GroupWise SMTP Infrastructure Design:



Similar documents
Linux Server Support by Applied Technology Research Center. Proxy Server Configuration

msuite5 & mdesign Installation Prerequisites

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES

This course is intended for IT professionals who are responsible for the Exchange Server messaging environment in an enterprise.

Network Configuration/Bandwidth Planning Scope

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Firewall Audit Techniques. K.S.Narayanan HCL Technologies Limited

ICANWK501A Plan, implement and test enterprise communication solutions

Server Software Installation Guide

BUILT FOR YOU. Contents. Cloudmore Exchange

Hybrid Architecture. Office 365. On-premises Exchange org (Exchange 2007+) Provisioned via DirSync. Secure Mail flow

Proxies. Chapter 4. Network & Security Gildas Avoine

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Introduction to Computer Security Benoit Donnet Academic Year

Designing a Windows Server 2008 Applications Infrastructure

Troubleshooting BlackBerry Enterprise Service 10 version Instructor Manual

AntiVirus and AntiSpam scanning The Axigen-Kaspersky solution

INTRODUCTION TO FIREWALL SECURITY

Firewalls CSCI 454/554

The Bomgar Appliance in the Network

CMPT 471 Networking II

Novell Access Manager SSL Virtual Private Network

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.

Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam

Load-Balanced Merak Mail Server

MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY. EMEA Webinar July 2013

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab March 04, 2004

Network Management and Monitoring Software

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Fortigate Features & Demo

Microsoft Exchange 2013 Ultimate Bootcamp Your pathway to becoming a GREAT Exchange Administrator

Exhibit B5b South Dakota. Vendor Questions COTS Software Set

Reliable & Secure . Professional, Dependable, Complete Easy to Learn, Use and Grow

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Load Balancing & High Availability

MS Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010

Introduction to the EIS Guide

Guardian Digital Secure Mail Suite Quick Start Guide

Google Apps & Chromebooks for Education Deployment Best Practices

Preparing for GO!Enterprise MDM On-Demand Service

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

BlackBerry Enterprise Server Express System Requirements

8. Firewall Design & Implementation

Microsoft Exchange Server 2007, Upgrade from Exchange 2000/2003 ( /5049/5050) Course KC Days OVERVIEW COURSE OBJECTIVES AUDIENCE

Build Your Knowledge!

MCSA Instructor-led Live Online Training Program. Course Outline MCSA Deploying and Managing Windows Server 2012

Enterprise Buyer Guide

PART D NETWORK SERVICES

SIP Trunking. Cisco Press. Christina Hattingh Darryl Sladden ATM Zakaria Swapan. 800 East 96th Street Indianapolis, IN 46240

10135A: Configuring, Managing, and Troubleshooting Microsoft Exchange Server 2010

Migration Project Plan for Cisco Cloud Security

Deploy Remote Desktop Gateway on the AWS Cloud

5/20/2013. The primary design goal was for simplicity of scale, hardware utilization, and failure isolation. Microsoft Exchange Team

Introduction to the Mobile Access Gateway

Networking and High Availability

Discuss the new server architecture in Exchange Discuss the Client Access server role. Discuss the Mailbox server role

Planning for Windows Server 2008 Servers

Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 Service Pack 2

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 Service Pack 2

Load Balancing Exchange 2007 SP1 Hub Transport Servers using Windows Network Load Balancing Technology

SESA Securing with Cisco Security Appliance Parts 1 and 2

Security Technology: Firewalls and VPNs

To install the SMTP service:

70-662: Deploying Microsoft Exchange Server 2010

Firewall Environments. Name

BlackBerry Enterprise Service 10. Version: Configuration Guide

Interwise Connect. Working with Reverse Proxy Version 7.x

Installation Guide GroupWise 2014 January 2015

ENTERPRISE LINUX NETWORKING SERVICES

Solution Brief FortiMail for Service Providers. Nathalie Rivat

5054A: Designing a High Availability Messaging Solution Using Microsoft Exchange Server 2007

INNOVATE. MSP Services Overview SVEN RADEMACHER THROUGH MOTIVATION

Training Name Installing and Configuring Windows Server 2012

Networking and High Availability

Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 Service Pack 2

Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 Service Pack 2

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

MailEnable Scalability White Paper Version 1.2

5053A: Designing a Messaging Infrastructure Using Microsoft Exchange Server 2007

Chapter 9 Firewalls and Intrusion Prevention Systems

XGENPLUS SECURITY FEATURES...

SSM6437 DESIGNING A WINDOWS SERVER 2008 APPLICATIONS INFRASTRUCTURE

6445A - Implementing and Administering Small Business Server 2008

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls.

QUESTION 1 You deploy a server that has the Exchange Server 2013 Mailbox server role and Client Access server role installed.

GL275 - ENTERPRISE LINUX NETWORKING SERVICES

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

13 Courses Quick Guide

FortiMail Filtering Course 221-v2.2 Course Overview

A Modular Architecture Using Open Source Components

MCSA Objectives. Exam : TS:Exchange Server 2007, Configuring

Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks

74% 96 Action Items. Compliance

AX Series with Microsoft Exchange Server 2010

Transcription:

Managing an Enterprise Series : GWIA configuration and use Lawrence Kearney Enterprise and Workgroup Service Analyst lawrence.kearney@earthlink.net http://www.lawrencekearney.com

Session Agenda Discussion will focus on the technical aspects of design, deployment and configuration Most information applies to large and enterprise size environments Designing and maintaining systems to compete with similar commercial service offerings Maximizing value using basic infrastructure resources 2

A typical enterprise environment Services normally compete for system resources 3

