Solved

Exchange Mapi and Network Traffic

Posted on 2014-07-27
3
376 Views
Last Modified: 2014-07-29
In Exchange DAG there is an option to separate Mapi Traffic from Network Traffic.
I am not sure if I am correct, this can be done only if each Exchange server has at least 2 Network Adapters.

I need to understand What is exactly Mapi Traffic and what is exactly Network traffic with regards to Exchange.

Assuming this Exchange organization is in one Site.

Thanks
0
Comment
Question by:jskfan
3 Comments
 
LVL 13

Assisted Solution

by:imkottees
imkottees earned 250 total points
ID: 40223864
Hi,

Please check DAG name and requirements section in below article.

http://technet.microsoft.com/en-in/library/dd638104(v=exchg.150).aspx

Configuring DAG Networks in Exchange 2010:
http://blog.gothamtg.com/2012/09/26/configuring-dag-networks/
0
 
LVL 37

Accepted Solution

by:
Jamie McKillop earned 250 total points
ID: 40223946
Hello,

There are two types of network traffic with an Exchange DAG. MAPI traffic is used for communication between Exchange servers and between clients and the Exchange servers. Replication traffic is used for log shipping between DAG members. You need two NICs in each DAG member in order to have a separate replication network. You would want to create a separate replication network so that replication traffic doesn't have a negative impact on client performance.

-JJ
0
 

Author Closing Comment

by:jskfan
ID: 40228151
Thanks
0

Featured Post

Problems using Powershell and Active Directory?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

While rebooting windows server 2003 server , it's showing "active directory rebuilding indices please wait" at startup. It took a little while for this process to complete and once we logged on not all the services were started so another reboot is …
Read this checklist to learn more about the 15 things you should never include in an email signature.
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now