Logo
Windows XP
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
PREGNANCY
 
 
Windows Server

Microsoft Exchange Server 2010 : Working with SMTP Connectors, Sites, and Links (part 7) - Viewing and Managing Receive Connectors

2/24/2014 12:32:39 AM

9. Viewing and Managing Receive Connectors

To view all available Receive connectors for a server, do one of the following in the Exchange Management Console:

  • On a Hub Transport server, expand the Server Configuration node and then click the server you want to work with in the main pane.

  • On an Edge Transport server, select Edge Transport and then click the server you want to work with.

On the Receive Connectors tab in the details pane, Receive connectors are listed by name and status. You can now

  • Change a connector's properties To change a connector's properties, right-click the connector, and then select Properties. Use the Properties dialog box to manage the connector's properties.

  • Enable a connector To enable a connector, right-click it, and then select Enable.

  • Disable a connector To disable a connector, right-click it, and then select Disable.

  • Remove a connector To remove a connector, right-click it, and then select Remove.

When configuring Receive connector properties, you can specify the security mechanisms that can be used for incoming connections on the Authentication tab. Use any combination of the following:

  • Transport Layer Security Allows encrypted authentications with TLS for servers with smart cards or X.509 certificates.

  • Enable Domain Security (Mutual Auth TLS) When TLS is enabled, you can also enable domain security to require mutual authentication.

  • Basic Authentication Allows basic authentication. With basic authentication, the user name and password specified are passed as base64-encoded text to the remote domain.

  • Offer Basic Authentication Only After Starting TLS Allows basic authentication only within an encrypted TLS session.

  • Exchange Server Authentication Allows secure authentication for Exchange servers. With Exchange Server authentication, credentials are passed securely.

  • Integrated Windows Authentication Allows secure authentication using NT LAN Manager (NTLM) or Kerberos.

  • Externally Secured Allows secure external authentication. With externally secured authentication, credentials are passed securely using an external security protocol for which the server has been separately configured, such as IPsec.

Also when configuring Receive connector properties, you can specify the security group that is allowed to connect on the Permission Groups tab. Use any combination of the following:

  • Anonymous Users Allows unauthenticated, anonymous users to connect to the Receive connector.

  • Exchange Users Allows connections by authenticated users who are valid recipients in the organization (Hub Transport servers only).

  • Exchange Servers Allows connections by authenticated servers that are members of the Exchange Server Administrator group.

  • Legacy Exchange Servers Allows connections by authenticated servers that are members of the ExchangeLegacyInterop group (Hub Transport servers only).

  • Partners Allows connections by authenticated servers that are members of partner domains, as listed on the TLS Receive Domain Secure list.

In the Exchange Management Shell, you can view, update, or remove Receive connectors using the Get-ReceiveConnector, Set-ReceiveConnector, or Remove-ReceiveConnector cmdlets, respectively. Samples Example 10 through Example 12 provide the syntax and usage. With Get-ReceiveConnector, you can return a list of all available Receive connectors if you don't specify an identity or server. If you want to see only the Receive connectors configured on a particular server, use the –Server parameter.

Example 10. Get-ReceiveConnector cmdlet syntax and usage

Syntax

Get-ReceiveConnector [-Identity Server\ConnectorIdentity]
[-Server Server] [-DomainController DCName]


Usage

Get-ReceiveConnector

Get-ReceiveConnector -Identity "Corpsvr127\Adatum.com Receive Connector"

Get-ReceiveConnector -Server "Corpsvr127"

Example 11. Set-ReceiveConnector cmdlet syntax and usage

Syntax

Set-ReceiveConnector -Identity Identity
[-AdvertiseClientSettings <$true | $false>]
[-AuthMechanism <None | Tls | Integrated | BasicAuth |
BasicAuthRequireTLS | ExchangeServer | ExternalAuthoritative>]
[-Banner Banner]
[-BinaryMimeEnabled <$true | $false>]
[-Bindings Bindings]
[-ChunkingEnabled <$true | $false >]
[-Comment Comment]
[-Confirm <$true | $false >]
[-ConnectionInactivityTimeout TimeSpan]
[-ConnectionTimeout TimeSpan]
[-DefaultDomain DefaultDomain]
[-DeliveryStatusNotificationEnabled <$true | $false>]
[-DomainController DCName]
[-DomainSecureEnabled <$true | $false>]
[-EightBitMimeEnabled <$true | $false>]
[-EnableAuthGSSAPI <$true | $false>]
[-Enabled <$true | $false>]
[-EnhancedStatusCodesEnabled <$true | $false>]
[-Fqdn FQDN]
[-LongAddressesEnabled <$true | $false>]
[-LiveCredentialEnabled <$true | $false>]
[-MaxAcknowledgementDelay MaxDelay]
[-MaxHeaderSize MaxHeaderBytes]
[-MaxHopCount MaxHops]
[-MaxInboundConnection <MaxConn | Unlimited>]
[-MaxInboundConnectionPercentagePerSource MaxPercentage]
[-MaxInboundConnectionPerSource <MaxConnPerSource | Unlimited>]
[-MaxLocalHopCount MaxHops]
[-MaxLogonFailures MaxLogonFailures]
[-MaxMessageSize MaxMessageSize]
[-MaxProtocolErrors <MaxErrors | Unlimited>]
[-MaxRecipientsPerMessage MaxRecipients]
[-MessageRateLimit <RateLimit | Unlimited>]
[-MessageRateSource <None | User | IPAddress | All>]
[-Name Name]
[-OrarEnabled <$true | $false>]
[-PermissionGroups <None | AnonymousUsers | ExchangeUsers |
ExchangeServers | ExchangeLegacyServers | Partners | Custom>]
[-PipeliningEnabled < $true | $false>]
[-ProtocolLoggingLevel <None | Verbose>]
[-RemoteIPRanges IPRange1, IPRange2, . . .]
[-RequireEHLODomain <$true | $false>]
[-RequireTLS < $true | $false>]
[-Server Server]
[-SizeEnabled <Disabled | Enabled | EnabledWithoutValue>]
[-SuppressXAnonymousTls < $true | $false>]
[-TarpitInterval TimeSpan]


