您好,欢迎来到年旅网。
搜索
您的当前位置:首页A10-DG-16157-EN

A10-DG-16157-EN

来源:年旅网
A10 Thunder ADC with Microsoft Exchange 2016

Empowering Employees to Communicate and Collaborate with Microsoft Exchange 2016

Deployment Guide | A10 Thunder ADC with Microsoft Exchange 2016

Table of Contents

Overview ....................................................................................................................................................................................3Deployment Prerequisites .....................................................................................................................................................3Accessing Thunder ADC .......................................................................................................................................................4Architecture Overview ............................................................................................................................................................4Validating Exchange 2016 Configuration ...........................................................................................................................5Thunder ADC Configuration Summary .............................................................................................................................12Thunder ADC Exchange Configuration Using AppCentric Templates ........................................................................15AppCentric Templates (ACT) Overview .......................................................................................................................15Configuration Using ACT ...............................................................................................................................................15Wizard – Topology ..........................................................................................................................................................16Wizard – Virtual Server ...................................................................................................................................................16Wizard – HTTPS ..............................................................................................................................................................17Wizard – IMAP4/POP3 ...................................................................................................................................................19Wizard – SMTP ................................................................................................................................................................19Wizard – Review ..............................................................................................................................................................20Exchange Dashboard ......................................................................................................................................................21Additional Security Feature – DDoS Mitigation (Optional) ..........................................................................................22DDoS Mitigation ...............................................................................................................................................................22Summary.................................................................................................................................................................................23Appendix A – Thunder ADC Test Configuration .............................................................................................................24Appendix B – AppCentric Templates Upgrade ...............................................................................................................30About A10 Networks ...........................................................................................................................................................31

Disclaimer

This document does not create any express or implied warranty about A10 Networks or about its products or services, including but not limited to fitness for a particular use and noninfringement. A10 Networks has made reasonable efforts to verify that the information contained herein is accurate, but A10 Networks assumes no responsibility for its use. All information is provided “as-is.” The product

specifications and features described in this publication are based on the latest information available; however, specifications are subject to change without notice, and certain features may not be available upon initial product release. Contact A10 Networks for current information regarding its products or services. A10 Networks’ products and services are subject to A10 Networks’ standard terms and conditions.

2

Deployment Guide | A10 Thunder ADC with Microsoft Exchange 2016

Overview

Microsoft® Exchange® is the leading global unified communication solution for the enterprise. With the release of Microsoft Exchange 2016, it is far less complex than its previous versions. With Exchange 2016, Microsoft reduced the number of server roles to two: the Mailbox and Edge Transport server roles. The Mailbox server in Exchange 2016 includes all of the server components from the Exchange 2013 Mailbox and Client Access server roles*:

• Client Access services provide authentication, limited redirection and proxy services. Client Access services don’t do any data rendering and offer all the usual client access protocols: HTTP, POP, IMAP and SMTP.• Mailbox services include all traditional server components found in the Exchange 2013 Mailbox server role: the backend client access protocols, Transport service, Mailbox databases, and Unified Messaging. The Mailbox server handles all activity for the active mailboxes on that server.The Edge Transport role is typically deployed in the perimeter network, outside the internal Active Directory forest, and is designed to minimize the attack surface of your Exchange deployment. By handling all

Internet-facing mail flows, it also adds additional layers of message protection and security against viruses and spam, and can apply mail flow rules (also known as transport rules) to control message flow.For more information about the Exchange 2016 architecture, see:https://technet.microsoft.com/en-us/library/jj150491(v=exchg.160).aspxA10 Networks Thunder® ADC (Application Delivery Controller) provides intelligent load balancing, security, acceleration and optimization for Microsoft Exchange 2016.

Adding Thunder ADC to your Microsoft Exchange Server deployments provides the following benefits:• High Scalability – Thunder ADC allows enterprises to scale their Exchange services for a very large number of employees by load balancing traffic among multiple Exchange Servers. • High Availability – Exchange services are guaranteed even if an Exchange Server goes offline.• High Performance – Thunder ADC can improve Exchange Server performance by terminating SSL connections in its hardware.• Better Security – Thunder ADC can mitigate Distributed Denial of Service (DDoS) attacks. In addition, it can provide an authentication proxy service and provide pre-authentication.• Simplified Deployment – A10 Networks AppCentric Templates allow enterprises to configure and deploy one single public virtual IP (VIP) address to be used for all Exchange services effortlessly. They also provide visibility into Exchange services and login activities. The purpose of this guide is to provide a step-by-step process for deploying A10 Thunder ADC as a load balancer in a Microsoft Exchange 2016 server deployment using AppCentric Templates (ACT). Refer to Appendix A for the equivalent CLI-based configuration.

For additional Microsoft deployment guides such as Skype for Business Server 2015, Lync, SharePoint and IIS, please refer to https://www.a10networks.com/resources/deployment-guides.

