Top Banner
Exchange Server 2010 Edge Server and Microsoft Threat Management Gateway Introduction When you have an Exchange Server 2010 environment you can use the Edge Transport Server, typically located in the Demilitarized Zone (DMZ) or perimeter network for hygiene purposes. By default the Edge Transport Server has the anti-spam functionality enabled, and when Forefront Protection for Exchange is installed the Edge Transport Server also performs the anti-virus functionality. Email from the Internet is received by the Edge Transport Servers, spam messages and messages containing viruses are cleaned up and the results are sent to the Hub Transport Server, located in the internal network and domain. The Client Access Server give E-mail clients access to their mailbox and the Client Access Server is located on the internal network. Locating the Client Access Server is not supported. For more information regarding the CAS server and the DMZ visit the Exchange Team Site . You can use a Microsoft ISA Server 2006 in the DMZ, and the ISA Server ‘publishes’ the Exchange Services like OWA, Outlook Anywhere or ActiveSync. It is not possible to combine the ISA Server and the Edge Transport Server on one server, let alone combine them with the Forefront Protection for Exchange. Threat Management Gateway (TMG) The Forefront Threat Management Gateway (TMG) 2010 is the successor of ISA Server 2006 and TMG contains a lot of new features that are interesting for Exchange administrators. One of the things is that you can install the Edge Server, TMG and Forefront Protection for Exchange on one (physical) server.
25
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Exchange Server 2010 Edge Server and Microsoft Threat Management Gateway

Exchange Server 2010 Edge Server and Microsoft Threat Management Gateway

Introduction

When you have an Exchange Server 2010 environment you can use the Edge Transport Server, typically located in the Demilitarized Zone (DMZ) or perimeter network for hygiene purposes. By default the Edge Transport Server has the anti-spam functionality enabled, and when Forefront Protection for Exchange is installed the Edge Transport Server also performs the anti-virus functionality.

Email from the Internet is received by the Edge Transport Servers, spam messages and messages containing viruses are cleaned up and the results are sent to the Hub Transport Server, located in the internal network and domain.

The Client Access Server give E-mail clients access to their mailbox and the Client Access Server is located on the internal network. Locating the Client Access Server is not supported. For more information regarding the CAS server and the DMZ visit the Exchange Team Site.

You can use a Microsoft ISA Server 2006 in the DMZ, and the ISA Server ‘publishes’ the Exchange Services like OWA, Outlook Anywhere or ActiveSync. It is not possible to combine the ISA Server and the Edge Transport Server on one server, let alone combine them with the Forefront Protection for Exchange.

Threat Management Gateway (TMG)

The Forefront Threat Management Gateway (TMG) 2010 is the successor of ISA Server 2006 and TMG contains a lot of new features that are interesting for Exchange administrators. One of the things is that you can install the Edge Server, TMG and Forefront Protection for Exchange on one (physical) server.

Page 2: Exchange Server 2010 Edge Server and Microsoft Threat Management Gateway

Edge to be on DMZ

Figure 1: The Edge Server, TMG and Forefront Protection for Exchange on one Server

The advantage of this solution is of course that you will need only one server. This will save you an additional Windows license, but do not forget the cost of the server itself, the power and cooling that are needed.

To install this combination of Edge Server, Forefront Protection for Exchange and Threat Management Gateway, follow this order:

1. Install Windows Server 2008 R2 2. Install Active Directory Lightweight Directory Services (LDS) 3. Install Exchange 2010 Edge Transport Server 4. Install Forefront Protection for Exchange 5. Install Forefront Threat Management Gateway

Windows Server 2008 R2

The first step is to install Windows Server 2008 R2. This is an X64 server which of course is needed for Exchange Server 2010. But the TMG is also an X64 application, where the old ISA server was a 32-bit application.

Install Windows Server 2008 R2, make sure that the server is connected to both the internal as well as the external network. After installation configure the network, the internal and the external name resolution have to be correct. Bring the server up to date with the latest hot fixes.

Install Active Directory Lightweight Directory Services

Page 3: Exchange Server 2010 Edge Server and Microsoft Threat Management Gateway

After installing Windows Server 2008 R2 the Active Directory Lightweight Directory Services (LDS) need to be installed. Logon to the server and open the Server Manager. Select Roles in the Navigation Pane and in the Results Pane select “Add Roles”. In the “Select Roles” wizard select the Active Directory Lightweight Directory Services.  Add the required features (.NET Framework 3.5.1) as well. Finish the wizard and install the LDS.