Usage

Set-ReceiveConnector -Identity "Corpsvr127\Custom Receive Connector"
-Bindings "0.0.0.0:425"
-Fqdn "mailserver85.cpandl.com"
-RemoteIPRanges "0.0.0.0-255.255.255.255"

Example 12. Remove-ReceiveConnector cmdlet syntax and usage

Syntax

Remove-ReceiveConnector -Identity ConnectorIdentity
[-Confirm <$true | $false >]
[-DomainController DCName]


Usage

Remove-ReceiveConnector -Identity "CorpSvr127\Adatum.com Receive
Connector"
Other -----------------
- Administering an Exchange Server 2013 Environment (part 9) - Server Administration
- Administering an Exchange Server 2013 Environment (part 8) - Understanding Archiving
- Administering an Exchange Server 2013 Environment (part 7) - Understanding Journaling
- Administering an Exchange Server 2013 Environment (part 6) - Introduction to Role Based Access Control
- Administering an Exchange Server 2013 Environment (part 5) - Performing Common Tasks - Creating Multiple Mailboxes in the Exchange Management Shell
- Administering an Exchange Server 2013 Environment (part 4) - Performing Common Tasks - Creating User Mailboxes
- Administering an Exchange Server 2013 Environment (part 3) - Exchange Management Shell
- Administering an Exchange Server 2013 Environment (part 2) - Exchange Administration Center - Overview of the Exchange Administration Center
- Administering an Exchange Server 2013 Environment (part 1) - Exchange Administration Center - Accessing the Exchange Administration Center
- Windows Server 2012 Administration : Managing Printers with the Print Management Console (part 3) - Using the Print Management Console
- Windows Server 2012 Administration : Managing Printers with the Print Management Console (part 2) - Adding New Printers as Network Shared Resources
- Windows Server 2012 Administration : Managing Printers with the Print Management Console (part 1) - Configuring the Print Management Console
- Windows Server 2008 : Configuring Server Core after Installation (part 4) - Setting the Time, Date, and Time Zone , Joining a Domain
- Windows Server 2008 : Configuring Server Core after Installation (part 3) - Logging Off, Shutting Down, and Rebooting
- Windows Server 2008 : Configuring Server Core after Installation (part 2) - Restoring the Command Prompt , Renaming the Computer
- Windows Server 2008 : Configuring Server Core after Installation (part 1) - Installing Server Core
- Microsoft Exchange Server 2010 : Introducing Journaling - Implementing Journaling, Reading Journal Reports
- Microsoft Exchange Server 2010 : Setting Up Transport Rules (part 5) - Creating New Rules with the Exchange Management Shell
- Microsoft Exchange Server 2010 : Setting Up Transport Rules (part 4) - Creating New Rules with the Exchange Management Console
- Microsoft Exchange Server 2010 : Setting Up Transport Rules (part 3) - Selecting Actions
 
 
Most view of day
- Managing Windows Small Business Server 2011 : Adding a Terminal Server (part 1)
- Designing and Configuring Unified Messaging in Exchange Server 2007 : Monitoring and Troubleshooting Unified Messaging (part 2) - Performance Monitors
- System Center Configuration Manager 2007 : Operating System Deployment - Site Systems
- Maintaining Desktop Health : Understanding Windows Error Reporting (part 3) - Architecture of Windows Error Reporting, Configuring Windows Error Reporting
- Microsoft Systems Management Server 2003 : Analysis and Troubleshooting Tools - Working with Status Messages (part 1) - Viewing Site Status Messages
- Collaborating Within an Exchange Environment Using Microsoft Office SharePoint Server 2007 : Understanding the History of SharePoint Technologies, Identifying the Need for MOSS 2007
- Automating Vista Events
- SharePoint 2010 : Packaging and Deployment Model - Features (part 3) - Upgrading Features
- BizTalk Server 2006 : Pipeline Component Best Practices and Examples - Using PGP (part 2) - PGP Decode Component
- Microsoft Dynamics Ax 2009 : RunBase Framework Extension (part 1) - Property Method Pattern, Pack-Unpack Pattern
Top 10
- BizTalk 2006 : Creating More Complex Pipeline Components (part 4) - Custom Disassemblers
- BizTalk 2006 : Creating More Complex Pipeline Components (part 3) - Validating and Storing Properties in the Designer
- BizTalk 2006 : Creating More Complex Pipeline Components (part 2) - Schema Selection in VS .NET Designer
- BizTalk 2006 : Creating More Complex Pipeline Components (part 1) - Dynamically Promoting Properties and Manipulating the Message Context
- BizTalk 2006 : Custom Components (part 2) - Key BizTalk API Objects
- BizTalk 2006 : Custom Components (part 1) - Component Categories, Component Interfaces
- Microsoft Access 2010 : Enhancing the Queries That You Build - Ordering Query Results, Refining a Query by Using Criteria
- Microsoft Access 2010 : Enhancing the Queries That You Build - Everything You Need to Know About Query Basics
- Microsoft Exchange Server 2010 : Getting Started with Email Archiving - Enabling Archiving (part 2) - Using Exchange 2010 Discovery, Offline Access
- Microsoft Exchange Server 2010 : Getting Started with Email Archiving - Enabling Archiving (part 1) - Archive Quotas , Exchange 2010 Discovery Operation Considerations
 
 
Windows XP
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
2015 Camaro