Exchange Server Config
Exchange Server Config
Submitted By: Wipro InfoTech # 30, Divya Sree, Mission Road Bangalore
WIPRO I2 Confidential
Page 1 of 123
Table of Contents
Architectural Overview ............................................................................................................................... 4 Active Directory & Exchange 2007 Implementation Summary............................................................... 9 I2 POC Architecture .................................................................................................................................. 10 Active Directory 2008 Implementation .................................................................................................... 12 Configure DNS for Active Directory ........................................................................................................ 19 Check the Health of the Domain Controller. ........................................................................................... 23 AD Sites & Subnets Management ........................................................................................................... 24 Additional Domain Controller Setup. ...................................................................................................... 28 Configure Failover Clustering in Windows 2008 ................................................................................... 35 Exchange 2007 implementation .............................................................................................................. 46 Installing Exchange server 2007 ............................................................................................................. 50 Exchange 2007 CCR Implementation ...................................................................................................... 55 Installation of Edge Transport Server Role ............................................................................................ 65 Installation and Configuration of Certificate Services .......................................................................... 74 ISA 2006 Installation and Configuration ................................................................................................. 96 Conclusion ............................................................................................................................................... 122
WIPRO I2 Confidential
Page 2 of 123
Document Management Information Document Title: Project Document for Implementation of Exchange Server 2007 Document Status: Approved Wipro/In Review- I2/Approved by Customer. Document Publication History
Version Number Date Author(s) Remark
1.0
25-Nov-2008
Binil
WIPRO I2 Confidential
Page 3 of 123
Architectural Overview
As a messaging system that is widely used in both large corporations and small businesses, Exchange Server has always been scalable in both directions. However, new demands on messaging such as compliance, security, and disaster recovery have created new challenges for delivering a messaging system that works great in small businesses and large enterprises alike. To rise to these new challenges, the architecture of Exchange Server 2007 has been updated to take advantage of 64-bit hardware, simplified administration and routing, and to enable an Exchange server to host one or more server roles.
WIPRO I2 Confidential
Page 4 of 123
Server Roles
The following figure shows the some of the features for each Exchange 2007 server role.
WIPRO I2 Confidential
Page 5 of 123
Exchange Server provides a complete messaging system that can run on a single server meaning that all Exchange services reside on one server, as with the Microsoft Small Business Server product. However, there are significant gains in deployment, management, and security that come from having a flexible, modular system that can be installed across more than one machine. This concept was first introduced in Exchange 2000 Server; where a frontend server could be configured to proxy inbound Internet client protocols to the appropriate mailbox server. Front-end servers are optional and can reduce the load on mailbox servers and simplify Microsoft Office Outlook Web Access (OWA) and Exchange ActiveSync (EAS) user access. Having front-end servers in medium-size and large organizations made Exchange more scalable by concentrating particular tasks on a limited number of servers. In Exchange Server 2007, role-based deployment has been expanded, allowing you to assign predefined roles to specific servers. These roles allow organizations to control mail flow, increase security, and distribute services, as shown in the following illustration.
Client Access role. Similar to the front-end server in earlier versions of Exchange, this server proxies Internet client traffic to the correct mailbox server. Mailbox role. This role hosts user mailboxes stored in databases that can be replicated or clustered. Hub Transport role. This role provides internal routing of all messages from Edge servers, Unified Messaging (UM) servers, or between two users on the same mailbox database. The Hub Transport role is also where messaging policy is enforced for messages moving within and outside the organization. Unified Messaging role. This role enables PBX integration to allow voice mail and fax messages delivered to Exchange mailboxes and provide voice dial-in capabilities to Exchange Server. This role and its services are explained in more detail later in this paper.
WIPRO I2 Confidential Page 6 of 123
Edge Transport role. This server resides outside your internal network and provides onpremise e-mail security, antivirus, and anti-spam services for Exchange. Off-premise filtering can be provided by Exchange Hosted Filtering, discussed later.
Routing groups have been integrated with Active Directory sites. Because the design criteria for Active Directory site boundaries are similar to the design criteria for routing groups, and are the same in most organizations, Exchange now assumes a routing topology based on Active Directory site lines. Maintaining a separate Exchange routing topology and Active Directory site topology is no longer necessary.
