Applies to: Exchange Server 2010 SP3, Exchange Server 2010 SP2
Topic Last Modified: 2012-10-26
Receive connectors represent a logical gateway through which all inbound messages are received. Receive connectors are configured on a per-server basis, and they control how that server receives messages from the Internet, e-mail clients, and other messaging servers.
By default, the Receive connectors required for internal mail flow are automatically created when the Hub Transport server role is installed. Similarly, when you install the Edge Transport server role, the Receive connector capable of receiving mail from the Internet and from Hub Transport servers is automatically created. However, end-to-end mail flow is possible only after the Edge Transport server is subscribed to the Active Directory site by using the Edge Subscription process. Other scenarios, such as an Internet-facing Hub Transport server or an Edge Transport server that doesn't use EdgeSync, require manual connector configuration to establish end-to-end mail flow.
You can use the EMC or the Shell to configure the properties of a Receive connector.
Caution: |
---|
Don't perform this procedure on an Edge Transport server that has been subscribed to the Exchange organization by using EdgeSync. Instead, make the changes on the Hub Transport server. The changes are then replicated to the Edge Transport server next time EdgeSync synchronization occurs. |
Looking for other management tasks related to connectors? Check out Managing Connectors.
Prerequisites
- You must have an existing Receive connector. For detailed steps
about creating a Receive connector, see Create an SMTP Receive
Connector.
- You should determine the specific usage for this Receive
connector so you can correctly configure its properties. To learn
more about Receive connectors, see Understanding Receive
Connectors.
What Do You Want to Do?
Use the EMC to configure the properties of a Receive connector
You need to be assigned permissions before you can perform this procedure. To see what permissions you need, see the "Receive connectors" entry in the Transport Permissions topic.
- If you are configuring a Receive connector on a Hub Transport
server, expand Server Configuration in the console tree, and
select Hub Transport. On an Edge Transport server, select
Edge Transport in the console tree.
- In the work pane, select the Receive Connectors tab, and
then double-click the Receive connector you want to configure.
- Use the
General tab to modify the general properties of the Receive
connector:
- Connector name To rename the connector,
type a new name in the Connector name field, and then click
Apply.
- Connector status This field shows
whether the connector is enabled. You can't change a connector's
status from the properties page. You need to use the Enable
or Disable actions in the EMC or the corresponding Shell
commands. For detailed steps about enabling or disabling Receive
connectors, see Enable or Disable a
Receive Connector.
- Modified This field shows the last date
that the connector settings were modified.
- Protocol logging level Use this
drop-down list to select the protocol logging level. Select
None to turn off protocol logging. Select Verbose to
turn on protocol logging.
- Specify the FQDN this connector will provide in response to
HELO or EHLO This field specifies the fully
qualified domain name (FQDN) that the transport server uses to
identify itself whenever a destination server name is required
during an inbound SMTP connection. To learn more about how the
value of this field is used, see Understanding Receive
Connectors.
- Maximum message size (KB) To set a
maximum message size for messages that can pass through this
connector, select the check box next to Maximum message size
(KB) and enter a value in kilobytes (KB). The valid input range
is from 64 through 2097151 KB. To remove any restriction on
the maximum message size, clear the check box next to Maximum
message size (KB).
- Connector name To rename the connector,
type a new name in the Connector name field, and then click
Apply.
- Use the
Network tab to specify the IP addresses and TCP ports on
which this Receive connector receives connections. You can also
configure the IP address ranges from which this Receive connector
accepts connections. The following options are available:
- Use these local IP Addresses to receive
mail Use this list to specify the IP addresses
and port numbers on which this Receive connector listens for
incoming mail. For each entry, you must specify a different set of
IP addresses or specify all available IP addresses. The following
options are available:
Add To add a new IP address or port number, click Add. The following options are available in the window that appears:
• Use all IP addresses available on this server Select this option to use all IP addresses associated with this computer. This is the recommended option.
• Specify an IP address Select this option to use a specific IP address associated with this computer.
Important: You must specify a local IP address that's valid for the Hub Transport server or Edge Transport server on which the Receive connector is located. If you specify an invalid local IP address, the Microsoft Exchange Transport service may fail to start when the service is restarted.
Edit Click Edit to change an existing IP address or port.
Remove Click to remove an existing IP address.
- Receive mail from remote servers that have these IP
addresses Use this list to specify the
IP address or IP address range from which this Receive
connector accepts connections. To add the remote IP address or
remote IP address range, use one of the following methods:
Add - IP Address To enter an IP address without a subnet mask, or to specify the subnet mask by using Classless Interdomain Routing (CIDR) notation, click Add or the drop-down arrow next to Add and select IP Address. In the Add IP address(es) of Remote Servers dialog box, enter the IP address directly or specify a subnet using the CIDR notation. For example, if you enter 192.168.1.1, the Receive connector accepts messages from that host only, but if you specify 192.168.1.0/24, the Receive connector accepts messages from the entire class C subnet of 192.168.1.0.
Add - IP and Mask To enter an IP address or subnet together with a subnet mask in dotted decimal notation, click the drop-down arrow next to Add and select IP and Mask. In the Add Remote Servers - IP and Mask dialog box, specify the IP address and the subnet mask.
Add - IP Range To specify an IP address range by using the first IP address and the last IP address in the range, click the drop-down arrow next to Add and select IP Range. In the Add Remote Servers - IP Range dialog box, specify the start and end addresses of the IP range.
Edit To edit an existing IP address range, select the IP address range, and then click Edit.
Remove To remove an existing IP address range, select the IP address range, and then click .
