Exchange 2013/2016/2019: Configure your receive connectors correctly

As an Exchange admin managing different versions of Exchange, you may have first noticed that on Exchange 2010 you had two receive connectors. They were:

  • Client [ServerName]
  • Default [ServerName]

We not going to deep dive into each option. Instead, here is a high-level overview: On the “client” you can specify your EHLO name and on the “default” you can select the option for the anonymous relay so you could receive email from the Internet. This was not so complicated, was it?

But Exchange 2013 came along and you got more than just two receive connectors. Now you had five per server and this started confusing admins a bit. Which one do I configure for anonymous email as I cannot receive email from the Internet?

As you can see, you still have the client frontend and default but you have client proxy, default frontend, and outbound proxy. Exchange 2016 and Exchange 2019 have the same setup.

Breaking mail flow

Now what admins ended up doing is fiddling with the default frontend and adding/removing IPs, and this, in turn, breaks mail flow on Exchange 2013, Exchange 2016, and Exchange 2019. Microsoft advises that you need to leave the default frontend connector alone and if you want to add anything, create a new receive connector and modify it.

If you want applications to be able to relay within your organization, create a new receive connector as per the instructions below and configure it to allow printers or applications that need to use no authentication to be able to send email. Adding in the IP addresses of these printers/applications will allow them to relay anonymously to Exchange to send mail. You don’t want to open up the relay to the Internet as then hackers will hijack your connection and eventually you will get blacklisted for spam.

Create a custom receive connector

OK, so let’s go and create a custom receive connector. In the Exchange Admin Center (EAC), click on Mail Flow on the left and then click on Receive Connectors on the top right-hand side. This will bring up all servers in the environment. Click the drop-down menu to select the hub server you would like to create the connector on. Once you have done that, now click on the + button to create a connector. You should see a window as per below:

Select Frontend Transport as your role as you are not creating a hub transport receive connector. Once done, click the next button, which will bring you to the bindings section:

As you can see above, by default it allows all IPv4 addresses on port 25. Click next to continue.

Once you reach the next page, it will be for the Remote Network Settings. By default, it allows everything ( that we want to change.

Now click the - button to remove this entire range. You will see the bar go red, not to worry.

Click the + button to add in the IP Address. In this example, it was for an internal application:

Click the Save button now. When you are taken back to the previous screen you will notice it does not have, it now has the IP ( that you added in the previous step in the list now:

Now you can click Finish and your new connector will be on the list under that server. Your application should work now without getting a relay error.

If you wanted to allow mail from the Internet, you can go to the default frontend [ServerName], click the pencil button or double click the receive connector and then click on the security tab on the left to see the Permissions Groups:

I have highlighted Anonymous Users as it is not enabled by default. Select the checkbox and then click the Save button. Once you are finished editing your connectors, head over to services.msc so you can recycle the Frontend Transport Service:

Once complete, check your mail flow.

If this is a brand-new forest with a brand-new Exchange server, you will also need to configure your send connector with the information provided by your ISP and you need to advise them to allow your Exchange Server IPs only to send/receive mail. Remember, your applications will send internally but you don’t want them to send externally as it needs to go through the correct send/receive connector to the Internet and vice versa.

List of connectors

Back to the list of connectors. We have the following additional connectors and we will touch base on them quickly:

  • Client proxy [ServerName]
  • Default [ServerName]
  • Outbound proxy frontend [ServerName]

Client proxy [ServerName]: This is a hub transport service. It receives email from the frontend services sent on port 465 and it sends it to the mailbox transport service.

Default [ServerName]: This is also a hub transport service that will accept mail from the frontend transport service on port 2525 and it also sends it to the mailbox transport service.

Outbound proxy frontend [ServerName]: This connector receives outgoing emails on port 717 but only if the option “Proxy through Client Access Server” is selected.

As you can see, each one of these handles traffic on different ports. You should refrain from modifying them because it can cause issues with mail flow in your environment.

Featured image: Shutterstock

Edward van Biljon

Edward van Biljon is an experienced messaging specialist working in the IT and services industry. He is skilled in WSUS, domain name system, datacenters, printer support, and System Center Configuration Manager (SCCM). He has a background as a strong IT professional and has an international diploma in programming focused on computer programming.

Published by
Edward van Biljon

Recent Posts

Managing Azure VMs with System Center Virtual Machine Manager

You may not know it, but System Center Virtual Machine Manager can be used for…

15 hours ago

Best and most secure VPN services for small businesses

As we adjust to a new remote work culture due to coronavirus, a secure VPN…

18 hours ago

Exchange security: Get your SPF, DMARC, and DKIM records in place

Every Exchange admin lives with the constant fear their system will be breached. Having SPF,…

21 hours ago

GE data breach exposes thousands of employee records

A GE data breach exposed a hacker’s treasure trove of employee records, including Social Security…

2 days ago

Getting speed and consistency using Linux text editors and console

Ready to go back to the future? Here’s a look at some Linux text editors…

2 days ago

Amazon GuardDuty unveils new, lower pricing tiers

The Amazon GuardDuty threat-detection service has unveiled some lower price tiers, which will be especially…

2 days ago