Install Edge Transport Server

To install the prerequisite software for the Exchange Server 2010 Edge Transport Server open a command prompt and navigate to the \Scripts directory on the installation media. Enter the following command:

ServerManagerCmd.exe –InputPath Exchange-Edge.XML

An error message pops up saying that the ServerManagerCmd is deprecated. Although true, do not pay too much attention to the error message at this point. When the prerequisite software is installed reboot the server as requested.

Install the Edge Transport Server; this can be done using the graphical User Interface or the unattended setup program. The Management Tools will be automatically installed.

After the installation of the Edge Server it is time to configure the EdgeSync Service. The EdgeSync Service is responsible for synchronizing information from the Hub Transport Server to the Edge Transport Server. To configure an Edge Synchronization logon to the Edge Transport Server, open an Exchange Management Shell and enter the following command:

New-EdgeSubscription –FileName C:\Edge-TMG.XML

Copy the Edge-TMG.XML file to the internal Hub Transport Server and import it there. After importing the Edge Synchronization can be started. To achieve this logon to the Hub Transport Server, open an Exchange Management Shell and enter the following commands:

$Temp = Get-Content -Path "C:\Edge-TMG.xml" -Encoding Byte -ReadCount 0

New-EdgeSubscription -FileData $Temp -Site "Default-First-Site"

Start-EdgeSynchronization

Make sure that after the Start-EdgeSynchronization command the results are successful. This is shown on the console:

Page 4: Exchange Server 2010 Edge Server and Microsoft Threat Management Gateway

Figure 2: The Edge Synchronization is successfully started.

When you have successfully setup the Edge Synchronization it is a good time to test the SMTP functionality and see if you can send and receive messages from your Exchange Server 2010 mailbox to and from the Internet. If successful continue with the next steps.

Install Forefront Protection for Exchange (FPE)

When you start the graphical setup of Exchange Server 2010 you are presented with a splash screen. The last option, under Enhance, is “Install Microsoft Forefront Protection 2010 for Exchange Server”.

Page 5: Exchange Server 2010 Edge Server and Microsoft Threat Management Gateway

Figure 3: The setup application splash screen

When you select this option you are redirected to the Microsoft website where you can download FPE. After downloading start the ForefrontExchangeSetup.exe application. Follow the setup wizard to install Forefront Protection for Exchange. In the Anti spam Configuration page select “Enable anti-spam” later.

After installation, do not check the “Launch the Forefront Online Protection for Exchange Gateway installation program”. Click Finish to end the installation program.

When you start the Forefront Administrator Console an Evaluation License Notice is shown. You can Activate Forefront immediately, but there’s a 120 day trial period.

In the Administrator Console you will see that the scanning engines are not updated immediately.

Page 6: Exchange Server 2010 Edge Server and Microsoft Threat Management Gateway

Figure 4: The Engines are not updated immediately

After some time (15 minutes in my test environment) you will notice that the engines are updated and the yellow exclamation mark will change into the green checkmark.

Install Forefront Threat Management Gatewayadvert isement

Page 7: Exchange Server 2010 Edge Server and Microsoft Threat Management Gateway

The last and most interesting step is to install the Threat Management Gateway (TMG) into the recently installed Edge Transport Server. Navigate to the installation media and start the setup application. A splash screen is shown:

Figure 5: The TMG (standard edition) splash screen

Select “Run Preparation Tool” in the splash screen to install the TMG prerequisite software. Follow the Forefront TMG Preparation Tool wizard. Select the “Forefront TMG Services and Management” option to install both the software and the management tools.

Page 8: Exchange Server 2010 Edge Server and Microsoft Threat Management Gateway

Figure 6: Select "Forefront TMG services and Management" to install the software and the management tools

The prerequisite software will be automatically installed and when finished you have the option to start the Forefront TMG Installation wizard automatically.

Page 9: Exchange Server 2010 Edge Server and Microsoft Threat Management Gateway

Figure 7: Start the Forefront TMG installation wizard

Click Finish and the installation wizard will be started automatically. Follow the wizard, accept the license agreement and enter your user name, company name and serial number. Continue the wizard until you get to the internal network option. In my test environment I have two networks. A public network that’s connected to the Internet and a private, internal network. The Exchange Servers are connected to this network.

Page 10: Exchange Server 2010 Edge Server and Microsoft Threat Management Gateway

Figure 8: Select the internal (private) network

Click Next to continue the setup wizard and install TMG on the server. The installation can take some time.

Figure 9: Approx. 19 minutes to install TMG on our Edge Server

When the setup program is finished, click Finish. If you want you can check the “Launch Forefront TMG Management when the wizard closes” and the management console will be started automatically.

