For client computers to gain access to Microsoft Exchange Server computers 
remotely over the Internet, the clients and servers must be able to 
communicate using RPC. If you are not using an Internet firewall, RPC 
communication is enabled by default.

  If you are using a firewall to increase your system's security, you might 
have to configure thefirewall to allow RPC communication. Some Internet 
firewalls do not accept TCP/IP port  numbers that Exchange uses for RPC 
communication. To solve this problem, add port 135 to your firewall and 
configure Exchange to use the same ports as your firewall.

To configure Exchange, set two unique port numbers, one for the information 
store and one  for the directory. The registry value TCP/IP Port controls 
this setting. This DWORD value is a16-bit number. This value is set for the 
port that the firewall will accept.

For the directory, you can modify the port numbers in the following 
registry location:

  HKEY_LOCAL_MACHINE \SYSTEM \CurrentControlSet \Services 
\MSExchangeDS\Parameters \TCP/IP Port

For the information store, modify the port number in the following registry 
location:

HKEY_LOCAL_MACHINE \SYSTEM \CurrentControlSet \Services 
\MSExchangeIS\ParametersSystem \TCP/IP Port

If you are using a packet filter, you must configure it to allow TCP 
connections to theinformation store and directory ports in addition to port 
135 (for the RPC End-Point Mapper  service) on the Exchange Server computer.

To add TCP/IP port numbers

1.In the Windows NT registry, select the following 
key:   HKEY_LOCAL_MACHINE \SYSTEM \CurrentControlSet \Services 
\MSExchangeIS\ParametersSystem
2.From the Edit menu, choose New, and then choose DWORD value.
3.In the Name box type TCP/IP Port, and then click Enter.
4.Double-click TCP/IP Port. In the Value data box, type the number of the 
port that the firewall will accept. Set the base to a decimal when entering 
the value.

Based on the assumption the firewall relays SMTP, you have separate 
internal and external DNS

On the External DNS, you would have the following records:
domainx.com IN MX 10 firewall.domainx.com
firewall.domainx.com IN A 1.1.1.1

On the Internal DNS, you would have the following records:

firewall.domainx.com IN A 10.1.1.1
exchange.domainx.com IN A 10.1.1.2


The SMTP server on the firewall should be configured to send all mail for 
domainx.com to exchange.domainx.com.

The Exchange server should be configured to accept domainx.com as <inbound>.


At 12:52 PM 7/13/00 -0700, [EMAIL PROTECTED] wrote:

>One obvious thing I forgot to mention.  Static NAT does not distingish 
>between ports or protocols.  To prevent attacks against other 
>ports/services on the Exchange box it would be best to filter the traffic 
>and only permit SMTP to pass.
>
>-- Bill Stackpole, CISSP
>
>
>[EMAIL PROTECTED]
>Sent by: [EMAIL PROTECTED]
>
>07/13/00 10:28 AM
>
>      To:      <[EMAIL PROTECTED]>
>      cc:       [EMAIL PROTECTED], [EMAIL PROTECTED]
>      Subject:       Re: static nat
>
>
>To date, there aren't any known vulnerabilities to the Exchange-SMTP 
>gateway.  That does not however, mitigate the other obvious problems with 
>mail based attacked including using Exchange as a spam relay, active 
>content attacks (ala ILOVEYOU), HTTP formatted mail attacks, virus 
>infected attachments, flooding the server, DoS attacks, etc.  Keep the big 
>picture.
>
>Bill Stackpole, CISSP
>
>
>"Yaniv Fine" <[EMAIL PROTECTED]>
>Sent by: [EMAIL PROTECTED]
>
>07/13/00 08:48 AM
>Please respond to yanivf
>       To:      "Firewalls LIST \(E-mail\)" <[EMAIL PROTECTED]>
>       cc:
>       Subject:       static nat
>
>
>Hi all
>
>We are using check point FW-1 and thinking of installing Exchange server
>with Static Nat
>What are the risks  we are taking in  this scenario   .
>Should I thinks on a tighter security strategy but more expensive
>Any pointers are welcome
>
>
>~~~~~~~~~~~~~~~~~~~
>Yaniv Fine
>MIS Manager
>Know-Net Group
>~~~~~~~~~~~~~~~~~~~
>
>
>-
>[To unsubscribe, send mail to [EMAIL PROTECTED] with
>"unsubscribe firewalls" in the body of the message.]
>
>

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to