, 2001 3:16 PM
To: Exchange Discussions
Subject: RE: Firewall and Exchange Ports.
You cannot make that static. That range that you listed is for the UDP Push
Notification from the Exchange server to the client. It is a randomly
selected (by the client) UDP port above 1024. The Exchange server
: RE: Firewall and Exchange Ports.
Maybe I didn't understand the post. I believe you can especially if your
behind a firewall. Refer to Q148732.
XADM: Setting TCP/IP Port Numbers for Internet Firewalls [Q148732]
-Original Message-
From: Stephen Mynhier [mailto:[EMAIL PROTECTED]]
Sent
measure, you can't manage!
-Original Message-
From: Pfefferkorn, Pete (PFEFFEPE) [mailto:[EMAIL PROTECTED]]
Sent: Friday, October 19, 2001 9:11 AM
To: Exchange Discussions
Subject: RE: Firewall and Exchange Ports.
Well I believe I'm finally starting to understand. Even if
we
!
-Original Message-
From: Chris Scharff [mailto:[EMAIL PROTECTED]]
Sent: Friday, October 19, 2001 10:02 AM
To: Exchange Discussions
Subject: RE: Firewall and Exchange Ports.
And even after opening those ports it's entirely possible you'd experience a
greater number of dropped UDP new mail
:[EMAIL PROTECTED]]
Sent: Wednesday, October 17, 2001 8:47 PM
To: Exchange Discussions
Subject: RE: Firewall and Exchange Ports.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-Original Message-
From: Ed Crowley [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, October 16, 2001 9:55 PM
Don't
:[EMAIL PROTECTED]]
Sent: Wednesday, October 17, 2001 5:47 PM
To: Exchange Discussions
Subject: RE: Firewall and Exchange Ports.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-Original Message-
From: Ed Crowley [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, October 16, 2001 9:55 PM
Don't
[mailto:[EMAIL PROTECTED]]
Sent: Thursday, October 18, 2001 9:16 AM
To: Exchange Discussions
Subject: RE: Firewall and Exchange Ports.
No security consultant I know is going to open holes in the
network from the DMZ to the Internal network. Being
proficient in both Exchange and Security
I think the real point here is that if you are concerned about the hole that
you will be opening from your DMZ-LAN with OWA, or you are concerned with
the hole you're opening by placing OWA on your LAN and openeing SSL through
to it then you should really be using a VPN and neither of the OWA
Message-
From: Chris Scharff [mailto:[EMAIL PROTECTED]]
Sent: Thursday, October 18, 2001 7:23 AM
To: Exchange Discussions
Subject: RE: Firewall and Exchange Ports.
Hmm... I don't know. I think there are instances where a box in the DMZ
communicating with the internal network makes sense. I
How do you rate using IPSec between FE and BE?
Neil
-Original Message-
From: Don Ely [mailto:[EMAIL PROTECTED]]
Posted At: 18 October 2001 15:30
Posted To: Exchange Mailing List
Conversation: Firewall and Exchange Ports.
Subject: RE: Firewall and Exchange Ports.
I will somewhat agree
I believe that would be a valid solution. At least that is an encrypted
communication path.
-Original Message-
From: Neil Hobson [mailto:[EMAIL PROTECTED]]
Sent: Thursday, October 18, 2001 7:32 AM
To: Exchange Discussions
Subject: RE: Firewall and Exchange Ports.
How do you rate
[snip for brevity]
Scenario A has following disadvantages:
If your web server gets compromised, the hacker is in your internal
network. You have no means of further restricting access (besides
shutting the server down). Intrusion Detection is almost impossible
on the SSL session (unless you
Getronics (Israel)
Tel: +972-3-5127306
Mobile: +972-53-570139
Email: [EMAIL PROTECTED]
-Original Message-
From: Chetwood, Rachel [mailto:[EMAIL PROTECTED]]
Sent: Monday, October 15, 2001 3:10 PM
To: Exchange Discussions
Subject: RE: Firewall and Exchange Ports.
I believe it can
You can implement session authentication in FW1. Better than nothing.
Users have to enter 3-4 passwords but eventually they are more or less
safely in.
Amit Zinman
MCSE,
Project Manager
Professional Services Group
Getronics (Israel)
Tel: +972-3-5127306
Mobile: +972-53-570139
Email: [EMAIL
PROTECTED]]
Sent: Thursday, October 18, 2001 4:32 PM
To: Exchange Discussions
Subject: RE: Firewall and Exchange Ports.
How do you rate using IPSec between FE and BE?
Neil
-Original Message-
From: Don Ely [mailto:[EMAIL PROTECTED]]
Posted At: 18 October 2001 15:30
Posted To: Exchange
]]
Sent: Thursday, October 18, 2001 10:16 AM
To: Exchange Discussions
Subject: RE: Firewall and Exchange Ports.
No security consultant I know is going to open holes in the network from the
DMZ to the Internal network. Being proficient in both Exchange and
Security, I feel sorry for your clients
PROTECTED]]
Sent: Thursday, October 18, 2001 10:16 AM
To: Exchange Discussions
Subject: RE: Firewall and Exchange Ports.
No security consultant I know is going to open holes in the network from the
DMZ to the Internal network. Being proficient in both Exchange and
Security, I feel sorry for your
times to get the answer.
-Original Message-
From: Don Ely [mailto:[EMAIL PROTECTED]]
Sent: Thursday, October 18, 2001 12:56 PM
To: Exchange Discussions
Subject: RE: Firewall and Exchange Ports.
You could have searched the MSKB and figured that out. There's plenty of
documentation out
Hmmm... I'll see if I can find the Q article. I've known the range for a
few years now.
-Original Message-
From: Pfefferkorn, Pete (PFEFFEPE) [mailto:[EMAIL PROTECTED]]
Sent: Thursday, October 18, 2001 11:46 AM
To: Exchange Discussions
Subject: RE: Firewall and Exchange Ports
Exchange listens on for RPC
traffic, you can not specify what RPC ports the OWA application uses for RPC
communications.
Paul
-Original Message-
From: Don Ely [mailto:[EMAIL PROTECTED]]
Sent: Thursday, October 18, 2001 2:46 PM
To: Exchange Discussions
Subject: RE: Firewall and Exchange Ports
That helps.
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
Sent: Thursday, October 18, 2001 3:03 PM
To: Exchange Discussions
Subject: RE: Firewall and Exchange Ports.
Mebbe these?
from http://support.microsoft.com/support/kb/articles/Q280/1/32.ASP
XCCC
.
Stephen
-Original Message-
From: Pfefferkorn, Pete (PFEFFEPE) [mailto:[EMAIL PROTECTED]]
Sent: Thursday, October 18, 2001 1:46 PM
To: Exchange Discussions
Subject: RE: Firewall and Exchange Ports.
Went through TechNet and couldn't find any reference to the actual range.
Found the articles
PM
To: Exchange Discussions
Subject: RE: Firewall and Exchange Ports.
You cannot make that static. That range that you listed is for the UDP Push
Notification from the Exchange server to the client. It is a randomly
selected (by the client) UDP port above 1024. The Exchange server uses
Conversation: Firewall and Exchange Ports.
Subject: RE: Firewall and Exchange Ports.
Went through TechNet and couldn't find any reference to the
actual range.
Found the articles on how to make it static, but no range.
Also posted that
question on the list asking about the range and I don't
:[EMAIL PROTECTED]]
Sent: Thursday, October 18, 2001 12:16 PM
To: Exchange Discussions
Subject: RE: Firewall and Exchange Ports.
You cannot make that static. That range that you listed is
for the UDP Push
Notification from the Exchange server to the client. It is a randomly
selected
25 matches
Mail list logo