Forum Discussion
Josh_41258
Nimbostratus
Dec 02, 2008Exchange 2003 FE & LTM
Our current Exchange 2003 environment has a front end server that does SMTP routing (our external SMTP gateways relay mail to here, and then from the FE they go to the appropriate back-end server). This server also does OWA for outside clients.
We would like to utilize a pair of LTM's for both SMTP routing and OWA. One idea was to -- create two virtual servers, one used for SMTP routing which services TCP/25, and one for OWA which services TCP/443. Our external SMTP gateways would point at the SMTP Virtual IP on the LTM's to relay mail, and external clients from the Internet would hit the OWA Virtual IP.
Has anyone utilized LTM's in this fashion -- to load balance front end SMTP servers for Exchange? I'm looking for any suggestions, guidelines, etc. One option was not to use the F5's for the SMTP services -- but to use MS NLB. I'd rather stick with F5 on this front.
Any tips/suggestions/etc? I have also heard from some that we should use ISA behind the F5's to publish
OWA, but I am not sure this is really necessary and I'm not sure what we would gain from this.
Any tips/suggestions would be MUCH appreciated.
Thanks,
Josh
- Mike_Bird
Nimbostratus
We do something similar to what you want to do. However our config is a bit more complicated but let me see if I can boil it down to something straight forward. - Josh_41258
Nimbostratus
Thanks for the reply.. your post was helpful. Your inbound mailflow seems similar to what we are looking to achieve. The SMTP gateways hand off the mail to the SMTP VIP, which in turn pushes it to the internal Exchange Front Ends. - Mike_Bird
Nimbostratus
ISA really came down to Information Security Policies. Essentially, we do not let any communication stream enter our network through the DMZ unless it has already been authenticated. We use ISA for OWA, ActiveSync and Share Point access. The authentication occurs at the ISA level and then the credentials are passed down. So in the case of OWA, once you authenticate to ISA, it takes you directly into your mail box so long as integrated authentication is turned on. We actually front end ISA with a DMZ LTM. Firepass was actually considered for this function but ISA was (sorry F5) cheaper and met our Information Security groups requirements. - Josh_41258
Nimbostratus
OK, gotcha. So, the ISA servers (which are on a separate LTM) are actually accepting connections from the Internet, pre-authenticating OWA, and then publishing OWA via the VIP attached to another set of LTM's wish is load balancing the Exchange front ends? - Mike_Bird
Nimbostratus
InternetClient -> DMZ LTM (if port 80 redirect to 443) 443 -> ISA -> Internal LTM -> OWA pool over 443 - Josh_41258
Nimbostratus
Yes, makes total sense. Thanks for the explanation. We just need to decide if ISA is worth the effort/trouble for pre-authentication. - Kevin_52586
Nimbostratus
Did you have to turn Auto-Last-Hop on the LTM off to support the ISA servers? - Mike_Bird
Nimbostratus
Nope, or at least we did not. Each LTM only fronts 1 ISA box, we are not doing load balancing.
Recent Discussions
Related Content
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects