Book now with code EOY2025
Claymoore wrote: » It does. If you only have one server, it will host the Client Access Server, Hub Transport and Mailbox server roles. I don't know how large your company is, but you might consider splitting up those roles to additional servers to provide some high availability and redundancy options. But that's another project for another day.
subl1m1nal wrote: » It's not too bad. It'd be simpler if you had an SBS server. You could knock all of this out in an afternoon.
knwminus wrote: » So I've been calling around and it seems that godaddy is the best value as far as this is concerned. What I didn't understand was why they were asking how many names I require. I thought I needed four (owa.public.com autodiscovery.public.com, owa.private.com, autodiscovery.private.com). Are there other names I need?
Claymoore wrote: » You will need to include the netbios name as well as the FQDN of each server (or service). Since you only have the one server, the names should be something like: owa.public.com owa.private.com owa autodiscover.public.com autodiscover.private.com autodiscover server.private.com server
knwminus wrote: » Here is the issue I am having. I called Digicert (since I have been approved for the cert) and they said I would only need owa.public, owa.private, autodiscover.public and server.private. Is that not the case? This would cause a major price difference of the cert (328 vs XXX).
Claymoore wrote: » Ouch. I had a client whose internal domain extension was actually a top-level country domain. Unfortunately, they didn't own the domain and couldn't buy it because they weren't located in that country. They had to use a combination of SSL offloading and an internal CA to solve the issue. They had an internal CA that they could use for their internal servers and they had to use an SSL offload device as a reverse proxy to handle their official external domain name. If you connected to an internal server you got the certificate issued by the internal CA that used the internal domain extension. If you connected externally, the edge device (a Linux server in this case, but ISA or ForeFront server will do the same thing) had a real third-party cert and would handle the SSL connection between the external client and the internal server.
Claymoore wrote: » I think the only way around this is to offload the external SSL and use an internal CA for the internal server requests. You might be able to set the Android devices to ignore certificate errors, but the external OWA connections will throw errors.
Use code EOY2025 to receive $250 off your 2025 certification boot camp!