E X C H A N G E  5 . 5: S T U D Y  G U I D E S

FIRE WALLS:

Scenario 1:
Your EXC SRV is using TCP/IP and is configured with LDAP, HTTP, and POP3. A firewall sites between your network and the Internet. Your EXC SRV has its name and IP address entered into a public DNS SRV on the Internet.

Requirement:
1. Management would like users to be able to connect over the Internet to your ECH SRV using MS Outlook and LDAP applications.
2. Policy dictates that passwords be transmitted in a secure manner.

Optional:
1. Allow Web clients that do not support NT Challenge/Response authentication to connect to your EXC SRV.
2. Allow POP3 clients to connect and download their messages from EXC SRV.

Proposals:
1. Assigned port numbers to EXC Directory Service and Information Store. Then allow those ports throught the firewall.
2. Configured LDAP on EXC SRV to allow anonymous access.
3. Configured EXC protocols to use SSL as an authentication method.
4. Allow SSL traffic through firewall.
5. Allow LDAP traffic (port 389) through firewall.
6. Allow RPC traffic (port 135) through firewall.
7. Allow POP3 traffic (port 110) through firewall.

Ans: All Requirement & Optional Results.

Requirement/Optional Proposals
Requirement:

1. Management would like users to be able to connect over the Internet to your ECH SRV using MS Outlook and LDAP applications.



2. Policy dictates that passwords be transmitted in a secure manner.

Optional:

1. Allow Web clients that do not support NT Challenge/Response authentication to connect to your EXC SRV.

2. Allow POP3 clients to connect and download their messages from EXC SRV.



1. Assigned port numbers to EXC Directory Service and Information Store. Then allow those ports throught the firewall.
5. Allow LDAP traffic (port 389) through firewall.
6. Allow RPC traffic (port 135) through firewall.

3. Configured EXC protocols to use SSL as an authentication method.
4. Allow SSL traffic through firewall.


2. Configured LDAP on EXC SRV to allow anonymous access.


7. Allow POP3 traffic (port 110) through firewall.

 

 

 

 

 

 

 

 

 

 

BACK UP:

Scenario:

You are planning a backup strategy for your company. The computer that will be your EXC SRV has two hard drives of equal capacity, with one of the drives significantly faster than the other.

Requirement:
1. To perform a complete backup every night

Optional:
1.To be able to recover the most recent database transactions in the event of hardware failure of the drive, or drives, housing the Exchange database files.
2. To minimize server response time to users.

Proposal#1:
1. Place IS transaction log files and DS transaction log files on faster hard disk, and IS and DS datatbase files on the slower hard disk.

2. Enable circular logging.
3. Perform nightly backup.

ANS: Requirement/1 optional result.

Proposal#2:
1. Place IS transaction log files and DS transaction log files on faster hard disk, and IS and DS datatbase files on the slower hard disk.

2. Disable circular logging.
3. Perform nightly backup.

ANS: Requirement/All optional results.

IS/DS HARD DRIVES
TRANSACTION LOG FILES
DATABASE
FAST
SLOW

Proposal#3:
1. Place IS transaction log files and database files on faster hard disk, and DS database and transaction log files on the slower hard disk.

2. Enable circular logging.
3. Perform nightly backup.

ANS: Requirement/ None of Optional Results.

Requirement = Nightly backup.
Proposal1 = Should disable circular logging, because we want to recover "the most recent database."
Proposal2 = IS and DS Transaction log files should be in faster hard disk. 

 

Updated: 10/04/99
By SiCharlie