- Use these local IP Addresses to receive
mail Use this list to specify the IP addresses
and port numbers on which this Receive connector listens for
incoming mail. For each entry, you must specify a different set of
IP addresses or specify all available IP addresses. The following
options are available:
- Use the
Authentication tab to configure security options for
incoming SMTP connections:
- Transport Layer Security (TLS) Select
this option to offer Transport Layer Security (TLS) transmission
for all messages received by this connector. When you select this
option, the STARTTLS keyword is advertised in the EHLO
response to connecting SMTP servers, and TLS authentication is
accepted.
• Enable Domain Security (Mutual Auth TLS) To instruct this Receive connector to accept a mutual TLS connection from a remote server, select this check box. There are additional configuration steps required before you can enable mutual TLS. For more information about configuring mutual TLS, see Using Domain Security: Configuring Mutual TLS.
- Basic Authentication Select this option
to offer Basic authentication for all mail received by this
connector. When you select Basic Authentication, the
AUTH keyword is advertised in the EHLO response to
connecting SMTP servers, and Basic authentication is accepted.
Because the user name and password are sent in plaintext when Basic
authentication is used, Basic authentication without encryption
isn't recommended.
• Offer Basic Authentication only after starting TLS When you select this option, the connector starts TLS first, and then after TLS encryption is complete, the connector offers Basic authentication.
- Exchange Server authentication Select
this option to authenticate by using an Exchange authentication
mechanism, such as TLS direct trust or Kerberos through TLS.
- Integrated Windows
authentication Select this option to use
Integrated Windows authentication, which represents NTLM, Kerberos,
and Negotiate authentication mechanisms.
- Externally Secured (for example, with
IPsec) Use this option if the incoming
connections to this Receive connector are secured by external
means. For example, use this option if the connection is physically
secured over a private network or by using Internet Protocol
security (IPsec). When you select this option, you make an
assertion of external security that can't be programmatically
verified by Exchange. Before you select this authentication method,
you must first select the Exchange servers permissions group
on the Permission Groups tab.
- Transport Layer Security (TLS) Select
this option to offer Transport Layer Security (TLS) transmission
for all messages received by this connector. When you select this
option, the STARTTLS keyword is advertised in the EHLO
response to connecting SMTP servers, and TLS authentication is
accepted.
- Use the
Permission Groups tab to select the permission groups
assigned to this Receive connector. A permission group is a
predefined set of permissions granted to well-known groups of
users, computers, or security groups. Members of the selected
permission groups on this tab are allowed to submit messages to
this Receive connector.
Important: When selected on this tab, each permission group is granted a different set of permissions. For example, members of the Exchange users permission group are granted the ms-Exch-Bypass-Anti-Spam extended right whereas anonymous users aren't. To see a complete list of extended rights granted to each permission group, see "Permission Groups" in Understanding Receive Connectors.
- Anonymous users Non-authenticated
users
- Exchange users Authenticated user
accounts
- Exchange servers Members of the
Exchange Servers universal security group
- Legacy Exchange servers Members of the
ExchangeLegacyInterop universal security group
- Partners Partner service accounts
- Anonymous users Non-authenticated
users
Use the Shell to configure the properties of a Receive connector
You need to be assigned permissions before you can perform this procedure. To see what permissions you need, see the "Receive connectors" entry in the Transport Permissions topic.
You can use the Set-ReceiveConnector cmdlet to modify all available settings for an existing Receive connector. In this example, the following changes are made to the configuration of the Receive connector Connection from Contoso.com:
- Change the maximum message size allowed on the connector to
50 megabytes (MB).
- Enable protocol logging on the Receive connector.
- Set the tarpitting interval.
Copy Code | |
---|---|
Set-ReceiveConnector "Connection from Contoso.com" -MaxMessageSize 50MB -ProtocolLoggingLevel Verbose |
The values that you specify by using the Set-ReceiveConnector cmdlet parameters replace the existing values configured on the Receive connector. This isn't an issue for single value attributes such as maximum message size, but it can be a problem for multivalued attributes such as remote IP address ranges. To preserve any existing values in a multivalued attribute, you must specify the existing value and any new values that you want to add when you run the Set-ReceiveConnector cmdlet.
For example, assume that you want to add the subnet 10.0.10.0/24 to the IP addresses from which the Connection from Contoso.com Receive connector accepts messages. Currently, this Receive connector is configured to accept messages only from the IP range of 192.168.180.0 to 192.168.180.255. This example does this by specifying the existing value along with the new value being added.
Copy Code | |
---|---|
Set-ReceiveConnector "Connection from Contoso.com" -RemoteIPRanges "10.0.10.0/24","192.168.180.0-192.168.180.255" |
If you have numerous values for a multivalued property, you may not want to retype all of the values just to add another value. Instead, you can use temporary Shell variables. This example also adds the 10.0.10.0/24 subnet to the remote IP ranges of the Connection from Contoso.com connector using the temporary variable $ConnectorConfiguration.
Copy Code | |
---|---|
$ConnectorConfiguration = Get-ReceiveConnector "Connection from Contoso.com" $ConnectorConfiguration.RemoteIPRanges += "10.0.10.0/24" Set-ReceiveConnector "Connection from Contoso.com" -RemoteIPRanges $ConnectorConfiguration.RemoteIPRanges |
When you specify a tarpitting interval time on a Receive connector, tarpitting is enabled. The default value is 5 seconds, and we recommend that you start at this value. Use caution if you decide to change this value. An overly long interval could disrupt ordinary mail flow, whereas an overly brief interval may not be as effective in thwarting a directory harvest attack. If you change the tarpitting interval value, do it in small increments.
The following example changes the tarpitting interval of the “Connection from Contoso.com” connector by increasing it to 6 seconds.
Copy Code | |
---|---|
Set-ReceiveConnector "Connection from Contoso.com" -TarpitInterval 00:00:06 |
For detailed syntax and configuration information, see Set-ReceiveConnector.