VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.

Slides:



Advertisements
Similar presentations
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
Advertisements

BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Module 5: Configuring Access to Internal Resources.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter 10 Securing Exchange Server 2003.
Chapter 7 HARDENING SERVERS.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Lesson 20 – OTHER WINDOWS 2000 SERVER SERVICES. DHCP server DNS RAS and RRAS Internet Information Server Cluster services Windows terminal services OVERVIEW.
Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
Chapter 13 Chapter 13: Managing Internet and Network Interoperability.
COS/PSA 413 Day 17. Agenda Lab 8 write-up grades –3 B’s, 1 C and 1 F –Answer the Questions!!! Capstone progress report 2 overdue Today we will be discussing.
1 Integrating ISA Server and Exchange Server. 2 How works.
Windows Server 2008 Chapter 8 Last Update
Chapter 11: Dial-Up Connectivity in Remote Access Designs
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
1 SMTP Transport Configuration SMTP Configurations and Virtual Servers Customizing the SMTP Service.
Managing Client Access
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Configuring a Web Server. Overview Overview of IIS Preparing for an IIS Installation Installing IIS Configuring a Web Site Administering IIS Troubleshooting.
Chapter 7: Using Windows Servers to Share Information.
SMTP PROTOCOL CONFIGURATION AND MANAGEMENT Chapter 8.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Internet-Based Client Access
Module 8: Managing Client Configuration and Connectivity.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Web Server Administration Chapter 10 Securing the Web Environment.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Securing Microsoft® Exchange Server 2010
Module 6: Manage and Configure Messaging. Configuring Internet Mail Using Small Business Server (SBS) 2008 Console Configuring Protection Configuring.
Chapter 6: Packet Filtering
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Services Working at a Small-to-Medium Business or ISP – Chapter 7.
INSTALLING MICROSOFT EXCHANGE SERVER 2003 CLUSTERS AND FRONT-END AND BACK ‑ END SERVERS Chapter 4.
Microsoft Internet Information Services 5.0 (IIS) By: Edik Magardomyan Fozi Abdurhman Bassem Albaiady Vince Serobyan.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Exchange Exchange Server Role Architecture in Exchange Server 2013 Server roles in Exchange Server 2013: Client Access Server Mailbox Server Client.
Course ILT Internet/intranet support Unit objectives Use the Internet Information Services snap-in to manage IIS, Web sites, virtual directories, and WebDAV.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Seven Configuring and Managing Exchange Server.
Module 4 Planning and Deploying Client Access Services in Microsoft® Exchange Server 2010 Presentation: 120 minutes Lab: 90 minutes After completing.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Module 8: Planning and Troubleshooting IPSec. Overview Understanding Default Policy Rules Planning an IPSec Deployment Troubleshooting IPSec Communications.
Chapter 3: Services of Network Operating Systems Maysoon AlDuwais.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
Module 6: Integrating ISA Server 2004 and Microsoft Exchange Server.
Module 7: Managing Message Transport. Overview Introduction to Message Transport Implementing Message Transport.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Module 6: Managing Client Access. Overview Implementing Client Access Servers Implementing Client Access Features Implementing Outlook Web Access Introduction.
Module 2: Overview of IIS 7.0 Application Server.
Module 5 Planning and Deploying Message Transport in Microsoft® Exchange Server 2010.
  is a system of electronic communication that allows the user to exchange messages over the internet  Everyone’s address is unique  Two.
1 Microsoft Outlook Web Access Outlook Web Access Overview Outlook Web Access Environments.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Securing the Network Perimeter with ISA Server 2004 Ravi Sankar IT Professional Evangelist Microsoft.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
Chapter 7: Using Windows Servers
CONFIGURING A MICROSOFT EXCHANGE SERVER 2003 INFRASTRUCTURE
Securing the Network Perimeter with ISA 2004
SUBMITTED BY: NAIMISHYA ATRI(7TH SEM) IT BRANCH
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
IIS.
Working at a Small-to-Medium Business or ISP – Chapter 7
Chapter 7 Network Applications
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

VIRTUAL SERVERS Chapter 7

2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers Configuring virtual servers Front-end and back-end configuration Authentication Encryption Diagnostic logging Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers Configuring virtual servers Front-end and back-end configuration Authentication Encryption Diagnostic logging

3 EXCHANGE SERVER 2003 VIRTUAL SERVERS HTTP Yes No Default Virtual Server Enabled SMTP NNTP POP3 IMAP4 Yes No

4 VIRTUAL SERVERS IN A CLUSTERING ENVIRONMENT Microsoft Windows Cluster service: Exchange Server 2003 installs as a virtual server Failover to other node Network load balancing: Create identical redundant virtual servers on all nodes Configuration of every server in the cluster must be the same Microsoft Windows Cluster service: Exchange Server 2003 installs as a virtual server Failover to other node Network load balancing: Create identical redundant virtual servers on all nodes Configuration of every server in the cluster must be the same

5 VIRTUAL SERVER REQUIREMENTS Static IP address Network name One or more dedicated physical disks Exchange 2003 Server System Attendant

6 DEFAULT VIRTUAL SERVER CONFIGURATIONS (All Unassigned) Virtual Server TCP Port IP Address SSL Port POP IMAP4 NNTP HTTP SMTP (All Unassigned) N/A

7 POP3 VIRTUAL SERVERS Retrieve a specific user’s mail from the server Access only server inboxes Do not send Can configure the following: Access to specific computers, groups of computers, or domains Authentication (back-end only) Encryption Number of inbound connections Messaging format