Page 11: Exchange Server 2010 Edge Server and Microsoft Threat Management Gateway

Figure 10

The TMG Server is now installed on top of the Edge Transport Server. Although the internal Hub Transport Server was working with the Edge Transport Server it now stopped working. This is because the TMG Server is a firewall as well and need to be configured to get all functionality.

In the next article I will explain the various settings of the Edge Server, Forefront Protection for Exchange and Threat Management Gateway combination.

/////////////////////////////////////////////////////////////////////////////////////////////////

How to Install Exchange 2007 Edge Transport Server on Windows Server 2008

Exchange Server 2007 includes five roles – Mailbox, Client Access, Hub Transport, Unified Messaging and Edge Transport Server Role.In this Step-by-Step Screencast, we will demonstrate the installation and configuration of the Edge Transport Server Role. The primary responsibility of the Edge Server is to function as an SMTP gateway and protect your messaging system from viruses and spam.

It is important to point out that:- The Edge server checks only SMTP traffic – all inbound and outbound e-mails for your organization should be flowing through it.

Page 12: Exchange Server 2010 Edge Server and Microsoft Threat Management Gateway

- You cannot use the Edge server for OWA (Outlook Web Access), Outlook Anywhere, POP3, IMAP access.- You cannot install any other Exchange Role on and Edge Transport Server – as you can see in the video, once you check the Edge server role box, all other roles are grayed out.- The Edge server should be installed in DMZ as a workgroup machine – it is not a member of your internal Active Directory domain.- The MX record for your domain(s) should be pointing to Edge Server’s public IP – all inbound traffic should be flowing through it.- The Edge server uses AD LDS (Active Directory Lightweight Directory Services) when installed on Windows Server 2008, or ADAM (Active Directory Application Mode) – when installed on Windows Server 2003.

In the following Step-by-Step video tutorial, you will see the installation and initial synchronization of Edge Transport server on Windows 2008 OS, in a DMZ.

Stay tuned on NetoMeter – subscribe to NetoMeter RSS .

3

Page 13: Exchange Server 2010 Edge Server and Microsoft Threat Management Gateway

http://www.techrepublic.com/article/configure-it-design-the-best-security-topology-for-your-firewall/1039779

4) http://docs.oracle.com/cd/B14099_19/core.1012/b13999/rectop.htm

5)

http://searchsecurity.techtarget.com/tip/Choosing-the-right-firewall-topology-Bastion-host-screened-subnet-or-dual-firewalls

6) http://araihan.wordpress.com/2010/05/28/exchange-2010-deployment-in-different-firewall-scenario/

Microsoft Exchange 2010 is the latest release of Microsoft messaging technology family. Microsoft Exchange Server 2010 brings a new and improved technologies, features, and services to the messaging technology product line. Exchange 2010 is role based deployment as Exchange Hub Transport, Exchange Client Access Server, Exchange Unified Messaging, Exchange Edge Transport and Exchange Mailbox. Each of these roles are significant when you planning to upgrade or new deployment. Careful selection and placement of servers in different part of corporate infrastructure is highly crucial. You have plan ahead to deploy exchange farms. Exchange 2010 brings HA, new transport and routing, Exchange Anywhere, protection and greater compliance with corporate networks. Exchange can be deployed under so many firewall and security topology. It is highly important that you consider great deal of time to design and deploy firewall and security for Exchange. In this article, I am going to describe several firewall scenario of exchange deployment. I reckon, you might be bombarded with spam without this a wonder device i.e. Cisco IronPort. So I put greater emphasis on Cisco IronPort C series and M series firewall and Anti-spam devices on each of my diagram. Cisco IronPort is a proven technology to manage and counter act against Anti-spam, content filter and Antivirus.

Edge Firewall: This scenario allows users to access OWA from extranet to intranet. However, OWA is placed in internet network. The communication from the extranet is encrypted and the communication in the intranet is not encrypted. The firewall technology used is based on Microsoft ISA Server 2006 or Forefront TMG 2010 and the Microsoft Exchange OWA, Anywhere are published to the extranet by using the web site publishing feature of Microsoft ISA Server 2006 or TMG. The authentication of the extranet users used is Windows Authentication. This type of deployment uses two NICs of TMG server. One designated to external and another one designated for internal. A small business can deploy this type of firewall for exchange. This is not a recommended deployment big organisation.