WIPRO I2 Confidential
Page 7 of 123
WIPRO I2 Confidential
Page 8 of 123
WIPRO I2 Confidential
Page 9 of 123
I2 POC Architecture
WIPRO I2 Confidential
Page 10 of 123
I2 Domain Controllers
Server Name POCJDARDC POCJDAADC IP Address 10.156.220.100 10.156.220.101 Role RDC ADC FQDN POCJDARDC.JDATEST.COM POCJDAADC.JDATEST.COM
WIPRO I2 Confidential
Page 11 of 123
WIPRO I2 Confidential
Page 12 of 123
WIPRO I2 Confidential
Page 13 of 123
5. Select the forest functional Level as Windows Server 2003 and click next.
WIPRO I2 Confidential
Page 14 of 123
6. Select the Domain functional Level as Windows Server 2003 and click next.
WIPRO I2 Confidential
Page 15 of 123
9. Select the Directory for storing the Active Directory Database files and click next.
WIPRO I2 Confidential
Page 16 of 123
11. Review the Summary and click next to start the Active Directory installation.
WIPRO I2 Confidential
Page 17 of 123
WIPRO I2 Confidential
Page 18 of 123
1. Open DNS Management console in the Domain Controller. 2. Right Click on the Reverse Lookup Zone and select new Zone.
3. Select Primary zone and click next, Store the zone in Active Directory must be selected to enable
WIPRO I2 Confidential
Page 19 of 123
4. Select the Replication to All the DNS Servers and click next.
WIPRO I2 Confidential
Page 20 of 123
WIPRO I2 Confidential
Page 21 of 123
7. Once the zone is created, open forward lookup zone and right click on the Host record of the Domain controller and select properties. Put the tick mark on the Update Associated Pointer option and click OK. This will automatically create a Pointer record in the reverse lookup zone.
WIPRO I2 Confidential
Page 22 of 123
WIPRO I2 Confidential
Page 23 of 123
2. Name it as Bangalore and select the Default Site Link. Click OK and the site gets created.
WIPRO I2 Confidential
Page 24 of 123
3. Associate a subnet to the Bangalore Site. Right click on Subnets and select new Subnet.
WIPRO I2 Confidential
Page 25 of 123
4. Type the Subnet of the Domain Controllers with the Mask and associate it with Bangalore site and click OK.
WIPRO I2 Confidential
Page 26 of 123
5. Once the Subnet has been attached to the site, move the Domain Controller to the new Site. In the AD Sites and Services windows Right click on the Domain Controller and Select Move.
WIPRO I2 Confidential
Page 27 of 123
WIPRO I2 Confidential
Page 28 of 123
3. Select the option Add a Domain Controller in an existing Domain and click next.
WIPRO I2 Confidential
Page 29 of 123
WIPRO I2 Confidential
Page 30 of 123
6. Select the DNS and Global Catalog Roles and click next.
WIPRO I2 Confidential
Page 31 of 123
WIPRO I2 Confidential
Page 32 of 123
WIPRO I2 Confidential
Page 33 of 123
WIPRO I2 Confidential
Page 34 of 123
WIPRO I2 Confidential
Page 35 of 123
9. Select both node1 and node2 to the cluster and click next.
WIPRO I2 Confidential
Page 36 of 123
10. Select yes to run the Cluster validation tests and click next.
WIPRO I2 Confidential
Page 37 of 123
WIPRO I2 Confidential
Page 38 of 123
12. Give a name and IP Address for the Cluster and click next.
WIPRO I2 Confidential
Page 39 of 123
WIPRO I2 Confidential
Page 40 of 123
WIPRO I2 Confidential
Page 41 of 123
14. Once the Cluster is created, we need to configure the Quorum. 15. Exchange 2007 CCR supports File Witness Quorum. 16. Open the Failover Cluster Management; right click on the Windows Cluster we have created and Select Configure Cluster Quorum settings in the More Actions.
WIPRO I2 Confidential
Page 42 of 123
17. Select Node and File Share Majority and click next.
WIPRO I2 Confidential
Page 43 of 123
18. We need to select a shared folder that will act as File Share Majority. Before selecting the option create a folder in the Server where you will be installing the Exchange 2007 HUB Transport Role.
WIPRO I2 Confidential
Page 44 of 123
WIPRO I2 Confidential
Page 45 of 123
b. Enterprise Administrator c. Domain Administrator d. Schema Administrator (only required to extend the Schema) e. You complete Exchange 2007 installation by performing several tasks. You can complete all these tasks at the same time, or you can perform some of the tasks before you start Exchange 2007 server role installation. To complete installation, follow these steps
Pre-requisites for Exchange Server 2007 Hub/CAS/Mailbox Role Microsoft .NET Framework 2.0 (x64 bit) Microsoft Management Console 3.0 (x64 bit Windows Power Shell V1.0 IIS 6.0
WIPRO I2 Confidential
Page 47 of 123
Prepare Active Directory for Exchange 2007 1. Run the following commands in the Domain controller where the schema master role is running.
