Microsoft Exchange Server 2010 - F5 Networks

3y ago
30 Views
2 Downloads
1.85 MB
11 Pages
Last View : 4d ago
Last Download : 3m ago
Upload by : Fiona Harless
Transcription

Microsoft Exchange Server 2010APPLICATION READY SOLUTION GUIDEWhat’s inside:2 Why F5?F5 enables secure, agile, and optimizedExchange Server 2010 deployments3 Detailed Benefits andF5 Value for ExchangeServer 2010Microsoft Exchange Server is the undisputed industry leader in corporate messaging.Microsoft Exchange Server 2010 provides businesses with email, calendar, and contacts onthe PC, phone and web, so employees can stay connected and in sync. F5 works closely withMicrosoft to ensure we are delivering the best possible technology and deployment guidanceto support highly available and scalable Exchange 2010 deployments.3 F5 improves Exchange2010 end userexperience andapplication performance5 F5 enhances applicationsecurity for ExchangeServer 2010F5 has all the tools to help organizations achieve a truly dynamic infrastructure forMicrosoft Exchange Server. From providing custom-built Exchange iApp templates forsimple, error-free deployments, to optimizing and securing Exchange 2010 traffic over theLAN and WAN, F5’s comprehensive Application Ready solution for Exchange Server 2010allows organizations to easily provide additional performance, security and availability, toensure maximum ROI with the minimum amount of work.7 Providing unified securityenforcement and accesscontrol for Exchange2010F5 enables IT agility, your way.8 Enabling seamlessbusiness continuity anddisaster recovery forExchange 2010Key benefitsIncrease administrator efficiency andaccelerate deployments10 F5 Global ConfigurationDiagram for MicrosoftExchange Server 2010F5’s iApp templates for Exchange enable you tostreamline design and implementation, resulting ina fast, accurate deployment or upgrade.11 More InformationGain Exchange Server capacityExtend server capacity by offloading tasks likecompression and SSL processing onto F5’s unified,simple to manage platform.Secure your Exchange deploymentFrom powerful network- and protocol-levelsecurity to attack filtering, F5 protects Exchangedeployments that help run your business.1Reduce download timesF5 helps drastically reduce the download time ofemail attachments for end users.Eliminate SPAM before it reaches theExchange ServersF5 can help eliminate more than 70% ofunwanted email before it reaches your ExchangeServers, increasing Exchange Server efficiencyExchange-specific analyticsGet real-time visibility into application anduser performance specific to your Exchangedeployment.

