Solved

How To verify MAPI replication is using the Correct Network

Posted on 2014-07-27
3
404 Views
Last Modified: 2014-08-30
In Exchange server 2010 or 2013, where MAPI and Replication Networks are separated, how can we tell that MAPI replication is using the Network it is supposed to use.
I run across this command, but Apparently it checks Replication Network which network it is using:
Get-MailboxDatabaseCopyStatus DB1 -ConnectionStatus | fl Name,OutgoingConnections,IncomingLogCopyingNetwork

I found that in this link:
http://sparesomeexchange.com/exchange-2010-databases-replicating-over-wrong-network/

I believe there is a mistake on the output at the bottom of the link :

after the author ran the commands:
Suspend-MailboxDatabaseCopy -Identity DB1\MBX-02
Suspend-MailboxDatabaseCopy -Identity DB1\MBX-03
Resume-MailboxDatabaseCopy -Identity DB1\MBX-02
Resume-MailboxDatabaseCopy -Identity DB1\MBX-03
 
Then

Get-MailboxDatabaseCopyStatus DB1 -ConnectionStatus | fl Name,OutgoingConnections,IncomingLogCopyingNetwork

Name : DB1\MBX-01
OutgoingConnections : {MBX-02,Management}, {MBX-03,Management}
IncomingLogCopyingNetwork :

the Output should show the name "Network" instead of Management, assuming he named the Mapi Network "Management" and Replication Network "Network"

I could be wrong

Thank you
0
Comment
Question by:jskfan
  • 2
3 Comments
 
LVL 13

Accepted Solution

by:
imkottees earned 500 total points
ID: 40223839
Hi,

You are right, I guess he might have pasted the same output. BTW the given command is correct one to verify the replication network.
0
 

Author Comment

by:jskfan
ID: 40227689
So, now that we know which command to use to verify Replication Network , then which command will verify the Mapi Network ?
0
 

Author Closing Comment

by:jskfan
ID: 40294667
Thanks
0

Featured Post

Does Powershell have you tied up in knots?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled
Windows 10 came with  a lot of built in applications, Some organisations leave them there, some will control them using GPO's. This Article is useful for those who do not want to have any applications in their image (example:me).
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question