Some common issues with services How well a service does when measured Performance Stability Features Cost of ownership Scaling Security Most importantly, measure against what a service is supposed to be doing 4

Designing a solution Separate different messaging workloads Current messaging service needs are more complex Assessing complexities helps identify tools we can use to design solutions Resolving legacy issues may help keep on-premises systems viable 5

What can we do to improve services? Clever architecture and design choices Service I/O demarcations (QoS really) Service load balancing/management Application redirection/fail over Service high availability and clustering Virtualisation Service hardening Blended solutions are usually both economical and effective 6

Design choices Perimeter relay servers Provide I/O isolation and extend the features of your GWIAs Unsolicited bulk email filtering Anti-virus services Advanced SMTP connection management Enhanced logging Policy based message management Message retention features Auditing and analysis tools Ideally provide fail over, clustering and load balancing features 7

Load balancing Load Balancing Software load balancing DNS round robin Perimeter relay servers GroupWise MTA routing Manual configurations Hardware load balancing Can use service aware intelligence Can be used to implement ACLs Can be used to implement SSL offloading Reverse proxies Can provide a blend of load balancing features 8

Demarcations and QoS Using GroupWise components User domains User post offices Service domains Gateways Identity Manager Service post offices Service post offices System, service and application accounts Mobile messaging connectivity 9

Demarcations and QoS Access Control Lists (ACLs) Prevent unauthorised access to services Can be used to dedicate and optimise resources Can be used to manage thin client access to services Can be implemented at many layers Server firewalls can be used as ACL components 10

Redirection and Failover GroupWise Internet Agent Features Multiple relay hosts for outbound messages 11

Redirection and Failover GroupWise Internet Agent Features Alternate Internet Agents 12

High Availability Clustering and virtualization Service instances versus server and OS instances 13

Redirection and Failover Multiple outbound relay hosts 14

Redirection and Failover Alternate Internet Agents: GWIA MTP Settings 15

Redirection and Failover Alternate Internet Agents: User Domain Settings 16

Redirection and Failover Alternate Internet Agents: Gateway Domain Settings 17

Redirection and Failover Alternate Internet Agents: Gateway Chaining 18

Demarcations and QoS GWIA Access Control SMTP Connection ACL s Implementing Restricted Internet Agents Use to limit inbound access to protocols and connections Required exceptions: Network addresses *@*.* Blank-Sender-User-ID 19

Demarcations and QoS GWIA Access Control 20

Demarcations and QoS GWIA Access Control 21

Demarcations and QoS GWIA Access Control 22

Demarcations and QoS GWIA Access Control 23

General best practices GWIA Configuration 24

Starting at the perimeter Load balancing inbound mail 25

SMTP Services for GroupWise clients Load balancing outbound mail 26

Real World Example System benchmark results: 90 95% reduction in unwanted email at the perimeter Quantifiable delivery performance increases Unscheduled service downtime eliminated Email attachment sizes could be increased without remarkable performance penalties 27

SMTP services for unmanaged clients Unmanaged client examples Thin clients (applications, SQL and PowerShell scripts) Desktop and mobile POP and IMAP clients Other services consuming GroupWise services Blackberry Internet Service (BIS) Gmail Notify Link 28

Issues with unmanaged clients Additional security concerns Data leakage and loss Anti-virus and malware infections Cannot secure or audit third party local message stores Cannot remotely manage or wipe unauthorized devices 29

Unmanaged clients Services for Application clients 30

Services for application clients GWIA Access Control 31

Services for application clients GWIA Access Control 32

Services for application clients GWIA Access Control 33

Services for application clients GWIA Access Control 34

Services for application clients GWIA Access Control 35

Services for application clients GWIA Access Control Technical notes: 36

Services for application clients GWIA Access Control 37

Services for application clients Dedicating resources to application clients 38

If time permits Services for POP and IMAP clients 39

Demarcations and QoS GWIA Access Control 40

Demarcations and QoS GWIA Access Control 41

Demarcations and QoS GWIA Access Control 42

Demarcations and QoS GWIA Configuration Technical Notes: /forceinboundauth and --forceinboundauth switches Requires clients to authenticate before using SMTP services GWIA relay configuration is null for clients that authenticate Minimally SSL connections should be enforced to reduce risks 43

Demarcations and QoS GWIA Access Control SMTP Relay ACL s SMTP Relay truth table 44

Services for POP/IMAP clients What should happen inside your load balancer 45

Services for POP/IMAP clients SuSE Linux server configuration The /etc/suseconfig/susefirewall2 configuration file: FW_SERVICES_EXT_TCP="123 1500 1501 1578 1579 1581 22 389 40193 427 524 5989 636 6901 7100 7102 7180 8008 8009 8028 8030 9850 FW_SERVICES_EXT_UDP="123 427 524 FW_TRUSTED_NETS="10.6.7.13/32,tcp,110 10.6.7.13/32,tcp,143 10.6.7.13/32,tcp,25 10.6.7.14/32,tcp,110 10.6.7.14/32,tcp,143 10.6.7.14/32,tcp,25 10.6.7.15/32,tcp,110 10.6.7.15/32,tcp,143 10.6.7.15/32,tcp,25 10.6.7.10,tcp,8400" 46

Services for POP/IMAP clients 47

Bringing it all together 48

Additional Information Technical and configuration details: GroupWise Best Practices wiki http://wiki.novell.com/index.php/groupwise Architecture and concept details: http://www.lawrencekearney.com/files/openhorizons_issue_15_smtp_onion.pdf 49

Managing an Enterprise Series Thank you for your time and attendance!