Solved

Exchange 2010 CAS Role

Posted on 2011-09-09
6
411 Views
Last Modified: 2012-08-13
When Accessing mailbox using MAPI client [Outlook] or sending email using MAPI client [Outlook], I wonder if Outlook needs first to go through CAS Role or straight to Mailbox server role .

Thanks
0
Comment
Question by:jskfan
  • 3
  • 2
6 Comments
 
LVL 11

Assisted Solution

by:stefor
stefor earned 166 total points
ID: 36509418
In Exchange 2007 and 2010 you need the Client Access Role to access the mailbox. You will also need the Hub transport role to send e-mails.
0
 

Author Comment

by:jskfan
ID: 36509468
0
 
LVL 49

Accepted Solution

by:
Akhater earned 334 total points
ID: 36509496
in Exchange 2007 MAPI connections will be to the mailbox server, in exchange 2010 MAPI connections are done to the CAS servers.

0
[Webinar] Disaster Recovery and Cloud Management

Learn from Unigma and CloudBerry industry veterans which providers are best for certain use cases and how to lower cloud costs, how to grow your Managed Services practice in IaaS clouds, and how to utilize public cloud for Disaster Recovery

 

Author Comment

by:jskfan
ID: 36512300
Microsoft Link I posted above, talks about the client that goes through CAS server, I have not see MAPI client (Outlook). it looks like it is used as the old Front End Server.
0
 
LVL 49

Assisted Solution

by:Akhater
Akhater earned 334 total points
ID: 36512561
Again in exchange 2010 ALL CLIENTS access is through the CAS including MAPI (exception is the public folder access), it is now a complete 3 tiers technology.

In exchange 2007 MAPI clients will connect to the Mailbox server directly all other clients to the cas (like the old FE server)

If you are having a hard time believing me read this
http://www.msexchange.org/articles_tutorials/exchange-server-2007/planning-architecture/uncovering-new-rpc-client-access-service-exchange-2010-part1.html
0
 

Author Closing Comment

by:jskfan
ID: 36516630
thanks
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

What does UTC stand for?  “Coordinated Universal Time” – Think of this as the true time on Planet Earth that never changes with the exception of minor leap seconds here and there to account for the changes in the planet's rotation.   What does th…
Read this checklist to learn more about the 15 things you should never include in an email signature.
In this Micro Video tutorial you will learn the basics about Database Availability Groups and How to configure one using a live Exchange Server Environment. The video tutorial explains the basics of the Exchange server Database Availability grou…
This Experts Exchange video Micro Tutorial shows how to tell Microsoft Office that a word is NOT spelled correctly. Microsoft Office has a built-in, main dictionary that is shared by Office apps, including Excel, Outlook, PowerPoint, and Word. When …

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now