Avatar billede bjs Nybegynder
25. september 2009 - 09:07 Der er 10 kommentarer

OWA 2003 i 2008 MS dc-miljø

Jeg har for nylig udskiftet min dc Srv 2003 til 2 stk. Srv 2008. Dc 2003'eren har fået fjernet sin dc-rolle, og der er lavet stubzoner for at sikre at DNS-forespørgsler kommer videre til den nye primær dc. Exchange 2003 serveren kører stadigvæk på en Srv 2003.
Det har tilsyneladene givet vores OWA-server i DMZ'en nogle problemer med at validere folk.
Er det noget opsætning som skal rettes til, for at OWA'en kan fortsætte med at fungere?
Avatar billede riversen Nybegynder
26. september 2009 - 19:29 #1
det kunne lyde som om du ikke har åbnet op for ldap til de nye dc'ere i firewall'en
Avatar billede bjs Nybegynder
27. september 2009 - 17:27 #2
okay... kender du alle portene som skal være åbne hhv. fra DMZ til LAN og LAN til DMZ for at det kommer til at virke?
Jeg har i hvert fald åbnet for 389 og 636 og 3268
Avatar billede riversen Nybegynder
27. september 2009 - 22:29 #3
prøv at tjekke din eventlog for fejl
Avatar billede Slettet bruger
28. september 2009 - 12:34 #4
Da jeg i sin tid stod for administrationen af et netværk med exchange servere og en isa server, havde vi åbnet for følgende protokoller mellem DMZ (exchange front-end) og LAN (exchange backend):

1. DNS

2. Kerberos-Sec (TCP)
Kerberos-Sec (UDP)

3. LDAP
LDAP (UDP)
LDAP GC (Global Catalog)

4. Microsoft CIFS (TCP)

5. NetBios Session

6. NTP (UDP)

7. PING

8. RPC (all interfaces)

9. SMTP

1-8 er fra DMZ Exchange serveren til domain controller på LAN - udelukende til autentificering og 9 er naturligvis til levering af post på port 25.
Avatar billede bjs Nybegynder
29. september 2009 - 14:49 #5
Jeg har prøvet at gennemgå de porte som er åbne mellem DMZ og LAN, og match dem op mod ovenstående, men det ser ikke ud til at virke alligevel. Når jeg kigger i min firewall-log kan jeg se at der tilsyneladende bliver brugt en random-port. Kan man komme udenom det? Måske ved at sætte en statisk port?
Avatar billede Slettet bruger
30. september 2009 - 10:17 #6
Hvilken protokol er det, der benytter den 'random port'?
Avatar billede bjs Nybegynder
30. september 2009 - 12:07 #7
Umiddelbart kan jeg ikke se i vores FW hvilken protokol der benytter en random port. Jeg kan bare se at der ikke er noget mønster reelt mønster i hviket portnummer der vælges.
Avatar billede Slettet bruger
30. september 2009 - 12:16 #8
Har du prøvet at lave en firewall regel, hvor der er frit spil fra Exchange serveren i DMZ til den interne LAN server? Og måske den anden vej?
Mere for at se om det virker og om der er tale om et firewall 'problem'...
Avatar billede Slettet bruger
30. september 2009 - 12:19 #9
Taget fra http://support.microsoft.com/kb/270836:

Statically map the ports for a front-end server in a perimeter network Ethernet environment so that the computer can log on to the network and communicate with the back-end servers
To install Exchange Server 2003 or Exchange 2000 Server on computers that are isolated from their Microsoft Windows Server 2003 or Microsoft Windows 2000 networks by a firewall and that are in a perimeter network Ethernet environment, follow these steps:

  1. To enable Windows Server 2003-based computers or Windows 2000-based computers to log on to the domain through the firewall, open the following ports for incoming traffic:
          * 53 (Transmission Control Protocol [TCP], User Datagram Protocol [UDP]) - Domain Name System (DNS).
          * 80 (TCP) - Required for Outlook Web Access access for communication between front-end and back-end Exchange servers.
          * 88 (Transmission Control Protocol [TCP], UDP) - Kerberos authentication.
          * 123 (UDP) - Windows Time Synchronization Protocol (NTP). This is not required for Windows 2000 logon capability. However, it may be configured or required by the network administrator.
          * 135 (TCP) - EndPointMapper.
          * 389 (TCP, UDP) - Lightweight Directory Access Protocol (LDAP).
          * 445 (TCP) - Server message block (SMB) for Netlogon, LDAP conversion, and Microsoft Distributed File System (DFS) discovery.
          * 3268 (TCP) - LDAP to global catalog servers.
          * One port for the Active Directory logon and directory replication interface (universally unique identifiers [UUIDs] 12345678-1234-abcd-ef00-01234567cffb and 3514235-4b06-11d1-ab04-00c04fc2dcd2). This is typically assigned port 1025 or 1026 during startup. This value is not set in the DSProxy or System Attendant (MAD) source code. Therefore, you must map the port in the registry on any domain controllers that the Exchange server must contact through the firewall to process logons. Then, open the port on the firewall.

