (FQDN) of an SMTP

server managed by the ISP as the smart host

d. Or should I reconfigure the SMTP connector to use a smart

host to deliver e-mail messages. Use the fully

qualified domain name (FQDN) of an SMTP server

managed by the ISP as the smart host.
0
Comment
Question by:kunalclk
3 Comments
 
LVL 13

Assisted Solution

by:upalakshitha
upalakshitha earned 200 total points
Comment Utility
0
 
LVL 15

Accepted Solution

by:
WalkaboutTigger earned 300 total points
Comment Utility
As only your 2 servers are allowed to make external DNS requests, this should be fine because when a client computer performs a DNS lookup, the request goes to the client's configured DNS server (one of your 2 servers) and if the request is not in the DNS server's cache, the DNS server makes an extended request using the ROOT HINT servers to determine the answer to the request.

Since one of your servers is sending the e-mails and not the client computers, your staff will be able to send e-mails as long as they use your mail server to do so.

My question to you is, for what reason are you wanting to reconfigure your environment?  It sounds like you have an established, working system.  If this is not correct, has the system ever worked?  If it has worked in the past, has anything in the environment changed recently?

Also, when asking questions, it is best to NOT put your real domain name in the question as this can lead to people having far too much information about your environment.  Make up a false name, like DOMAIN.COM rather than your real domain.
0
 
LVL 2

Author Closing Comment

by:kunalclk
Comment Utility
tnx all and WalkaboutTiger great rajarshivp@gmail.com
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Not sure what the best email signature size is? Are you worried about email signature image size? Follow this best practice guide.
This process describes the steps required to Import and Export data from and to .pst files using Exchange 2010. We can use these steps to export data from a user to a .pst file, import data back to the same or a different user, or even import data t…
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now