Solved

How To verify MAPI replication is using the Correct Network

Posted on 2014-07-27
3
421 Views
Last Modified: 2014-08-30
In Exchange server 2010 or 2013, where MAPI and Replication Networks are separated, how can we tell that MAPI replication is using the Network it is supposed to use.
I run across this command, but Apparently it checks Replication Network which network it is using:
Get-MailboxDatabaseCopyStatus DB1 -ConnectionStatus | fl Name,OutgoingConnections,IncomingLogCopyingNetwork

I found that in this link:
http://sparesomeexchange.com/exchange-2010-databases-replicating-over-wrong-network/

I believe there is a mistake on the output at the bottom of the link :

after the author ran the commands:
Suspend-MailboxDatabaseCopy -Identity DB1\MBX-02
Suspend-MailboxDatabaseCopy -Identity DB1\MBX-03
Resume-MailboxDatabaseCopy -Identity DB1\MBX-02
Resume-MailboxDatabaseCopy -Identity DB1\MBX-03
 
Then

Get-MailboxDatabaseCopyStatus DB1 -ConnectionStatus | fl Name,OutgoingConnections,IncomingLogCopyingNetwork

Name : DB1\MBX-01
OutgoingConnections : {MBX-02,Management}, {MBX-03,Management}
IncomingLogCopyingNetwork :

the Output should show the name "Network" instead of Management, assuming he named the Mapi Network "Management" and Replication Network "Network"

I could be wrong

Thank you
0
Comment
Question by:jskfan
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 13

Accepted Solution

by:
imkottees earned 500 total points
ID: 40223839
Hi,

You are right, I guess he might have pasted the same output. BTW the given command is correct one to verify the replication network.
0
 

Author Comment

by:jskfan
ID: 40227689
So, now that we know which command to use to verify Replication Network , then which command will verify the Mapi Network ?
0
 

Author Closing Comment

by:jskfan
ID: 40294667
Thanks
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

After hours on line I found a solution which pointed to the inherited Active Directory permissions . You have to give/allow permissions to the "Exchange trusted subsystem" for the user in the Active Directory...
In this post we will be converting StringData saved within a text file into a hash table. This can be further used in a PowerShell script for replacing settings that are dynamic in nature from environment to environment.
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…

687 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question