programming4us
           
 
 
Applications Server

Configuring a Microsoft Exchange Server 2003 Infrastructure : Front-End and Back-End Servers

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
10/24/2010 4:07:07 PM

Front-End and Back-End Architecture

Having a front-end and back-end architecture allows you to manage Internet access protocols on a server that is separate from servers where mailbox and public folder stores are located. By splitting the functionality between servers, front-end servers handle incoming client connections while back-end servers are dedicated to running the mailbox and public folder stores.

All front-end and back-end servers must be in the same Active Directory forest. With Exchange 2000 Server, front-end servers were required to run the Enterprise Edition, but Exchange Server 2003, Standard Edition, supports configuration as a front-end server. A characteristic of, and in fact a requirement of, front-end servers is that they cannot host any mailboxes or public folders—in other words, no mailbox or public folder stores.

Benefits of Front-End and Back-End Architecture

Front-end and back-end architecture provides the following benefits:

  • Unified namespace In a large organization with many Exchange servers, using front-end servers simplifies the administration. The primary advantage of front-end and back-end server architecture is the ability to have a single, consistent namespace through which users can access their mailboxes when there is more than one server (for example, http://www.contoso.com/exchange for Outlook Web Access). Users do not need to know the names of the servers that store their mailboxes, and if you want to move users’ mailboxes from one server to another, there is no need to reconfigure the client computers.

  • Reduced overhead for SSL When connections are made using Secure Sockets Layer (SSL), information is encrypted and decrypted, which is processor-intensive and can negatively affect server performance. In a front-end and back-end configuration, the front-end server can process the encryption with the client, and the front-end server and back-end servers communicate without the overhead of SSL encryption. The result is improved performance and a greater number of users that can be supported than if you were using a single server.

  • Firewalls You can place the back-end server behind a firewall that is configured to allow only traffic from the front-end server. You can also place the front-end server on or behind an Internet firewall that is configured to allow Internet traffic only to the front-end server; the front-end server provides an additional layer of security because it does not contain user information. You can also configure the front-end server to authenticate requests before sending them to the back-end server; this configuration protects back-end servers from most denial of service (DoS) attacks.

The front-end server does not require much disk storage, but it should have a fast central processing unit (CPU) and a large amount of memory. If you enable SMTP on the front-end server, you should back up the hard disks because SMTP commits queued mail to the local disk. In addition, if the front-end server faces the Internet and accepts messages from Internet users, ensure that you have adequate virus scanning installed on the server.

Tip

To increase performance, you can use an SSL accelerator card on the front-end server, or you can position an external SSL accelerator device between the clients and the front-end server. If you have a small number of front-end servers, an SSL accelerator card is simple and cost-effective. For a large number of servers, an external accelerator is more cost-effective because you need to store and configure an SSL certificate only once.


Front-End and Back-End Scenarios

The following are scenarios in which front-end and back-end architecture is commonly used.

Standard Front-End and Back-End Topology

To maintain a single namespace for e-mail servers while distributing users among several servers, you could designate a single server as a front-end server and have several back-end mailbox servers. In this scenario, you direct HTTP, POP3, and IMAP4 users to the front-end server and ensure that all virtual servers and virtual directories on the front-end server are configured identically on the back-end servers. By doing this, you could supply all external users with a common mail server name to access without having to worry about which server actually holds an individual’s mailbox. The front-end server would communicate with the back-end server to find the appropriate mailbox and transfer message data as necessary.

Front-End Server Behind the Firewall

One of the biggest benefits of a front-end and back-end architecture is with respect to making e-mail services available to Internet-based users. A common e-mail service that Exchange Server provides is Outlook Web Access (OWA), which integrates with IIS to make user mailboxes and public folders available to users by accessing them through a Web browser. To achieve security and still provide access to OWA, POP3, or IMAP4 from the Internet, you can place the Exchange organization behind the corporate firewall. At a minimum, the firewall must use port filtering to protect the front-end server from the Internet. If your firewall solution supports Internet Protocol (IP) address filtering, you should configure IP address filtering to accept requests that are directed to the front-end server and to block requests that are directed to other servers in the organization. By using this type of configuration, external users are unable to connect to anything except the specific mail ports on the front-end server and are unable to access the back-end servers (or other servers) directly. This provides an additional level of security over the standard front-end and back-end topology.

Load Balancing on the Front-End Server

To provide a single namespace through which users can access mailboxes while avoiding a bottleneck or single point of failure on the front-end server, use Network Load Balancing to spread the load over multiple front-end servers. The load-balancing solution you use should ensure that each user is always sent to the same front-end server for the duration of a session. Network Load Balancing requires the Enterprise Edition of Windows 2000 Server or Windows Server 2003.

Other -----------------
- Configuring a Microsoft Exchange Server 2003 Infrastructure : Mixed Mode and Native Mode
- Configuring a Microsoft Exchange Server 2003 Infrastructure : Administrative and Routing Groups
- Configuring a Microsoft Exchange Server 2003 Infrastructure : Post-Installation Considerations
- Exchange Server 2010 : Troubleshooting Methodology
- Exchange 2007 : Enable Local Continuous Replication
- Exchange 2007 : Choose a High Availability Solution
- Exchange Server 2010 : Planning for Messaging Security
- Exchange Server 2010 : Antivirus Considerations
- Exchange Server 2007: Examine Your Hardware Needs for Unified Messaging
- Exchange Server 2007: Envision Unified Messaging Within Your Environment
- Exchange 2007: Manage Public Folder Databases
- Exchange 2007: How and Why Do I Monitor Online Defragmentation?
- Exchange 2007: How Do I Modify the Messages That Are Sent When Certain Quotas Are Reached?
- Exchange 2007: How Do I Modify a Database Size Limit?
- Exchange Server 2007 : Manage MB Database Properties
- Exchange Server 2007 : Modify Recipient Configuration
- Work with the EMC and the Exchange Management Shell
- Exchange 2007 : Perform a Mailbox Active/Passive Installation
- Exchange 2007 : Install an Edge Transport Server
- Using Exchange 2007 as a Public Folder Replica
 
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
programming4us programming4us