Greetings,
We are trying to get OWA 2003 setup in our DMZ so users can access it from outside our network. We used OWA 5.5 for this purpose for many years and it's vital that we continue to have this available for our users. However, our Network Engineering team has become concerned at the number of ports that need to be poked in our firewall so OWA can talk to the back end server and DC/GC's. The documentation that I have found have listed the following ports necessary for communication between the OWA frontend server in the DMZ and the backend server on our internal network:
Port 80 for HTTP
Port 691 for Link State Algorithm routing protocol
Port 389 for LDAP (TCP and UDP)
Port 3268 for Global Catalog Server LDAP (TCP)
Port 88 for Kerberos Authentication (TCP and UDP)
Port 53 for DNS (TCP and UDP)
Port 135 ? RPC endpoint mapper (TCP)
Ports 1024 and higher for RPC services
The "Ports 1024 and higher" is the setting that is causing the most greif. I did find one article that gave a reg hack that would allow you to specify a specific port, but it sounded like you had to lock your DCs/GCs to that same port...which I would assume would cause alot of havoc with other programs/apps internally. Unfortunately, I can't really seem to find any other documentation about it. Has any one had any experience with this? Are all these ports necessary? Can we lock it down to just one without issue? Do we have to reg hack the DCs/GCs as well?
Or...is there a better way? I know that ISA server is out there, but I'm trying to avoid spending money.
Any advice, help, or links would be appreciated!!
ScottJ
We are trying to get OWA 2003 setup in our DMZ so users can access it from outside our network. We used OWA 5.5 for this purpose for many years and it's vital that we continue to have this available for our users. However, our Network Engineering team has become concerned at the number of ports that need to be poked in our firewall so OWA can talk to the back end server and DC/GC's. The documentation that I have found have listed the following ports necessary for communication between the OWA frontend server in the DMZ and the backend server on our internal network:
Port 80 for HTTP
Port 691 for Link State Algorithm routing protocol
Port 389 for LDAP (TCP and UDP)
Port 3268 for Global Catalog Server LDAP (TCP)
Port 88 for Kerberos Authentication (TCP and UDP)
Port 53 for DNS (TCP and UDP)
Port 135 ? RPC endpoint mapper (TCP)
Ports 1024 and higher for RPC services
The "Ports 1024 and higher" is the setting that is causing the most greif. I did find one article that gave a reg hack that would allow you to specify a specific port, but it sounded like you had to lock your DCs/GCs to that same port...which I would assume would cause alot of havoc with other programs/apps internally. Unfortunately, I can't really seem to find any other documentation about it. Has any one had any experience with this? Are all these ports necessary? Can we lock it down to just one without issue? Do we have to reg hack the DCs/GCs as well?
Or...is there a better way? I know that ISA server is out there, but I'm trying to avoid spending money.
ScottJ