How to safely cahnge the Exchange Server CCR mailbox IP address ?

Posted on 2013-11-24
Last Modified: 2013-12-01
Hi People,

Can anyone here please assist me in the steps that is best to change each of the IP address in the production node (blue site) only from the following diagram ?

Exchange Server 2007 CCR mailbox
My understanding is that when the mailbox is failover to the Recovery node, then the mailbox server in the blue / production site can be safely changed without dismounting the Mailbox DB in both sites.

Any help would be greatly appreciated.

Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
LVL 12

Assisted Solution

florin_s earned 167 total points
ID: 39673005

Author Comment

by:Senior IT System Engineer
ID: 39673804
Florin, thanks for the clarification.

How to change the MSCS cluster name ? I cannot find it anywhere in the GUI ?

do I have to use cluster.exe commandline ?
LVL 20

Assisted Solution

compdigit44 earned 333 total points
ID: 39679445
Hi ITSystemEngineer, I believe the following link has the instructions you are looking for:

Author Comment

by:Senior IT System Engineer
ID: 39679465
is that procedure the same for Exchange Server 2007 ?
LVL 20

Accepted Solution

compdigit44 earned 333 total points
ID: 39679499
I found the link within the following posting. So I would say yes the steps "should" work in Exchange 2007

Featured Post

Problems using Powershell and Active Directory?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Ransomware is a malware that is again in the list of security  concerns. Not only for companies, but also for Government security and  even at personal use. IT departments should be aware and have the right  knowledge to how to fight it.
After hours on line I found a solution which pointed to the inherited Active Directory permissions . You have to give/allow permissions to the "Exchange trusted subsystem" for the user in the Active Directory...
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question