Deployment Prerequisites

This Microsoft Exchange 2016 deployment with Thunder ADC has the following prerequisites (based on tested configuration, Appendix A):

• A10 Thunder ADC must be running A10 Networks Advanced Core Operating System (ACOS®) version 4.1.1-P1 or higher.• The AppCentric Templates (ACT) version is: act-0706-17 (see Appendix B for details).• Microsoft Exchange 2016 has been tested with A10 physical and virtual appliances.• Thunder ADC can be deployed in routed mode, one-arm mode and transparent mode.• Both IPv4 and IPv6 are supported. The examples in this deployment guide use IPv4.

*https://technet.microsoft.com/EN-US/library/jj1500(v=exchg.160).aspx3

Deployment Guide | A10 Thunder ADC with Microsoft Exchange 2016

For technical requirements to deploy Exchange 2016 servers, see Exchange 2016 system requirements:https://technet.microsoft.com/en-us/library/aa996719(v=exchg.160).aspxAccessing Thunder ADC

This section describes how to access Thunder ADC from a Command Line Interface (CLI) or Graphical User Interface (GUI):

• CLI – The CLI is a text-based interface in which you type commands on a command line. You can access the CLI directly through the serial console or over the network using either of the following protocols: - Secure protocol – Secure Shell (SSH) version 2 - Unsecure protocol – Telnet (if enabled)

• GUI – This is a web-based interface in which you click buttons, menus and other graphical icons to access the configuration or management pages. From these pages, you can type or select values to configure or manage the device. You can access the GUI using the following protocol: - Secure protocol – Hypertext Transfer Protocol over Secure Socket Layer (HTTPS) Note: HTTP requests are redirected to HTTPS by default on Thunder ADC. Default Access Information: • Default Username: “admin” • Default password: “a10”

• Default IP address of the device: “172.31.31.31”

Note: For detailed information on how to access the Thunder ADC device, refer to the System Configuration and Administration Guide.

Architecture Overview

The diagram below provides an architectural overview of how Exchange 2016 can be optimized with A10 Thunder ADC.

Exchange Services

External DNSWIN-EXCH0110.1.0.211• OWA• ECP• EAS• MAPI• RPC• POP3• IMAP4• SMTP• EWS

• Autodiscover• OAB

• Powershell

IMAP4S/SMTP203.0.113.2 /24198.51.100.2 /24VIP: 198.51.100.74InternetPOP3S/SMTP198.51.100.1 /24WIN-EXCH0210.1.0.21210.1.0.1 /24Thunder ADCWeb ClientOutlook Client• Load Balancing• SSL Offload• URL-based Switching• HTTP to HTTPS Redirect• Redirection of \"/\" to \"/owa”• Health Monitoring• OWA Authentication (AAM)• DDoS MitigationFileshare WitnessServer (DAG)10.1.0.215AD DS10.1.0.210Figure 1: Lab topology

4

Deployment Guide | A10 Thunder ADC with Microsoft Exchange 2016

Validating Exchange 2016 Configuration

Before you start making configuration changes from Thunder ADC, use this section to validate the Exchange 2016 server configuration.

1. Open a web browser and navigate to one of the Exchange Mailbox servers. 2. Navigate to https:///ecp. 3. Log in with domain administrator credentials.

4. On the left menu panel, click Servers and on the top panel select Servers again. The menu provides a list of Mailbox servers deployed within Exchange 2016. These servers will be configured as real servers on Thunder ADC and referenced by a virtual IP (VIP) address.

Figure 2: List of Exchange 2016 servers

5

Deployment Guide | A10 Thunder ADC with Microsoft Exchange 2016

Virtual Directories

In this setup, a single namespace has been deployed on the Exchange Servers. Additionally, the internal and external URLs have been configured to be the same.

Figure 3: OWA virtual directory

Database Availability Group

A database availability group (DAG) is a set of up to 16 Microsoft Exchange Server 2016 Mailbox servers that provide automatic database-level recovery from a database, server or network failure. When a Mailbox server is added to a DAG, it works with the other servers in the DAG to provide automatic, database-level recovery from database, server and network failures.

On the left menu panel, click Servers, and in the top menu, select Databases. A menu appears, listing the databases configured in your solution. The databases must be configured within DAGs for redundancy purposes.

To understand how to configure DAGs in Exchange 2016, refer to the following URL: https://technet.microsoft.com/en-us/library/dd351172(v=exchg.160).aspx6

Deployment Guide | A10 Thunder ADC with Microsoft Exchange 2016

Figure 4: Mailbox databases

Figure 5: Database Availability Groups

SSL Offload

To enable SSL Offloading for the various servers running on the Exchange Servers, follow the steps outlined at: https://technet.microsoft.com/en-us/library/dn635115(v=exchg.150).aspx7

Deployment Guide | A10 Thunder ADC with Microsoft Exchange 2016

Figure 6: IIS Server: Disable the option “Require SSL”

POP3 and IMAP4 Services

By default, POP3 and IMAP4 client connectivity isn’t enabled in Exchange. To enable POP3 and/or IMAP4 client connectivity, you need to perform the following steps:

1. Start the POP3 and/or IMAP4 services, and configure the services to start automatically2. Configure the POP3 and/or IMAP4 settings for external clients

3. Configure authenticated SMTP settings for POP3 and IMAP4 clients in Exchange 2016See the Microsoft TechNet webpage for details:

https://technet.microsoft.com/en-us/library/dd298114(v=exchg.160).aspxIn addition, if you plan to use SSL Offload on Thunder ADC, set the logon method for POP3 and IMAP4 services to plain text as shown below.

8

Deployment Guide | A10 Thunder ADC with Microsoft Exchange 2016

Figure 7: POP3 settings

9

Deployment Guide | A10 Thunder ADC with Microsoft Exchange 2016

Figure 8: IMAP4 settings

OWA/ECP Authentication

In this setup, we are going to enable OWA authentication on Thunder ADC with Basic relay protocol and hence configure Outlook Web App (OWA) and Exchange Control Panel (ECP) authentication to Basic authentication on the Exchange Server. Make sure to set the authentication settings to be the same for both OWA and ECP and Exchange 2016 will also prompt you to do so.

Note: Certain versions of Exchange 2016 updates may cause client logoff issues with Basic authentication. Please refer to the appropriate Microsoft documentation for latest fixes and recommended settings.

10

Deployment Guide | A10 Thunder ADC with Microsoft Exchange 2016

Figure 9: OWA authentication

Once the prerequisites have been configured, verify that incoming and outgoing mail can be received or sent before adding Thunder ADC to the solution. Do not begin deployment of the ACOS solution unless Exchange 2016 is functioning correctly.

11

Deployment Guide | A10 Thunder ADC with Microsoft Exchange 2016

Thunder ADC Configuration Summary

This deployment guide provides step-by-step instructions based on a single VIP address configuration with multiple services using AppCentric Templates. With this option, Thunder ADC is configured with a single VIP bound to multiple Exchange services such as OWA, ActiveSync, Offline Address Book (OAB), Outlook Anywhere and Autodiscover.

The following table summarizes the Thunder ADC configuration for each Exchange service.

Table 1: Thunder ADC configuration parameters

Exchange ServiceOutlook Web App (OWA)Real ServersIP: Exchange ServerPort: 80 Health MonitorVIPOtherLoad-Balancing method: Least ConnectionTransparently redirect HTTP clients to HTTPSTransparently add “/owa” to requests without itExchange Control Panel (ECP)IP: Exchange ServerPort: 80 HTTP URLGET /ecp/healthcheck.htmIP: IP accessed by clientsType: HTTPS (with SSL Offload)Port: 443IP: IP accessed by clientsType: HTTPS (with SSL Offload)Port: 443IP: IP accessed by clientsType: HTTPS (with SSL Offload)Port: 443IP: IP accessed by clientsType: HTTPS (with SSL Offload)Port: 443Load-Balancing method: Least ConnectionTransparently redirect HTTP clients to HTTPSLoad-Balancing method: Least ConnectionTransparently redirect HTTP clients to HTTPSLoad-Balancing method: Least ConnectionTransparently redirect HTTP clients to HTTPSLoad-Balancing method: Least ConnectionTransparently redirect HTTP clients to HTTPSHTTP URL IP: IP accessed by clientsGET /owa/healthcheck.htmType: HTTPS (with SSL Offload)Port: 443Exchange ActiveSyncIP: Exchange ServerPort: 80 HTTP URL GET /Microsoft-Server-ActiveSync/healthcheck.htmOutlook Anywhere (MAPI)IP: Exchange ServerPort: 80 HTTP URLGET /mapi/healthcheck.htmOutlook Anywhere (RPC)IP: Exchange ServerPort: 80 HTTP URLGET /rpc/healthcheck.htm12

Deployment Guide | A10 Thunder ADC with Microsoft Exchange 2016

Exchange ServicePOP3/POP3SReal ServersIP: Exchange ServerPort: 110 Health MonitorTCP (port 110)VIPIP: IP accessed by clientsType: POP3Port 110Type: SSL-Proxy (with SSL offload)Port: 995OtherLoad-Balancing method: Least ConnectionIMAP4/IMAP4SIP: Exchange ServerPort: 143 TCP (port 143)IP: IP accessed by clientsType: IMAP4Port 143Type: SSL-Proxy (with SSL offload)Port: 993Load-Balancing method: Least ConnectionSMTPIP: Exchange ServerPort: 587 TCP (port 587)IP: IP accessed by clientsType: SMTP (STARTTLS with SSL offload)Port: 587Load-Balancing method: Least ConnectionSMTP STARTTLS enforcedLoad-Balancing method: Least ConnectionTransparently redirect HTTP clients to HTTPSLoad-Balancing method: Least ConnectionTransparently redirect HTTP clients to HTTPSLoad-Balancing method: Least ConnectionTransparently redirect HTTP clients to HTTPSExchange Web Services (EWS)IP: Exchange ServerPort: 80 HTTP URL GET /ews/healthcheck.htmIP: IP accessed by clientsType: HTTPS (with SSL Offload)Port: 443AutodiscoverIP: Exchange ServerPort: 80 HTTP URL IP: IP accessed by GET /autodiscover/clientshealthcheck.htmType: HTTPS (with SSL Offload)Port: 443Offline Address Book (OAB) distributionIP: Exchange ServerPort: 80 HTTP URL GET /oab/healthcheck.htmIP: IP accessed by clientsType: HTTPS (with SSL Offload)Port: 44313

Deployment Guide | A10 Thunder ADC with Microsoft Exchange 2016

Session Persistence in Exchange 2016

In Exchange 2016, session persistence is not required. See the following link for details:https://blogs.technet.microsoft.com/exchange/2015/10/08/load-balancing-in-exchange-2016/SSL Certificate Configuration

SSL Offload acts as an acceleration feature by removing the burden of processing SSL traffic from the Exchange Servers. To use SSL Offload, you need to either import an SSL Certificate or you can generate a self-signed certificate on Thunder ADC.

In this setup, we used a self-signed certificate for ease of deployment.To generate a self-signed certificate and key pair:• Go to ADC > SSL Management > SSL Certificates• Click on Create

Figure 10: Create self-signed certificate

• File name: A10Lab

• Common name: mail.a10lab.com• Division: IT• Organization: IT• Locality: San Jose• State: CA

• Country: United States• Valid Days: 1825 • Key Size: 2048

Note: Thunder ADC supports 1024, 2048 and 4096 bit SSL keys. The higher bit SSL key size, the more CPU processing will be required. The Thunder ADC SSL models handle the SSL transaction in hardware.• Click Save

14

Deployment Guide | A10 Thunder ADC with Microsoft Exchange 2016

Thunder ADC Exchange Configuration Using AppCentric Templates

AppCentric Templates (ACT) Overview

ACT is a wizard-based configuration tool that enables organizations to apply best practices to deploying and securing their Exchange 2016 solution with minimal effort. A10 highly recommends the use of this configuration tool for the deployment and management of Exchange 2016, since these templates were developed with a focus on best practices. For that reason, most of the subsequent points can be easily configured via AppCentric Templates.

Refer to Appendix B for details on how to acquire and import the ACT file.

Configuration Using ACT

To access ACT, first log into Thunder ADC using the web GUI:• IP address: Management IP address• Default username: “admin” • Default password: “a10”Go to System > App Templates

If prompted to specify username and password, log into ACT using your regular admin credentials:

Figure 11: Logging into ACT

Once you’ve logged into ACT, select Exchange from the AppCentric Templates menu. There are three main sections in the Exchange AppCentric Templates:

1. Dashboard: The dashboard gives users a view of different statistics related to the current state of the system, including traffic statistics. 2. Wizard: The wizard provides users with a guided flow for deployment of Exchange 2016 with Thunder ADC. 3. Configuration: This section provides users with the current configuration of the device as well as access to some advanced options.

15

Deployment Guide | A10 Thunder ADC with Microsoft Exchange 2016

Wizard – Topology

In the left-pane, go to Exchange > Wizard

Depending on the mode of deployment, select either Source-NAT or Inline:•

In this deployment we’ve used the Inline deployment mode.

Figure 12: Select the topology: Source-NAT vs. Inline

Wizard – Virtual Server

Partition: Thunder ADC supports multitenancy using Active Delivery Partitions (ADP). Every ACOS device has a shared partition, and by default, your configuration is run in this shared partition. Here we select the default shared partition.VIP: 198.51.100.74

This is the public IP address that will be used by the clients to access Exchange services.Members: 10.1.0.211 and 10.1.0.212

These are the real IP addresses of the Exchange (Mailbox) servers.

16

Deployment Guide | A10 Thunder ADC with Microsoft Exchange 2016

Figure 13: Specify VIP and real server IP addresses

Wizard – HTTPS

SSL Mode: SSL Offload

SSL Offload acts as an acceleration feature by removing the burden of processing SSL traffic from the Exchange Servers. Instead of having Exchange Servers handling the SSL processing, Thunder ADC decrypts and encrypts all HTTPS traffic, forwarding the traffic to the server over HTTP (unsecured).SSL Certificate/Key: A10Lab (self-signed certificate/key generated earlier)

This is the certificate and key that will be used for securing the traffic between the client and Thunder ADC.Certificate Chain: Depends on the certificate; not required in this example.

Figure 14: Enable SSL Offload and specify the certificate/key for encrypted traffic between the clients

and Thunder ADC

17

Deployment Guide | A10 Thunder ADC with Microsoft Exchange 2016

SSL Everywhere: Set to Enable

This will configure the following recommended security features:• HTTP-to-HTTPS redirection

• HTTP Strict Transport Security (HSTS)

• Perfect Forward Secrecy (PFS) cipher suites will be preferredClick NEXT

Figure 15: Enable OWA authentication

OWA Authentication: Enable

This will enable OWA authentication to be performed by Thunder ADC. On enabling this option, you will see the related configuration options such as specifying the address of the Active Directory server.Active Directory: 10.1.0.210

If you enable the option of OWA Authentication, you need to additionally specify the address of Active Directory server.

Relay Protocol: Basic or NTLM

Specify the relay protocol to be used between Thunder ADC and the Exchange Servers.

18

Deployment Guide | A10 Thunder ADC with Microsoft Exchange 2016

Wizard – IMAP4/POP3

Figure 16: Enabling POP3/IMAP4

To enable support for POP3 and/or IMAP4 protocols, select the corresponding Enable option.

Wizard – SMTP

Figure 17: Enable SMTP on port 587

MSA: Enable

This should be the same as the setting on the Exchange Server. On Exchange Server, the default Receive connector named “Client Frontend ” in the Client Access services on the Mailbox server listens for authenticated SMTP client submissions on port 587.

The use of STARTTLS for SMTP connections on the client side will be automatically enforced with this setting.

19

Deployment Guide | A10 Thunder ADC with Microsoft Exchange 2016

Wizard – Review

Review the configuration parameters

Figure 18: Summary of configuration parameters

Click FINISH.

You will then see a popup window with the auto-generated configuration and will be prompted to automatically configure Thunder ADC.

Figure 19: Exchange configuration generated by ACT

You can either click APPLY to activate the setting on the Thunder ADC device, or you can click “Copy” to copy the configuration and then manually apply through the CLI. To view the complete configuration in text format, refer to Appendix A.

Once it’s applied, you can go to the Exchange > Configuration page to look at the current configuration applied to the Thunder ADC device and make any additional changes.

20

Deployment Guide | A10 Thunder ADC with Microsoft Exchange 2016

Figure 20: Exchange configuration parameters on Thunder ADC

Exchange Dashboard

To review the current operational status and traffic analytics for Exchange deployment, go to Exchange > Dashboard.

Figure 21: Health monitoring status of Exchange services

21

Deployment Guide | A10 Thunder ADC with Microsoft Exchange 2016

Figure 22: Exchange traffic statistics

Additional Security Feature – DDoS Mitigation (Optional)

The following section shows an additional security feature called DDoS Mitigation that can be implemented within the deployed solution.

DDoS Mitigation

This section describes an additional security feature to protect applications from Distributed Denial of Service (DDoS) attacks.

To configure this feature within the ACOS solution, go to Security > DDoS.

The DDoS protection feature is a global configuration. To enable this feature, select the necessary DDoS attacks you would like to drop. In the figure shown below, we have selected the DDoS attack mitigation required. Once completed, click Update and Save to save the configuration.

Figure 23: DDoS mitigation

22

Deployment Guide | A10 Thunder ADC with Microsoft Exchange 2016

The following IP anomaly filters are supported for system-wide Policy-Based Server Load Balancing (PBSLB), although you can also use them without PBSLB:• Invalid HTTP or SSL payload• Zero-length TCP window• Out-of-sequence packet

Summary

This document describes how to configure Thunder ADC as a load balancer to support a Microsoft

Exchange 2016 Server deployment using A10 AppCentric Templates. A10 Thunder ADC, powered by ACOS, enhances Microsoft Exchange 2016 by providing the following:

• High availability for Exchange Mailbox servers, ensuring that users can access Exchange services without disruption • Scalability, as the Thunder ADC device transparently load balances multiple Exchange Mailbox servers • Higher connection throughput to enhance end user experience

• Improved server performance due to server optimizations such as SSL Offload• Highest levels of security with PFS ciphers, HSTS and HTTP-to-HTTPS redirection• Protection against DDoS attacks using integrated DDoS protection capabilities• Protection against web application attacks through Web Application Firewall (WAF)• Ease of deployment with AppCentric Templates

For more information about A10 Thunder ADC products, please refer to:

https://www.a10networks.com/products/thunder-series/thunder-application_delivery_controllerhttps://www.a10networks.com/resources/solution-briefshttps://www.a10networks.com/resources/case-studies23

Deployment Guide | A10 Thunder ADC with Microsoft Exchange 2016

Appendix A – Thunder ADC Test Configuration

Here is the Thunder ADC configuration used in an actual test environment.

ip anomaly-drop packet-deformity layer-3ip anomaly-drop packet-deformity layer-4ip anomaly-drop security-attack layer-3ip anomaly-drop security-attack layer-4ip anomaly-drop bad-content 10ip anomaly-drop frag

ip anomaly-drop ip-optionip anomaly-drop land-attackip anomaly-drop ping-of-deathip anomaly-drop tcp-no-flagip anomaly-drop tcp-syn-finip anomaly-drop tcp-syn-frag!

vlan 103

untagged ethernet 2

router-interface ve 103!

vlan 105

untagged ethernet 4

router-interface ve 105!

interface management

ip address 10.100.2.188 255.255.255.0 ip default-gateway 10.100.2.1!

interface ethernet 1!

interface ethernet 2 enable!