WIPRO I2 Confidential
Page 48 of 123
2. Once it is completed successfully, we can start the Exchange setup. Note: If you have Large AD infrastructure, you need to wait until the schema changes are replicated to all the Domain Controllers.
WIPRO I2 Confidential
Page 49 of 123
WIPRO I2 Confidential
Page 50 of 123
WIPRO I2 Confidential
Page 51 of 123
WIPRO I2 Confidential
Page 52 of 123
7. Select Client Access Role and Hub Transport Role and click next
WIPRO I2 Confidential
Page 53 of 123
WIPRO I2 Confidential
Page 54 of 123
WIPRO I2 Confidential
Page 55 of 123
WIPRO I2 Confidential
Page 56 of 123
WIPRO I2 Confidential
Page 57 of 123
4. Select Cluster Continuous Replication and type the Clustered Mailbox Server name as POCJDAMBX. This is the Virtual Exchange cluster name. Select Mailbox role location and click next.
5. Give an IP address for the Exchange Virtual Server and click next.
WIPRO I2 Confidential
Page 58 of 123
WIPRO I2 Confidential
Page 59 of 123
WIPRO I2 Confidential
Page 60 of 123
Passive Clustered Mailbox role installation 1. Run the Setup in the Passive node.
WIPRO I2 Confidential
Page 61 of 123
WIPRO I2 Confidential
Page 62 of 123
WIPRO I2 Confidential
Page 63 of 123
WIPRO I2 Confidential
Page 64 of 123
Network interface Between Edge and Internet Between Edge and HUB Local only HUB to Edge
Protocol SMTP
Note This port must be open for mail flow to and from the Internet. This port must be open for mail flow to and from the Exchange organization. This port is used to make a local connection to ADAM. This port must be open for EdgeSync synchronization. Opening this port is optional. It provides more flexibility in managing the Edge Transport servers from inside the internal network by letting you use a remote desktop connection to manage the Edge Transport server. This port provides DNS communication between Edge and HUB transport Servers. This port is optional since you can have a host record for the communication This port provides DNS communication between Edge and internet.
25/TCP
SMTP
50389/TCP 50636/TCP
3389/TCP
53/UDP
DNS
53/UDP
DNS
WIPRO I2 Confidential
Page 65 of 123
WIPRO I2 Confidential
Page 66 of 123
WIPRO I2 Confidential
Page 67 of 123
WIPRO I2 Confidential
Page 68 of 123
WIPRO I2 Confidential
Page 69 of 123
Configure Edge Subscription 1. Open the Exchange Management Shell in Edge transport Server and run the following command. New-EdgeSubscription -filename "C:\EdgeSubscriptionInfo.xml"
2. 3. 4. 5.
The file will get saved in c drive. Copy the file to HUB transport Server. After the file is copied, open Exchange management console in HUB transport Server. Under Organization configuration->Hub Transport->Edge Subscription. Click on new Edge Subscription.
WIPRO I2 Confidential
Page 70 of 123
6. Select the Active Directory site and click on browse to select the Edge Subscription xml file created in the Edge Transport Server and click New.
WIPRO I2 Confidential
Page 71 of 123
WIPRO I2 Confidential
Page 72 of 123
8. Once it is created we need to start the Edge Synchronization. Open Exchange Management shell in Hub Transport Server and execute the following command. Start-Edgesynchronization
WIPRO I2 Confidential
Page 73 of 123
WIPRO I2 Confidential
Page 74 of 123
WIPRO I2 Confidential
Page 75 of 123
5. Select Root CA since this is the first CA we are installing in the Domain.
WIPRO I2 Confidential
Page 76 of 123
WIPRO I2 Confidential
Page 77 of 123
7. We can set the validity period for the certificates generated by this CA.
WIPRO I2 Confidential
Page 78 of 123
WIPRO I2 Confidential
Page 79 of 123
WIPRO I2 Confidential
Page 80 of 123
10. Once the CA has been installed, open the IIS console in the Client Access Server and double click on Certificate option. Click on Create certificate request.