            To map the port in the registry, follow these steps:
              1. Start Registry Editor.
              2. Locate and then click to select the following key:
                  HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters
              3. Add the following registry value:
                  Value name: TCP/IP Port
                  Value type: REG_DWORD
                  Base: Decimal
                  Value: A value that is more than 1024
              4. Exit Registry Editor.
            Make sure that the slash in "TCP/IP" is a forward slash. Additionally, make sure that you assign a value that is more than 1024 (decimal). This number is the additional port that you must open (TCP, UDP) on the firewall. Setting this registry value on every domain controller inside the firewall does not affect performance. Additionally, setting this registry value covers any logon request redirects that occur because of servers that are down, roles that change, or bandwidth requirements.
      Notes
          * For the server inside the firewall to communicate through the firewall to the external server, you must also have ports 1024 through 65535 configured for outgoing communications. Computers that initiate the communication through the firewall use a client-side port that is dynamically assigned and cannot be configured.
          * Windows 2000 takes the form of a sequence of TCP/IP ping requests to the destination server when Windows 2000 Server-based computers log on to the domain through the firewall. Windows 2000 does this to determine whether a client computer is gaining access to a domain controller over a slow link to apply Group Policy or to download a roaming user profile.
  2. Install Exchange Server 2003 or Exchange 2000 Server on the external computer. You do not need any more ports open to install Exchange Server 2003 or Exchange 2000 Server on the external computer.
  3. Configure Exchange Server 2003 or Exchange 2000 Server front-end and back-end connectivity. Exchange Server 2003 or Exchange 2000 Server front-end and back-end connectivity only requires that other ports be open as required for whatever communication is appropriate. For example, Web client front-end and back-end connectivity requires port 80 [TCP] open, IMAP 143 [TCP], and so on. Additionally, any connectivity by secure protocols, such as Ipsec or Secure Sockets Layer (SSL)-secured HTTP, Internet Message Access Protocol (IMAP), or Post Office Protocol version 3 (POP3), that you need requires additional configuration that is not specified in this article. If the front-end server in the perimeter network has a different subnet, make sure that you add that subnet in the Active Directory Sites and Services snap-in.

      Note You do not have to add the subnet if you have not created a separate subnet object in Active Directory Sites and Services.


      In a perimeter network Ethernet environment, you must also define TCP/IP routes from the computer in the perimeter network Ethernet environment to every computer in the internal network that you must communicate with.

      Note In a perimeter network firewall scenario, there is no Internet Control Message Protocol (ICMP) connectivity between the Exchange server and the domain controllers. By default, Directory Access (DSAccess) uses ICMP to ping each server to which it connects to determine whether the server is available. When there is no ICMP connectivity, Directory Access responds as if every domain controller were unavailable. For more information about how to turn off the Directory Access ping by creating a registry key, click the following article numbers to view the articles in the Microsoft Knowledge Base:
      320529  (http://support.microsoft.com/kb/320529/ ) Using DSAccess in a perimeter network firewall scenario requires a registry key setting
      320228  (http://support.microsoft.com/kb/320228/ ) The "DisableNetLogonCheck" registry value and how to use it
Avatar billede Slettet bruger
12. oktober 2009 - 12:41 #10
Har du fået det til at spille?
Avatar billede Ny bruger Nybegynder

Din løsning...

Tilladte BB-code-tags: [b]fed[/b] [i]kursiv[/i] [u]understreget[/u] Web- og emailadresser omdannes automatisk til links. Der sættes "nofollow" på alle links.

Loading billede Opret Preview
Kategori
IT-kurser om Microsoft 365, sikkerhed, personlig vækst, udvikling, digital markedsføring, grafisk design, SAP og forretningsanalyse.

Log ind eller opret profil

Hov!

For at kunne deltage på Computerworld Eksperten skal du være logget ind.

Det er heldigvis nemt at oprette en bruger: Det tager to minutter og du kan vælge at bruge enten e-mail, Facebook eller Google som login.

Du kan også logge ind via nedenstående tjenester