interface ethernet 3!

interface ethernet 4 enable!

interface ve 103

ip address 10.1.0.1 255.255.255.0!

interface ve 105

ip address 198.51.100.1 255.255.255.0!!

ip route 203.0.113.0 /24 198.51.100.2!

aam authentication logon form-based owa_logon_form_vip_198_51_100_74 portal _act_owa_portal logon logon.html failpage lockout.html changepasswordpage pwdchange.html action-url /logon.fo

username-variable username password-variable pwd retry 5

24

Deployment Guide | A10 Thunder ADC with Microsoft Exchange 2016

user-tag uiext_exchange13_owa_logon_form_vip_198_51_100_74!!

aam authentication server windows ad_auth_server_vip_198_51_100_74 host 10.1.0.210

auth-protocol kerberos-disable!

aam authentication relay http-basic Basic_relay_vip_198_51_100_74!

aam authentication template Owa_templ_vip_198_51_100_74 logon owa_logon_form_vip_198_51_100_74 relay Basic_relay_vip_198_51_100_74

server ad_auth_server_vip_198_51_100_74

user-tag uiext_exchange13_Owa_templ_vip_198_51_100_74!

aam aaa-policy Owa_aaa_policy_vip_198_51_100_74

user-tag uiext_exchange13_Owa_aaa_policy_vip_198_51_100_74 aaa-rule 1

uri starts-with /owa action allow

authentication-template Owa_templ_vip_198_51_100_74!

slb common

enable-l7-req-acct!

health monitor Hm_imap4_143

user-tag uiext_exchange13_vip_198_51_100_74_Hm_imap4_143 method tcp port 143!

health monitor Hm_imap4s_993

user-tag uiext_exchange13_vip_198_51_100_74_Hm_imap4s_993 method tcp port 993!

health monitor Hm_pop3_110

user-tag uiext_exchange13_vip_198_51_100_74_Hm_pop3_110 method tcp port 110!

health monitor Hm_pop3s_995

user-tag uiext_exchange13_vip_198_51_100_74_Hm_pop3s_995 method tcp port 995!

health monitor Hm_msa_587

user-tag uiext_exchange13_vip_198_51_100_74_Hm_msa_587 method tcp port 587!

health monitor Hm_owa_80

user-tag uiext_exchange13_vip_198_51_100_74_Hm_owa_80 method http url GET /owa/healthcheck.htm!

health monitor Hm_eas_80

user-tag uiext_exchange13_vip_198_51_100_74_Hm_eas_80

method http url GET /Microsoft-Server-ActiveSync/healthcheck.htm!

health monitor Hm_ecp_80

user-tag uiext_exchange13_vip_198_51_100_74_Hm_ecp_80 method http url GET /ecp/healthcheck.htm

25

Deployment Guide | A10 Thunder ADC with Microsoft Exchange 2016

!

health monitor Hm_rpc_80

user-tag uiext_exchange13_vip_198_51_100_74_Hm_rpc_80 method http url GET /rpc/healthcheck.htm!

health monitor Hm_ews_80

user-tag uiext_exchange13_vip_198_51_100_74_Hm_ews_80 method http url GET /ews/healthcheck.htm!

health monitor Hm_oab_80

user-tag uiext_exchange13_vip_198_51_100_74_Hm_oab_80 method http url GET /oab/healthcheck.htm!

health monitor Hm_autodisc_80

user-tag uiext_exchange13_vip_198_51_100_74_Hm_autodisc_80 method http url GET /autodiscover/healthcheck.htm!

health monitor Hm_mapi_80

user-tag uiext_exchange13_vip_198_51_100_74_Hm_mapi_80 method http url GET /mapi/healthcheck.htm!

health monitor Hm_powershell_80

user-tag uiext_exchange13_vip_198_51_100_74_Hm_powershell_80 method http url GET /powershell/healthcheck.htm!

slb template cipher Ccipher_vip_198_51_100_74 TLS1_RSA_AES_128_SHA TLS1_RSA_AES_256_SHA

TLS1_ECDHE_RSA_AES_128_SHA priority 10 TLS1_ECDHE_RSA_AES_256_SHA priority 10 TLS1_ECDHE_RSA_AES_128_SHA256 priority 10

user-tag uiext_exchange13_Ccipher_vip_198_51_100_74!

slb server srv_10_1_0_211 10.1.0.211

user-tag uiext_exchange13_vip_198_51_100_74_srv_10_1_0_211 sampling-enable total-conn port 80 tcp

user-tag uiext_exchange13_vip_198_51_100_74_srv_10_1_0_211_80 port 110 tcp

user-tag uiext_exchange13_vip_198_51_100_74_srv_10_1_0_211_110 port 143 tcp

user-tag uiext_exchange13_vip_198_51_100_74_srv_10_1_0_211_143 port 443 tcp

user-tag uiext_exchange13_vip_198_51_100_74_srv_10_1_0_211_443 port 587 tcp

user-tag uiext_exchange13_vip_198_51_100_74_srv_10_1_0_211_587!