11. Give the common name as webmail.i2technologies.com and give other details.
WIPRO I2 Confidential
Page 81 of 123
12. Specify a location and give the file name to save the certificate request file.
WIPRO I2 Confidential
Page 82 of 123
WIPRO I2 Confidential
Page 83 of 123
13. Once completed connect to Certificate Authority by the following URL. http://pocjdaadc/certsrv
WIPRO I2 Confidential
Page 84 of 123
WIPRO I2 Confidential
Page 85 of 123
16. Open the Certificate request text file which was created earlier.
17. Copy the entire contents of the file and paste it in the Saved request box in the Certificate request console. Select Web Server certificate.
WIPRO I2 Confidential
Page 86 of 123
WIPRO I2 Confidential
Page 87 of 123
19. Once the certificate is downloaded. Open the IIS console in Exchange CAS Server. Open Server certificate option and click on Complete Certificate Request.
WIPRO I2 Confidential
Page 88 of 123
20. Select the Certificate downloaded from the CA and give any friendly name.
WIPRO I2 Confidential
Page 89 of 123
22. After the certificate is installed, we need to enable the certificate in Exchange. Open the certificates installed and copy the thumbprint from the certificate.
WIPRO I2 Confidential
Page 90 of 123
23. Remove the space between the numbers in the thumb print.
WIPRO I2 Confidential
Page 91 of 123
WIPRO I2 Confidential
Page 92 of 123
26. Paste the thumb print which was copied earlier and press enter.
27. This will enable the Webmail certificate created in the Exchange.
WIPRO I2 Confidential
Page 93 of 123
WIPRO I2 Confidential
Page 94 of 123
4. Type the external host name through which the Outlook Anywhere will be accessed. Usually it will be the same name you access OWA from internet. Select basic Authentication and click Enable.
WIPRO I2 Confidential
Page 95 of 123
WIPRO I2 Confidential
Page 96 of 123
WIPRO I2 Confidential
Page 97 of 123
4. Select Install both ISA Server services and Configuration Storage server and click next.
WIPRO I2 Confidential
Page 98 of 123
WIPRO I2 Confidential
Page 99 of 123
7. Click on Add to select the internal network and Add the IP address rages in the network.
WIPRO I2 Confidential
WIPRO I2 Confidential
WIPRO I2 Confidential
WIPRO I2 Confidential
Install the Webmail Certificate in ISA Server. 1. We need to install the Webmail Certificate issued to CAS server in ISA Server. ISA will use this Certificate to authenticate the Client Requests. 2. Open MMC in ISA Server->Add Computer Certificates->Personal Certificate 3. Right click on the Certificates->All Tasks->Select Import.
WIPRO I2 Confidential
4. Click browse and Select the Webmail certificate ( Export the Certificate from CAS server and copy it to ISA Server before this step)
WIPRO I2 Confidential
WIPRO I2 Confidential
WIPRO I2 Confidential
ISA 2006 Configuration 1. By Default there will be one rule Deny any to any traffic rule will be created in ISA Server.
WIPRO I2 Confidential
Publish Outlook Web Access in ISA 2006 1. To Publish OWA, open ISA console->Firewall Policies->Click on Publish Exchange Web Client Access. Give a name for the rule and click next.
2. In the Exchange Version select Exchange 2007 and select Outlook Web Access in the Web Client mail services.
WIPRO I2 Confidential
WIPRO I2 Confidential
4. Type the name of the internal web site that is publishing and select the CAS server name and click next.
5. Type the external OWA url in the Public name and click next.
WIPRO I2 Confidential
6. The Web Listener page appears. We need to create a new Listener for the OWA Publishing. Click on New in the Web Listener window.
WIPRO I2 Confidential
8. We need to have SSL connection when clients connect to the Server. Select the option and click next.
9. Select the External network and add the IP subnets for that.
WIPRO I2 Confidential
10. Also select the internal network and add the IP subnets.
WIPRO I2 Confidential
11. The Certificate screen appears. Select the webmail certificate for both the networks.
WIPRO I2 Confidential
WIPRO I2 Confidential
12. Select Form based authentication for the client communication and select Active Directory for the client credential verification.
WIPRO I2 Confidential
WIPRO I2 Confidential
WIPRO I2 Confidential
WIPRO I2 Confidential
Redirect Http requests to Https in ISA 2006 1. Open the Web Listener properties and click on connections. 2. Select Redirect authenticated traffic from http to https.
WIPRO I2 Confidential
Conclusion
Installation and configuration of Exchange 2007 has been completed successfully. Exchange mailbox Servers are installed on a CCR setup and client Access Server are configured on a Hardware Load balancer. Exchange Internet Access has been published through ISA 2006.
WIPRO I2 Confidential
WIPRO I2 Confidential