Using microsoft exchange 2000 front-end servers
®
KC Lemson Michele Martin
Using Microsoft Exchange 2000 Front-End Servers
®
KC Lemson Michele Martin
Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-mailaddresses, logos, people, places and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may bereproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in thisdocument. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. 2002 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows NT, Active Directory, and Outlook are either registered trademarks or trademarks of MicrosoftCorporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners.
Published: June 2000 Updated: October 2002 Applies To: Exchange 2000 Server SP3
Editors: Janet Lowen, Brendon Bennett Technical Reviewers: KC Lemson, Allen Atwood, Bryan Atwood, Karim Batthish, Ron Mondri, Andrew Moss,Brendan Power Artist: Kristie Smith Production: Stephanie Schroeder
Table of Contents
Introduction
Assumed Knowledge ................................................................................................. 1 Overview of Front-End and Back-End Topologies .................................................... 2 Advantages of a Front-End and Back-End Topology................................................ 3
Chapter 1 How Front-End and Back-End Topology Works............................... 5
Integration with Internet Information Services (IIS)................................................. 6 Dependency on DSAccess......................................................................................... 6 DSAccess in Perimeter Networks...................................................................... 6 System Attendant on Front-End Servers .................................................................. 7 Supporting POP and IMAP Clients............................................................................. 8 Authentication for POP and IMAP Clients.......................................................... 9 IMAP Access to Public Folders........................................................................... 9 Running SMTP for POP and IMAP Clients...............................................................10 Supporting HTTP (Outlook Web Access and Web Folders)....................................10 Finding User Mailboxes ....................................................................................11 Logging on toOutlook Web Access..................................................................12 Allowing Use of Outlook Web Access to Internal Clients Only ........................13 Simplifying the Outlook Web Access URL........................................................13 Enabling the “Change Password” Feature ......................................................14 Finding Public Folders...
Regístrate para leer el documento completo.