slb server srv_10_1_0_212 10.1.0.212

user-tag uiext_exchange13_vip_198_51_100_74_srv_10_1_0_212 sampling-enable total-conn port 80 tcp

user-tag uiext_exchange13_vip_198_51_100_74_srv_10_1_0_212_80 port 110 tcp

user-tag uiext_exchange13_vip_198_51_100_74_srv_10_1_0_212_110 port 143 tcp

user-tag uiext_exchange13_vip_198_51_100_74_srv_10_1_0_212_143

26

Deployment Guide | A10 Thunder ADC with Microsoft Exchange 2016

port 443 tcp

user-tag uiext_exchange13_vip_198_51_100_74_srv_10_1_0_212_443 port 587 tcp

user-tag uiext_exchange13_vip_198_51_100_74_srv_10_1_0_212_587!

slb service-group autodisc_80_sg tcp method least-connection

health-check Hm_autodisc_80

user-tag uiext_exchange13_autodisc_80_sg member srv_10_1_0_211 80 member srv_10_1_0_212 80!

slb service-group eas_80_sg tcp method least-connection health-check Hm_eas_80

user-tag uiext_exchange13_eas_80_sg member srv_10_1_0_211 80 member srv_10_1_0_212 80!

slb service-group ecp_80_sg tcp method least-connection health-check Hm_ecp_80

user-tag uiext_exchange13_ecp_80_sg member srv_10_1_0_211 80 member srv_10_1_0_212 80!

slb service-group ews_80_sg tcp method least-connection health-check Hm_ews_80

user-tag uiext_exchange13_ews_80_sg member srv_10_1_0_211 80 member srv_10_1_0_212 80!

slb service-group imap4_143_sg tcp method least-connection health-check Hm_imap4_143

user-tag uiext_exchange13_imap4_143_sg member srv_10_1_0_211 143 member srv_10_1_0_212 143!

slb service-group imap4s_993_sg tcp method least-connection health-check Hm_imap4s_993

user-tag uiext_exchange13_imap4s_993_sg member srv_10_1_0_211 143 member srv_10_1_0_212 143!

slb service-group mapi_80_sg tcp method least-connection health-check Hm_mapi_80

user-tag uiext_exchange13_mapi_80_sg member srv_10_1_0_211 80 member srv_10_1_0_212 80!

slb service-group msa_587_sg tcp method least-connection

27

Deployment Guide | A10 Thunder ADC with Microsoft Exchange 2016

health-check Hm_msa_587

user-tag uiext_exchange13_msa_587_sg member srv_10_1_0_211 587 member srv_10_1_0_212 587!

slb service-group oab_80_sg tcp method least-connection health-check Hm_oab_80

user-tag uiext_exchange13_oab_80_sg member srv_10_1_0_211 80 member srv_10_1_0_212 80!

slb service-group owa_80_sg tcp method least-connection health-check Hm_owa_80

user-tag uiext_exchange13_owa_80_sg member srv_10_1_0_211 80 member srv_10_1_0_212 80!

slb service-group pop3_110_sg tcp method least-connection health-check Hm_pop3_110

user-tag uiext_exchange13_pop3_110_sg member srv_10_1_0_211 110 member srv_10_1_0_212 110!

slb service-group pop3s_995_sg tcp method least-connection health-check Hm_pop3s_995

user-tag uiext_exchange13_pop3s_995_sg member srv_10_1_0_211 110 member srv_10_1_0_212 110!

slb service-group powershell_80_sg tcp method least-connection

health-check Hm_powershell_80

user-tag uiext_exchange13_powershell_80_sg member srv_10_1_0_211 80 member srv_10_1_0_212 80!

slb service-group rpc_80_sg tcp method least-connection health-check Hm_rpc_80

user-tag uiext_exchange13_rpc_80_sg member srv_10_1_0_211 80 member srv_10_1_0_212 80!

slb template client-ssl Cssl_vip_198_51_100_74 template cipher Ccipher_vip_198_51_100_74 cert A10Lab

enable-tls-alert-logging fatal key A10Lab disable-sslv3

user-tag uiext_exchange13_Cssl_vip_198_51_100_74!

slb template http Url_sw_http_tmpl

28

Deployment Guide | A10 Thunder ADC with Microsoft Exchange 2016

insert-client-ip

response-header-insert strict-transport-security:max-age=31536000 url-switching url-case-insensitive url-switching url-hits-enable

url-switching starts-with /owa service-group owa_80_sg url-switching starts-with /eas service-group eas_80_sg url-switching starts-with /ecp service-group ecp_80_sg url-switching starts-with /rpc service-group rpc_80_sg url-switching starts-with /ews service-group ews_80_sg url-switching starts-with /oab service-group oab_80_sg

url-switching starts-with /autodisc service-group autodisc_80_sg url-switching starts-with /mapi service-group mapi_80_sg

url-switching starts-with /powershell service-group powershell_80_sg user-tag uiext_exchange13vip_198_51_100_74_443!