Page 14: Exchange Server 2010 Edge Server and Microsoft Threat Management Gateway

Back to Back Firewall: This configuration requires two ISA Server 2006 or Forefront TMG 2010 installations on two separate servers with two distinct network adapters each that are configured to communicate with the Internet, the Perimeter network and the Internal network. When configuring ISA Server 2006 or TMG , the range of IP addresses used by the Internet, perimeter and internal networks have to be specified as well as the Firewall Policy rules that govern the communication rules between each network. This is done in two steps that target the front firewall and then the back firewall.

Page 15: Exchange Server 2010 Edge Server and Microsoft Threat Management Gateway

Important! A front-end server is a specially configured server running either Exchange Server2003 or Exchange 2000 Server software. A back-end server is a server with a standard configuration. There is no configuration option to designate a server as a back-end server. The term "back-end server" refers to all servers in an organization that are not front-end servers after a front-end server is introduced into the organization.

3-Leg Perimeter or DMZ firewall: This configuration requires ISA Server 2006 or Forefront TMG 2010 installation on a server(s) with three distinct network adapters that are configured to communicate with the Internet, the Perimeter network and the Internal network. When configuring ISA Server 2006 or TMG , the range of IP addresses used by the Internet, perimeter and internal networks have to be specified as well as the Firewall Policy rules that govern the communication rules between each network.

Page 16: Exchange Server 2010 Edge Server and Microsoft Threat Management Gateway

3-Leg Perimeter or DMZ firewall with a Domain Controller in Perimeter: This is similar scenario as mentioned above. However, a DC with GC role placed in DMZ. An external trust created between external DC and internal DC. Specific ports are open in firewall to communicate between two domains. In this deployment, internal domain(s) aren’t exposed to perimeter.  Users can access OWA, ActiveSync and Outlook Anywhere from extranet securely.

Page 17: Exchange Server 2010 Edge Server and Microsoft Threat Management Gateway

Conclusion: DMZ is the recommended topology for the following reasons:

It provides security by isolating intruders from the rest of the network. It provides application protocol filtering. It performs additional verification on requests before it proxies them to the internal network.

Further Help:

lacing a firewall in a corporate network puts you in commanding position to protect your organisation’s interest from intruder. Firewall also helps you to publish contents or share infrastructure or share data securely with eternal entity such as roaming client, business partners and suppliers. Simply, you can share internal contents without compromise security. For example, publishing Exchange Client Access Server, OCS 2007 and SharePoint front-end server in the perimeter.

More elaborately, the front-end and the back-end topology is commonly seen in multi-tier applications where the user interacts with a front-end server (Example: CAS server) and that server interacts with a back-end Server (Example: HT server). In this exchange deployment scenario, users interact with a front-end CAS Web server placed in DMZ or perimeter to get Outlook Web Access for reading and sending email. That Web server must interact with the back-end mail server or HT server, but Internet users do not need to interact directly with the back-End HT server. The front-end and back-end server(s) does all these for you providing maximum security. visit Exchange 2010 deployment in different firewall scenario

In this article, I am going to illustrate Back-to-Back Firewall with DMZ. This topology adds content publishing to the back-to-back perimeter topology. By adding content publishing, sites and content that are developed inside the corporate network can be published to the server farm that is located in the perimeter network.The following illustration shows the back-to-back perimeter topology with content publishing.

Page 18: Exchange Server 2010 Edge Server and Microsoft Threat Management Gateway

Advantages

1. Isolates customer-facing and partner-facing content to a separate perimeter network.2. Content publishing can be automated.3. If content in the perimeter network is compromised or corrupted as a result of

Internet access, the integrity of the content in the corporate network is retained.

Disadvantages

1. Requires more hardware to maintain two separate farms.2. Data overhead is greater. Content is maintained and coordinated in two different

farms and networks.3. Changes to content in the perimeter network are not reflected in the corporate

network. Consequently, content publishing to the perimeter domain is not a workable choice for extranet sites that are collaborative.

Assumptions: 

1. Internal IP range: 10.10.10.0/242. Perimeter IP Range: 192.168.100.0/243. Public IP:203.17.x.x/24

Dell Exchange Web Advisor

HP Sizer for Microsoft Exchange Server 2010

Page 19: Exchange Server 2010 Edge Server and Microsoft Threat Management Gateway

Forefront TMG 2010: How to install and configure Forefront TMG 2010 —-Step by step

////

6)

Exchange Server 2007 includes five roles – Mailbox, Client Access, Hub Transport, Unified Messaging and Edge Transport Server Role.In this Step-by-Step Screencast, we will demonstrate the installation and configuration of the Edge Transport Server Role. The primary responsibility of the Edge Server is to function as an SMTP gateway and protect your messaging system from viruses and spam.