APPLICATION READY SOLUTION GUIDEMicrosoft Exchange Server 2010Why F5?F5 Networks is the market share leader in Application Delivery Networking, focused onensuring the secure, reliable, and fast delivery of applications like Exchange 2010. Thefollowing is an overview of why so many businesses rely on F5 to be the strategic point ofcontrol for their Microsoft Exchange Server 2010 investments.F5 has a broad and deep partnership with Microsoft Microsoft and F5 have a global partnership that spans more than 11 years“It appeared that F5 and Microsoft haddone a lot of work together to integratetheir products—that close integrationbetween F5 and Microsoft was a drivingfactor in our decision.” F 5 is a MPSC Alliance partner with offices and a lab at theMicrosoft headquarters in Redmond, Washington F5 is one of only 60 Microsoft Technology Center Alliances Program partnersExcerpted from A.T. Kearney Case Studyon F5.com F5 works with Microsoft on solution development across products and technologies F5 provides training for Microsoft technical field, services and support teamsF5 adds more value with the changes in the architecture of Exchange All Exchange clients (regardless of protocol) connect via the Client Access Serverrole, increasing the importance of F5’s strategic location in the data center“F5 demonstrated their strategic relationshipwith Microsoft by providing comprehensivesupport for Microsoft applications, showinga clear background with Exchange andspecifically DAG replication.”Excerpted from Human Rights WatchCase Study on F5.com M icrosoft requires load balancing for Client Access Servers, and recommendshardware-based load balancing; F5’s wide variety of platforms andsolutions are a perfect match for Exchange deployments of any size T he F5 solution is flexible, yet powerful enough to use for Exchange 2010 aswell as the other Microsoft UCC applications, like SharePoint and Lync ServerF5 increases Exchange performance by offloading SSL and other services Offload SSL onto F5 devices to significantly increase the abilityof Exchange to service incoming user connections Gain Exchange server capacity by performing compression and caching on F5 devices“We have achieved five nines [99.999percent] of availability. The F5 solutionhelps us make the Exchange Server ClientAccess servers highly available. Users aren’tfrustrated with outages, and we can keepbusiness on track with our customers”Excerpted from Symex Case Study onF5.com Conserve resources by eliminating up to 70% of SPAM before it reaches ExchangeF5 ensures your Exchange 2010 deployment remains secure Enhance Exchange 2010 security with intelligent application-layer protection P revent unauthorized access and enforce anti-virus levels and other policieswith pre-logon checks for web clients that ensure corporate compliance K eep corporate data secure with post-logon checks and clean-up controlsthat ensure sensitive data is not left on public computers or kiosks Set granular, easy-to-configure secure access policies that assign permission levelsdepending on the device being used (such as mobile device, kiosk, or work PC)F5 helps keep end users, and Exchange administrators productive and satisfied Deploy in minutes while mitigating the risk of failed or delayeddeployments with iApp templates for Exchange 2010“Now, we can easily manage our Citrixand Exchange Server applications—andsupport other applications like MicrosoftSharePoint Server as we grow—from asingle platform.”Excerpted from Reliance ProtectionSecurity Services Case Study on F5.com E nsure users are always directed to fully-functional resources with sophisticatediApp-created health monitors which log in to individual Client Access Services C onsolidate infrastructure and simplify web access withF5 cross-site load balancing and site resilience G ain a comprehensive view of users, the Microsoft Exchange application, andthe network, which helps better respond to changing business needs2

APPLICATION READY SOLUTION GUIDEMicrosoft Exchange Server 2010Detailed Benefits and F5 Value for Exchange Server 2010F5’s application ready solution for Microsoft Exchange Server 2010 ensures a secure, fast andavailable deployment, providing the following benefits to organizations, and their end users.F5 improves Exchange 2010 end user experience and application performanceToday’s organizations depend on messaging applications, with an estimated 70% of businessconducted over email. Users have come to expect that email communication is nearlyinstantaneous, and rely on its availability. F5 solutions enable businesses to achieve strategicpoints of control for their Exchange deployments, helping ensure that IT departments, andtheir end-users, receive the performance, reliability, and constant availability they expect fromMicrosoft Exchange Server.Deploy quickly and accurately with built-in, Exchange-specific application servicesAs part of F5’s Application Ready Solution, our engineers meticulously configured, tested,and fine-tuned our devices for Exchange 2010. F5 has worked closely with Microsoft duringthis process, regularly re-testing and updating the solution, as well as incorporating customerfeedback, to make sure this solution improves while Exchange 2010 matures in the market.As a result, F5 has created an Exchange-specific application template, called an iApp, whichacts as the single point interface for building, managing, and monitoring Exchange 2010across the entire F5 solution. This allows you to deploy and control functionality like singlesign on, secure remote access, intelligent load balancing, and advanced health monitoring,on one device, as a single application service. An administrator spends a few minutesanswering questions about the Exchange deployment, and the iApp creates an optimized F5configuration, saving weeks or even months of development time.Once your F5 deployment for Exchange is up and running, F5 provides real-time performancestatistics, and diagnostic and troubleshooting information such as application response time,network latency, and connection statistics, which are specific to the Exchange application.With this application-centric view, there is no longer a need to try to extrapolate meaningfulanalysis from statistics for individual configuration objects.F5 Analytics give you real-timevisibility into application anduser performance specific toyour Exchange deploymentOptimize Exchange Server 2010One significant change in Microsoft Exchange Server 2010 is that all user access to email,regardless of protocol, is done through Client Access Servers. This is important becauseit allows F5 to intelligently direct all Exchange Server client traffic, even internal users.This enables F5 to apply optimizations—such as caching, compression, TCP connectionoptimization, and SSL offload—that increase availability, performance, and security forExchange Server, making F5 a natural fit in an Exchange Server environment.3

APPLICATION READY SOLUTION GUIDEMicrosoft Exchange Server 2010Another new feature in Microsoft Exchange Server 2010 is the addition of DatabaseAvailability Groups (DAG). A DAG is a group of up to 16 Mailbox servers that host a set ofdatabases and provide automatic database-level recovery from failures that affect individualservers or databases. F5 optimization technology speeds mailbox database replicationbetween DAG members while simultaneously reducing the total amount of data transferredover the WAN connection. F5 can also encrypt the optimized tunnel, securing the replicationeven when traversing untrusted or public networks.F5 optimization technologyspeeds mailbox databasereplication between DAGmembers while simultaneouslyreducing the total amountof data transferred over theWAN connection.Data Center AData Center BMAPI NetworkMAPI NetworkDAGMicrosoft DAG ServerMicrosoft DAG ServerWAN n on Enabled)Increase Exchange Server performance over the WANWith the workforce becoming increasingly mobile, Microsoft has done a great job in ensuringusers can access their email from a wide range devices. However, because these devices areconnecting with the Exchange Server over the WAN, there are a number of different factorsthat can affect the performance of the Exchange Servers that have nothing to do with theapplication itself. IT managers often assume that adding bandwidth will solve the problem.But TCP throughput degrades significantly on the WAN, particularly on high-latency, longdistance links, so adding bandwidth is often ineffective.F5 helps smooth these potential networking and infrastructure issues, allowing MicrosoftExchange to focus solely on the tasks for which it was designed. F5’s TCP/IP stack isstandards-based and contains hundreds of improvements that affect both WAN and LANefficiencies. For low-speed WANs, F5 detects client speed and estimates bandwidth to limitpacket loss and recovery in the case of dropped packets. It improves transfer rates for allconnecting client types and increases bandwidth efficiency across the WAN. F5 solutionsdynamically and automatically optimize TCP window sizes and TCP congestion informationfor each connection symmetrically and asymmetrically (every client and every server),improving throughput in high loss networks. This provides users with the most effective useof the network regardless of the quality of their connection to the office.For example, for Outlook Web App, F5 optimizations dramatically reduce the number ofobjects the Client Access Servers have to deliver to the clients, allowing those servers tospend more processing power on the delivery of actual mail. F5 has also built intelligenceinto our products to recognize and handle email attachments in Outlook Web App in themost efficient manner. Additional steps are taken to flag attachments for optimal storage inthe client’s browser cache. All of these improvements are meant to streamline the impact ofvarious network conditions to ensure a usable and high performing application.Reduce load on the servers while helping protect your Exchange deploymentBecause email is so vital to a successful business, the market for those who want to exploitit is constantly growing. Approximately 80% of internet traffic comes from abusive email.Email systems have to spend valuable system resources processing these messages, puttingunnecessary strain on the servers. Exchange Server 2010, with its built-in defenses against4

