Exchange 2016 and network segmentation

AdamTyler-3751 431 Reputation points
2021-04-16T19:43:24.693+00:00

I'd like to confirm the firewall policy requirements around an Exchange 2016 deployment. My goal is to allow only required ports to and from Exchange.

I've found that it is not recommended to restrict any traffic between Domain Controllers and Exchange servers in either direction. It's also a good idea to have more than one Domain Controller within the AD site where the Exchange server resides.

It not recommended to restrict any traffic between Exchange Servers in any AD site.

From clients to Exchange it appears you need only TCP:443, unless you need to run the Exchange tools local on that client, then you need TCP:80. This is only inbound from the client to Exchange server. Yes remote PowerShell is an alternative to this, but let's ignore that for the sake of this conversation.

Are these statements still valid?

If that is still all true, I have a question regarding Domain Controllers in OTHER AD sites. I would venture to guess that Exchange needs no connectivity in/out to these servers?

Regards,
Adam Tyler

Exchange | Exchange Server | Management
{count} votes

3 answers

Sort by: Most helpful
  1. Andy David - MVP 157.8K Reputation points MVP Volunteer Moderator
    2021-04-19T15:28:30.757+00:00

    Hi @AdamTyler-3751 ,
    Its really about support versus what works. You can certainly block those remote DCs with firewall rules and set the Exchange Servers to only use local DCs:

    (Exluding the remote DCs)

    -StaticExcludedDomainControllers

    https://learn.microsoft.com/en-us/powershell/module/exchange/set-exchangeserver?view=exchange-ps

    set-exchangeServer <ex01> -StaticExcludedDomainControllers  <RemoteDC1>, <RemoteDC2>  
    

    If that works and Exchange is fine, do that. If you find it doesn't work , undo it.

    The support issue comes if you open a ticket and then support determines the issue is because Exch is trying to contact a Remote DC , then they will tell you what you are doing is not suported. :)

    1 person found this answer helpful.

  2. Ashok M 6,846 Reputation points
    2021-04-17T08:42:54.99+00:00

    Hi @AdamTyler-3751 ,

    As you have stated, yes, its not recommended to restrict firewall ports between Exchange servers and Domain controllers. This includes domain controllers in other sites as well. This is because the exchange will get the list of all domain controllers and keep a track of reachability/SACL rights, etc. Event ID 2080 provides more details. Lets assume there is only one domain controller in the Exchange server site and in an event if that goes down, exchange should be able to communicate with the other domain controllers which are listed as out of site in event 2080. Thus, it has to be allowed.

    88743-image.png

    https://learn.microsoft.com/en-us/exchange/troubleshoot/administration/msexchangedsaccess-event-id-2080

    Also, for the clients, SMTP/IMAP/POP protocol ports to be allowed.

    https://learn.microsoft.com/en-us/exchange/plan-and-deploy/deployment-ref/network-ports?view=exchserver-2016#network-ports-required-for-clients-and-services

    If the above suggestion helps, please click on "Accept Answer" and upvote it.


  3. Joyce Shen - MSFT 16,701 Reputation points
    2021-04-19T06:02:14.65+00:00

    Hi @AdamTyler-3751

    Do suggestions above from AshokM help? We could also refer to the discussion in below thread about Exchange 2013 firewall ports

    And a previous article introduces the relationship between Exchange and firewall for your reference as well: https://techcommunity.microsoft.com/t5/exchange-team-blog/exchange-firewalls-and-support-8230-oh-my/ba-p/595710


    If an Answer is helpful, please click "Accept Answer" and upvote it.

    Note: Please follow the steps in our documentation to enable e-mail notifications if you want to receive the related email notification for this thread.

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.