Applies to: Exchange Server 2013

Topic Last Modified: 2013-02-19

Microsoft Exchange Server 2013 supports disabling TLS for SMTP communication between Mailbox servers in certain topologies where WAN Optimization Controller (WOC) devices that compress SMTP traffic are used.

This topic provides step-by-step instructions on how to configure the Transport service in your affected Mailbox servers to disable TLS, and to ensure your Active Directory routing topology is configured to correctly route messages. To learn more about this scenario, see Scenario: Configure Exchange to Support WAN Optimization Controllers.

What do you need to know before you begin?

  • Estimated time to complete this task: 60 minutes.

  • Even though individual configuration steps within this scenario can be accomplished with lesser rights, to complete the entire end-to-end scenario tasks, your account needs to be a member of the Organization Management role group.

  • Make sure you disable TLS only on connections that pass through WOC devices.

  • This procedure requires that Exchange 2013 is deployed in multiple Active Directory sites, with at least one site connected to the other sites over a WAN link.

  • This procedure requires that WOC devices are deployed to compress SMTP traffic over the WAN link.

  • This procedure requires that a logical message flow path exists for Exchange going over the WAN link that has the WOC devices deployed.

  • For information about keyboard shortcuts that may apply to the procedures in this topic, see Keyboard Shortcuts in the Exchange Admin Center.

Tip:
Having problems? Ask for help in the Exchange forums. Visit the forums at: Exchange Server, Exchange Online, or Exchange Online Protection

What do you want to do?

Step 1: Use the Shell to configure the Transport service on the Mailbox server to use downgraded Exchange Server authentication

To configure the Transport service on a Mailbox server to use downgraded Exchange server authentication, run the following command:

Copy Code
Set-TransportService <ServerIdentity> -UseDowngradedExchangeServerAuth $true

This example makes this configuration change on the server named Mailbox01.

Copy Code
Set-TransportService Mailbox01 -UseDowngradedExchangeServerAuth $true

Step 2: Create a dedicated Receive connector on the Mailbox server for the target Active Directory site

Use the EAC to create the Receive connector

  1. In the Exchange admin center (EAC), click Mail flow > Receive connectors, and then click Add Add Icon.

  2. On the first page of the New Receive connector wizard, enter the following values

    • Name   Enter a descriptive value.

    • Type   Internal

    When you are finished, click Next.

  3. On the second page of the New Receive connector wizard, in the Remote settings section, enter the IP addresses or IP address ranges for the target Active Directory site. When you are finished, click Finish.

Use the Shell to create the Receive connector

To create a Receive connector on the Mailbox server, run the following command:

Copy Code
New-ReceiveConnector -Name <Name> -Server <ServerIdentity> -RemoteIPRanges <IPAddressRange> -Internal

This example creates the Receive connector named WAN on server named Mailbox01 with the following settings:

  • The RemoteIPRanges parameter is set to 10.0.2.0/24. This IP address range should correspond to the remote Active Directory site from where this Receive connector will receive unencrypted connections. If there's more than one IP subnet in the remote site, you can enter them all separated by commas.

  • The usage type is set to Internal.

Copy Code
New-ReceiveConnector -Name WAN -Server Hub01 -RemoteIPRanges 10.0.2.0/24 -Internal

Step 3: Use the Shell to disable TLS on the dedicated Receive connector

To disable TLS on the Receive connector, run the following command:

Copy Code
Set-ReceiveConnector <ReceiveConnectorIdentity> -SuppressXAnonymousTLS $true

This example disables TLS on the Receive connector named WAN on Mailbox server named Mailbox01.

Copy Code
Set-ReceiveConnector Mailbox01\WAN -SuppressXAnonymousTLS $true

Step 4: Use the Shell to designate the Active Directory sites as hub sites

To designate an Active Directory site as a hub site, run the following command:

Copy Code
Set-AdSite <ADSiteIdentity> -HubSiteEnabled $true

You need to perform this procedure once in each Active Directory site that has Mailbox servers that participate in non-encrypted traffic.

This example configures the Active Directory site named Central Office Site 1 as a hub site.

Copy Code
Set-AdSite "Central Office Site 1" -HubSiteEnabled $true

Step 5: Use the Shell to configure the least cost routing path through the WAN connection

Depending on how the IP site link costs are configured in Active Directory, this step may not be necessary. You need to verify that the network link with the WOC devices deployed is in the leastcost routing path. To view the Active Directory site link costs, and the Exchange-specific site link costs, run the following command:

Copy Code
Get-AdSiteLink

If the network link with the WOC devices deployed isn't on the least cost routing path, you'll need to assign an Exchange-specific cost to the particular IP site link to ensure messages are routed correctly. To learn more about this particular issue, see the "Configure Exchange-specific Active Directory site link costs" section in Scenario: Configure Exchange to Support WAN Optimization Controllers.

This example configures an Exchange-specific cost of 15 on the IP site link named Branch Office 2-Branch Office 1.

Copy Code
Set-AdSiteLink "Branch Office 2-Branch Office 1" -ExchangeCost 15