It is important to point out that:- The Edge server checks only SMTP traffic – all inbound and outbound e-mails for your organization should be flowing through it.- You cannot use the Edge server for OWA (Outlook Web Access), Outlook Anywhere, POP3, IMAP access.- You cannot install any other Exchange Role on and Edge Transport Server – as you can see in the video, once you check the Edge server role box, all other roles are grayed out.- The Edge server should be installed in DMZ as a workgroup machine – it is not a member of your internal Active Directory domain.- The MX record for your domain(s) should be pointing to Edge Server’s public IP – all inbound traffic should be flowing through it.- The Edge server uses AD LDS (Active Directory Lightweight Directory Services) when installed on Windows Server 2008, or ADAM (Active Directory Application Mode) – when installed on Windows Server 2003.

///http://www.petri.co.il/implement-edge-transport-server.htm

With that in mind, here is the order in which the various filters are applied:

1. The IP block and allow list is processed2. The IP Block List Providers and IP Allow List Providers are processed3. The sender filtering agent checks the blocked senders list4. The Sender ID agent performs a SPF record query5. The Recipient Filtering Agent checks the blocked senders list 6. The Content Filtering Agent checks the message’s contents. Safe list aggregation is also

applied at this point in the process to help to reduce false positives.7. The edge transport server filters out prohibited attachment types8. Finally, the message is either handed off to a hub transport server, rejected, or deleted,

depending on the rules that are in place.

Summary

Page 20: Exchange Server 2010 Edge Server and Microsoft Threat Management Gateway

Unfortunately, there is no way that I can possibly discuss all of the issues associated with configuring an edge transport server within the confines of an article. For that, I would have to write a book. Instead, my goal has been to help you to understand the filtering process, and to help you think about the safest ways of initially enabling edge filtering.

h ttp://www.petri.co.il/introduction_to_exchange_2007_server_roles.htm

////

Exchange Server 2010 Backup and Recovery Training - Course Outline

Lesson 1 - Getting Started with Exchange 2010 Backup and RecoveryLesson 2 - The Course ScenarioLesson 3 - Lab SetupLesson 4 - An Overview of Disaster RecoveryLesson 5 - Storage Architecture and Backup/Recovery BasicsLesson 6 - Windows Server BackupLesson 7 - Item and Mailbox Recovery with Windows Server BackupLesson 8 - Dial Tone Recovery with Windows Server BackupLesson 9 - Data Protection Manager SetupLesson 10 - Working with Data Protection ManagerLesson 11 - Third Party Solutions: CommVault® Simpana®Lesson 12 - Third Party Solutions: Asigra Cloud Backup ™Lesson 13 - Third Party Solutions: Actifio ™Lesson 14 - Replacing Backup/Recovery with High Availability Lesson 15 - Exchange Recovery Best PracticesLesson 16 - Next Steps

///

http://www.petri.co.il/edge-transport-server-security-part-1.htm

///

How to Install Exchange 2007 Edge Transport Server on Windows Server 2008

Exchange Server 2007 includes five roles – Mailbox, Client Access, Hub Transport, Unified Messaging and Edge Transport Server Role.

Page 21: Exchange Server 2010 Edge Server and Microsoft Threat Management Gateway

In this Step-by-Step Screencast, we will demonstrate the installation and configuration of the Edge Transport Server Role. The primary responsibility of the Edge Server is to function as an SMTP gateway and protect your messaging system from viruses and spam.

It is important to point out that:- The Edge server checks only SMTP traffic – all inbound and outbound e-mails for your organization should be flowing through it.- You cannot use the Edge server for OWA (Outlook Web Access), Outlook Anywhere, POP3, IMAP access.- You cannot install any other Exchange Role on and Edge Transport Server – as you can see in the video, once you check the Edge server role box, all other roles are grayed out.- The Edge server should be installed in DMZ as a workgroup machine – it is not a member of your internal Active Directory domain.- The MX record for your domain(s) should be pointing to Edge Server’s public IP – all inbound traffic should be flowing through it.- The Edge server uses AD LDS (Active Directory Lightweight Directory Services) when installed on Windows Server 2008, or ADAM (Active Directory Application Mode) – when installed on Windows Server 2003.

In the following Step-by-Step video tutorial, you will see the installation and initial synchronization of Edge Transport server on Windows 2008 OS, in a DMZ.

Page 22: Exchange Server 2010 Edge Server and Microsoft Threat Management Gateway

http://www.techrepublic.com/article/5-exchange-server-security-tips/6112946