slb template smtp smtp_tmpl_vip_198_51_100_74 starttls client enforced

user-tag uiext_exchange13_smtp_tmpl_vip_198_51_100_74!

slb virtual-server vip_198_51_100_74 198.51.100.74

user-tag uiext_exchange13_vip_198_51_100_74_virtualserver port 80 http

service-group powershell_80_sg redirect-to-https

user-tag uiext_exchange13_vip_198_51_100_74_80_http sampling-enable total_conn

sampling-enable total_fwd_bytes sampling-enable total_rev_bytes port 110 pop3

service-group pop3_110_sg

user-tag uiext_exchange13_vip_198_51_100_74_110_pop3 sampling-enable total_conn

sampling-enable total_fwd_bytes sampling-enable total_rev_bytes port 143 imap

service-group imap4_143_sg

user-tag uiext_exchange13_vip_198_51_100_74_143_imap sampling-enable total_conn

sampling-enable total_fwd_bytes sampling-enable total_rev_bytes port 443 https

aflex redirect_to_owa

service-group powershell_80_sg template http Url_sw_http_tmpl

template client-ssl Cssl_vip_198_51_100_74 aaa-policy Owa_aaa_policy_vip_198_51_100_74

user-tag uiext_exchange13_vip_198_51_100_74_443_https sampling-enable total_conn

sampling-enable total_fwd_bytes sampling-enable total_rev_bytes port 587 smtp

service-group msa_587_sg

template smtp smtp_tmpl_vip_198_51_100_74 template client-ssl Cssl_vip_198_51_100_74

user-tag uiext_exchange13_vip_198_51_100_74_587_smtp sampling-enable total_conn

29

Deployment Guide | A10 Thunder ADC with Microsoft Exchange 2016

sampling-enable total_fwd_bytes sampling-enable total_rev_bytes port 993 ssl-proxy

service-group imap4s_993_sg

template client-ssl Cssl_vip_198_51_100_74

user-tag uiext_exchange13_vip_198_51_100_74_993_ssl-proxy sampling-enable total_conn

sampling-enable total_fwd_bytes sampling-enable total_rev_bytes port 995 ssl-proxy

service-group pop3s_995_sg

template client-ssl Cssl_vip_198_51_100_74

user-tag uiext_exchange13_vip_198_51_100_74_995_ssl-proxy sampling-enable total_conn

sampling-enable total_fwd_bytes sampling-enable total_rev_bytes!end

Appendix B – AppCentric Templates Upgrade

ACOS release 4.1.0-P9 and later is required for AppCentric Templates (ACT)

1. Obtain the latest version of ACT by sending an e-mail to app-template@a10networks.com2. Log into the A10 Thunder GUI

3. Ensure that the clock and time zone of your Thunder ADC device are set correctly4. Click System > App Template Import and follow instructions

The upgrade is achieved seamlessly without disrupting any Thunder ADC operations.

Figure 24: Import AppCentric Templates file

30

Deployment Guide | A10 Thunder ADC with Microsoft Exchange 2016

About A10 Networks

A10 Networks (NYSE: ATEN) is a Secure Application Services™ company, providing a range of high-performance application networking solutions that help organizations ensure that their data center applications and networks remain highly available, accelerated and secure. Founded in 2004, A10

Networks is based in San Jose, Calif., and serves customers globally with offices worldwide. For more information, visit: www.a10networks.com or tweet @A10Networks.

Corporate Headquarters

A10 Networks, Inc3 West Plumeria Ave.San Jose, CA 95134 USATel: +1 408 325-8668Fax: +1 408 325-8666www.a10networks.com

Worldwide Offices

North America

sales@a10networks.comEurope

emea_sales@a10networks.comSouth America

latam_sales@a10networks.comJapan

jinfo@a10networks.comChina

china_sales@a10networks.com

hongkong@a10networks.comTaiwan

@a10networks.comKorea

korea@a10networks.comSouth Asia

southasia@a10networks.comAustralia/New Zealand

anz_sales@a10networks.com

To discover how A10 Networks products will enhance, accelerate and secure your business, contact us at a10networks.com/contact or call to speak with an A10 sales representative.

Part Number: A10-DG-16157-EN-04 July 2017

©2017 A10 Networks, Inc. All rights reserved. A10 Networks, the A10 Networks logo, A10 Harmony, A10 Lightning, ACOS, Thunder and SSL Insight are trademarks or registered trademarks of A10 Networks, Inc. in the United States and other countries. All other trademarks are property of their respective owners. A10 Networks assumes no responsibility for any inaccuracies in this document. A10 Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. For the full list of trademarks, visit: www.a10networks.com/a10-trademarks.

31

因篇幅问题不能全部显示,请点此查看更多更全内容

Copyright © 2019- oldu.cn 版权所有 浙ICP备2024123271号-1

违法及侵权请联系:TEL:199 1889 7713 E-MAIL:2724546146@qq.com

本站由北京市万商天勤律师事务所王兴未律师提供法律服务