8 IMAP4 VIRTUAL SERVERS Very similar to POP3 Do not support uuencode or binhex for Macintosh Can be configured to do the following: List public folders Disable complete public folder listings Enable fast message retrieval Very similar to POP3 Do not support uuencode or binhex for Macintosh Can be configured to do the following: List public folders Disable complete public folder listings Enable fast message retrieval

9 NNTP VIRTUAL SERVERS Access newsgroups Enable Microsoft Outlook users to participate in online discussions Let you assign a moderator to a newsgroup Access newsgroups Enable Microsoft Outlook users to participate in online discussions Let you assign a moderator to a newsgroup

10 NNTP VIRTUAL SERVERS (CONT.) Can be configured to do the following: Define expiration policies Allow control messages Limit inbound connections Include or exclude single computers, subnets, and entire domains Limit the length of time idle connections remain logged on to the server Limit the total size of articles that a user can post during a single connection Limit the size of individual articles that a user can post Encrypt the connection Authenticate users

11 HTTP VIRTUAL SERVERS Exchange virtual server configured using IIS Manager Additional HTTP virtual servers configured using Exchange System Manager Virtual directories provide additional content HTTP virtual servers support OWA Exchange virtual server configured using IIS Manager Additional HTTP virtual servers configured using Exchange System Manager Virtual directories provide additional content HTTP virtual servers support OWA

12 HTTP AND WEBDAV HTTP and Web Distributed Authoring and Versioning (WebDAV) provide access to the following: Documents Applications HTTP and Web Distributed Authoring and Versioning (WebDAV) provide access to the following: Documents Applications

13 SMTP VIRTUAL SERVERS Internet standard for transporting and delivering electronic messages Default SMTP virtual server installed and enabled Can configure the following: Security options Message delivery options Mail relay Message filtering TLS encryption Internet standard for transporting and delivering electronic messages Default SMTP virtual server installed and enabled Can configure the following: Security options Message delivery options Mail relay Message filtering TLS encryption

14 DEMONSTRATION: CONFIGURING THE EXCHANGE VIRTUAL SERVER

15 DEMONSTRATION: CREATING AN ADDITIONAL HTTP VIRTUAL SERVER

16 DEMONSTRATION: CONFIGURING AN ADDITIONAL HTTP VIRTUAL SERVER

17 DEMONSTRATION: CREATING ADDITIONAL POP3, IMAP4, AND SMTP VIRTUAL SERVERS

18 DEMONSTRATION: CONFIGURING THE ADDITIONAL POP3 VIRTUAL SERVER

19 DEMONSTRATION: CONFIGURING THE DEFAULT IMAP4 VIRTUAL SERVER

20 DEMONSTRATION: CONFIGURING THE DEFAULT SMTP VIRTUAL SERVER

21 DEMONSTRATION: CREATING AN ADDITIONAL NNTP VIRTUAL SERVER

22 DEMONSTRATION: CONFIGURING THE ADDITIONAL NNTP VIRTUAL SERVER

23 FRONT-END AND BACK-END CONFIGURATION Provides a unified namespace Reduces SSL overhead Front-end virtual servers handle incoming client connections Back-end virtual servers run the databases Create a virtual HTTP server on every back- end server for each front-end server Authentication and connection timeout settings vary between server roles

24 AUTHENTICATION Anonymous Basic Integrated Windows Simple Authentication and Security Layer (SASL) Digest.NET Password

25 ENCRYPTION Requires a certificate Resource intensive (especially processor) SSL and TLS encryption require basic authentication Encryption jumbles message so that third parties cannot read it Authentication ensures users are who they claim to be Digital signature proves that a specific person is the message sender

26 ENCRYPTION METHODS Encrypts all traffic between source and destination Invisible to user Not specific to Encrypts all traffic between source and destination Invisible to user Not specific to SSL Typically implemented on IMAP4, POP3, and HTTP virtual servers on front-end Exchange servers Implemented on SMTP virtual servers Both sender and receiver need to implement TLS Typically used for communication between partner organizations Not used for general Internet Implemented on SMTP virtual servers Both sender and receiver need to implement TLS Typically used for communication between partner organizations Not used for general Internet TLS IPSec

27 AUTHENTICATION OPTIONS: ADDITIONAL HTTP VIRTUAL SERVER ON A BACK-END SERVER

28 AUTHENTICATION OPTIONS: ADDITIONAL HTTP VIRTUAL SERVER ON A FRONT-END SERVER

29 AUTHENTICATION OPTIONS: POP3 AND IMAP4 VIRTUAL SERVERS ON A BACK-END SERVER

30 AUTHENTICATION OPTIONS: POP3 AND IMAP4 VIRTUAL SERVERS ON A FRONT- END SERVER

31 AUTHENTICATION OPTIONS: NNTP VIRTUAL SERVER

32 AUTHENTICATION OPTIONS: SMTP VIRTUAL SERVER

33 AUTHENTICATION OPTIONS: EXCHANGE VIRTUAL SERVER

34 DEMONSTRATION: DISCONNECTING USERS

35 DIAGNOSTIC LOGGING Records authentication, connection, and client action events Set the level of logging on the host server Set the logging level and category for a specific service Events logged in server application log

36 SETTING A DIAGNOSTIC LEVEL

37 VIEWING A DIAGNOSTIC LOGGING ENTRY

38 SUMMARY Exchange virtual server in a clustered environment Protocol virtual servers: SMTP, NNTP, POP3, IMAP4, HTTP Front-end and back-end configuration Authentication Encryption