Microsoft does not support restricting communication with a firewall (hardware or software) between Exchange Servers.
On a side note I have always hated software firewalls. If someone gets through your external hardware firewalls and into your internal network, a software firewall won't help much :)
They don;t support restricting anything between Exchange Servers:
-
We do not support restricting or altering network traffic between internal Exchange servers, between internal Exchange servers and internal Lync or Skype for Business servers, or between internal Exchange servers and internal Active Directory domain controllers in any and all types of topologies. If you have firewalls or network devices that could potentially restrict or alter this kind of network traffic, you need to configure rules that allow free and unrestricted communication between these servers (rules that allow incoming and outgoing network traffic on any portincluding random RPC portsand any protocol that never alter bits on the wire).
From Outlook to Exchange 2013 you only need port 443
Yes, thank you, I understand that, but with all due respect, this isn't my concern. As I mentioned, I would like to allow full communication between the Exchange servers but my challenge is that to do so, each adapter on each of the Exchange servers must be uniquely identified by either an IPv4 address or MAC address. What appears to be happening is that some traffic, especially the cluster traffic between the virtual cluster adapters, is being passed as IPv6 which is not something I can use to make the firewall exception. I tried using the MAC address and that worked initially but the exception stopped working because the MAC address for the cluster virtual adapter seems to have changed, therefore breaking my exception. I am trying to avoid retaining the allow all traffic from all hosts on all adapters rule that I had to create to compensate for the apparent dynamic MAC address.
Unfortunately, after testing, it seems to be too unreliable to do anything but allow all. This may simply be a Symantec issue at this point and, right now, I too am hating at least this Symantec software firewall... This isn't optimal and I don't believe it to be very secure but I need this to work so I guess I have to leave the big hole punched and hope that Microsoft has done a good job with locking down the OS and Exchange.
'...and hope that Microsoft has done a good job with locking down the OS and Exchange."
I think you can feel confident they have. I know I do. And I would be honest if I had any concerns.
Hi,
Static IPv6 addresses are supported by Windows Server and the Cluster service. However, using static IPv6 addresses goes against best practices. Exchange 2013 doesn't support the configuration of static IPv6 addresses during setup.
Failover clusters support Intra-site Automatic Tunnel Addressing Protocol (ISATAP). They support only IPv6 addresses that allow for dynamic registration in DNS. Link local addresses can't be used in a cluster.
For more information about DAG network requirements, see the "Network requirements" section in Planning for high availability and site resilience.
Regards,
- Proposed as answer by Chetan Savade 17 hours 53 minutes ago
- Edited by Scott_42 17 hours 14 minutes ago
- Edited by Scott_42 Wednesday, July 29, 2015 2:17 PM
Hi,
I hope you have gone through this article:
Installing the Symantec Endpoint Protection client to a Windows cluster server
Regards,
CHETAN