Solved

configuration for internet email, Outlook 2010 & Exchange 2013

Posted on 2013-01-27
5
446 Views
Last Modified: 2013-02-09
Coming from Outlook 2010 on Exchange 2003.  Each outlook client went out & retrieved the internet email from a hosted mail server.  Is this the best way, or should Exchange 2013 retrieve that internet email for all the mailboxes?  If so, how is this setup?  The internal email is working on the new exchange but couldn't seem to get it to go get the internet emails.
0
Comment
Question by:natjohn
  • 3
  • 2
5 Comments
 
LVL 11

Expert Comment

by:hecgomrec
ID: 38827853
Do you have any MX records pointing to your server with your ISP?
Where all your settings properly migrated to your new Exchange 2013 or your 2003 still running.
0
 

Author Comment

by:natjohn
ID: 38828310
No, I have not entered in any MX records.  It was not done on the exchange 2003 after the office switched to a web hosted internet email and home page.  Can you point me to a good procedure as to how to do this in exchange 2013?
0
 
LVL 11

Expert Comment

by:hecgomrec
ID: 38828606
Sorry I don't quite understand.  Are you using Exchange SMTP or you are connecting your users to a webservice?
0
 

Author Comment

by:natjohn
ID: 38835395
SMTP.  It has to go out to bluehost to login and send/receive emails.  I will try creating the mx record-just have no experience at this.
0
 
LVL 11

Accepted Solution

by:
hecgomrec earned 500 total points
ID: 38835780
MX records are usually created on you ISP.

If you are connecting to a webservice (bluehost) I think you should contact their support team and ask them to help you out.

If the previous exchange (2003) was getting the emails from them most likely the records are set properly from their end.

You then must create the connector using that information on your Exchange 2013.  Also remember to  match the settings on your firewall to let the external packages pass to your internal IP.

Good Luck
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

When you are trying to access the server, have you ever encountered "The terminal server has exceeded the maximum number of allowed connection" error?  or "The user is attempting to log on to a Terminal Server in Remote Administration mode, but the …
Introduction: Sometimes when I receive a call from my users to solve their problems it is very difficult for me to found their computer IP address. Even finding their computer Host to provide remote support can be a problem.  So I resorted to Goo…
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now