Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Deploy Exchange 2013 with  MBX, CAS, UM between two locations

Posted on 2013-11-07
1
Medium Priority
?
624 Views
Last Modified: 2013-11-09
Dear All,

   I'm planning to migrate from my Exchange 2010 Sp3 to Exchange 2013. My plan is to deploy two Exchange 2013 servers  ( Primary Site, DR ) and configure DAG between the two sites.
can someone advise if I can use all the roles MBX, CAS,UM and I will have Kemp load balancer between them and what's the recommended setup for this.


Thanks
0
Comment
Question by:ITMaster1979
1 Comment
 
LVL 63

Accepted Solution

by:
Simon Butler (Sembee) earned 750 total points
ID: 39630390
You can have all the roles on the same server - just ensure that they have enough power to do everything. Then you can use a Kemp to manage connectivity. No issues there at all.
Kemp have templates for Exchange 2013, so you just need to ensure that you follow their guides on the setup and configuration of Exchange.

I always get Exchange working correctly first, before introducing the load balancer, even if that means undoing some of my configuration.

Simon.
0

Featured Post

Ask an Anonymous Question!

Don't feel intimidated by what you don't know. Ask your question anonymously. It's easy! Learn more and upgrade.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Here in this article, you will get a step by step guidance on how to restore an Exchange database to a recovery database. Get a brief on Recovery Database and how it can be used to restore Exchange database in this section!
This month, Experts Exchange sat down with resident SQL expert, Jim Horn, for an in-depth look into the makings of a successful career in SQL.
To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

926 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question