APPLICATION READY SOLUTION GUIDEMicrosoft Exchange Server 2010spam and phishing e-mail, goes a long way toward reducing the amount of this type of emailthat reaches users.F5 helps reduce the burden on Exchange Servers with an inexpensive, easy-to-use, reputationbased SPAM filtering solution that stops up to 70% of unwanted email on the edge of thecorporate network, before it even reaches the Exchange servers. This significantly reducesthe amount of mail the Exchange Server (or solution like ForeFront Endpoint Protectionfor Exchange) has to process. This highly customizable solution enables organizations toeasily determine the mail that is simply dropped, sent along to the user, or sent to a moresophisticated scanning engine for further processing.As an additional benefit, the F5 solution can also reduce archiving and retention costs thatare required to keep in compliance with new regulations. By preventing 70% of the emailfrom reaching the servers, there is now 70% less email to archive and store, a considerablesavings.By eliminating 70% of unwantedemail before it even reachesthe Exchange Servers, F5 greatlyreduces the chance that anunwanted and potentiallydangerous email gets through tothe Exchange 2010 servers.TrustedSource IPReputation DatabaseQueryfor ScoreInternetResponsewith ScoreBIG-IP Local Traffic ManagerExisting Quarantineand Spam InspectionExchange Servers Message Security ModuleSpam 70%Spam 10%Source SMTP ServerAn application that is performing optimally makes end users much more satisfied andproductive. Organizations using Microsoft Exchange Server essentially rely on this applicationas a key to the success of the business. F5 helps protect the investment in the application,minimizing the initial negative impact on the ROI of a new application deployment due toissues outside of its control.F5 enhances application security for Exchange Server 2010Providing security specific to an application deployment is an essential component oflaunching and maintaining a new application. Security personnel must work closely withthe network and application teams to ensure the successful and secure deployment of anapplication, especially one like Microsoft Exchange which is often used by all employees, allday, every day. F5 has a number of ways to help proactively reduce threats, and increase thesecurity of Exchange 2010 deployments.Security for (and from) remote usersFor remote users who might be trying to access Microsoft Office Outlook or Outlook WebApp from an airport kiosk or other unknown device, F5’s comprehensive endpoint securityprovides the best possible protection for remote users. This solution includes a customizable5

APPLICATION READY SOLUTION GUIDEMicrosoft Exchange Server 2010policy engine for defining Microsoft Exchange access, authentication, and authorizationacross users, devices and network locations. This helps organizations define and enforce arobust security posture for Exchange – including difficult to secure mobile devices.F5 technology prevents infected PCs, hosts, or users from connecting to your network andthe applications inside, and delivers a Secure Virtual Workspace, pre-login endpoint integritychecks, and endpoint trust management. And when the remote user has finished theirsession with Outlook or Outlook Web App, F5’s post logon security protects against sensitiveinformation being left on the client. F5 can impose a cache-cleaner to eliminate any userresidue such as browser history, forms, cookies, auto-complete information and more. Postlogon security can also be configured to close desktop search applications so nothing isindexed during the session. Post logon actions are especially important when allowing nontrusted machines access without wanting them to take any data with them after the session.F5 helps protect your Exchangedeployment from applicationspecific attacks that can passthrough traditional firewalls.Exchange 2010 ClientsFirewallInternetClient Access ServersBIG-IP ApplicationSecurity ManagerBotnet/HackerSecure data over the WANWith F5, all data can be symmetrically encrypted between local and remote F5 devices,providing a new way to ensure site-to-site data security by preventing clear text from beingpassed on the wire. This secure connection, or tunnel, also improves transfer rates, reducesbandwidth, and offloads applications for more efficient WAN communication. And F5 canperform Exchange DAG replication across data centers inside this encrypted tunnel for securemailbox replication for the entire mailbox store.F5 message security increases protectionF5’s message security offering provides an additional layer of protection for Exchange 2010deployments. Spam email can contain virus attachments and other malicious content, likephishing attempts and Trojan attacks. The F5 solution leverages reputation data from theMcAfee TrustedSource multi-identity reputation engine to accurately filter email. Byeliminating 70% of unwanted email before it even reaches the Exchange Servers, F5 greatlyreduces the chance that an unwanted and potentially dangerous email gets through to theExchange 2010 servers.Security from known and unknown attacksF5 security devices report previously unknown threats (such as brute force attacks andzero-day web application attacks) and mitigate web application threats, shielding theorganization from data breaches. Our full inspection and event-based policies deliver a greatlyenhanced ability to search for, detect, and apply numerous rules to block known L7 attacks.F5 makes security compliance easy and saves valuable IT time by enabling the exporting ofpolicies for use by offsite auditors. Auditors working remotely can view, select, review, andtest policies, without requiring critical time and support from the web application securityadministrator.6

APPLICATION READY SOLUTION GUIDEMicrosoft Exchange Server 2010Not only does F5 provide comprehensive, best-in-class application security for protectingExchange, but we have the only Application Delivery Controller certified as a networkfirewall. We help make sure your Microsoft Exchange Server deployment, and the informationit contains, remains secure.Providing unified security enforcement and access control for Exchange 2010Security is essential to an application deployment, but the act of enforcing security policiesand controlling access to applications is equally important. F5 universal security enforcementand access control centralizes web single sign on and access control services, and can workwith Microsoft Exchange 2010 to ensure an extremely high level of protection for, and from,remote users, regardless of end user, client type, application, access network or networkresources. With F5, you can converge and consolidate remote access, LAN access, andwireless connections within a single management interface, and providing easy-to-manageaccess policies, helping you free up valuable IT resources and scale cost-effectively.Not only does F

Microsoft Exchange Server 2010 1 F5 enables secure, agile, and optimized Exchange Server 2010 deployments Microsoft Exchange Server is the undisputed industry leader in corporate messaging. Microsoft Exchange Server 2010 provides businesses with email, calendar, and contacts on the PC, phone and web, so employees can stay connected and in sync.

Related Documents:

Installing Exchange Server 2019 on Windows Server Core 2019 (optional) After completing this module, students will be able to: Describe the key features and functionality of Exchange Server. Describe the Exchange Server architecture. Describe the requirements and options for deploying Exchange Server. Deploy Exchange Server.

F5 Solutions for Exchange Server 2010 The F5 solutions for Exchange Server 2010 focus on providing security, availability, acceleration, and secure remote access to internal and external users of Exchange Server 2010. It is designed to simplify the process of scaling out Exchange Server 2010 based on Microsoft recommendations for highly available

Microsoft Exchange 2010 Client Access servers and Edge Transport servers. This guide does not explain Microsoft Exchange server deployment or the components in the Client Access server or Edge Transport server deployments. Be sure to follow the Microsoft Exchange 2010 Planning guide to deploy the Exchange components.

Welcome to the F5 and Microsoft Exchange 2010 and 2013 Client Access Server deployment guide. Use this document for guidance on configuring the BIG-IP system version 11 and later to provide additional security, performance and availability for Exchange Server 2010 and Exchange Server 2013 Client Access Servers.

Listing Exchange Exchange Exchange Exchange); Exchange Exchange listing Exchange Exchange listing. Exchange Exchange. Exchange ExchangeExchange Exchange .

Amazon Web Services – Implementing Microsoft Exchange Server 2010 in the AWS Cloud July 2013 Page 1 of 31 Microsoft Exchange Server 2010 in the AWS loud: . affordable and fault-tolerant manner. By deploying a high-availability and site-resilient Exchange Server

Microsoft SQL Server OLAP Client 2000 SP4 Microsoft SQL Server Analysis Services 2005 SP11 Microsoft SQL Server OLAP Client 2005 SP1 Microsoft SQL Server Analysis Services 2005 SP21 Microsoft SQL Server OLAP Client 2005 SP2 Microsoft SQL Server Analysis Services 20082 Microsoft SQL Server 2008

ALEX RIDER www.anthonyhorowitz.com. Never Say Die Exclusive Extract The start of another day. Alex went into the bathroom, showered and cleaned his teeth. Then he got dressed. He had started school a week ago, arriving at the start of the fall semester – the autumn term, he would have called it back in London. There was no uniform at the Elmer E. Robinson High School. Today, Alex threw on .