Exchange 2010 Netmon Powershell
We're running Exchange 2010 SP1 w/ Rollup 1 on Windows 2008 R2. We got some reports from our internal security folks that our 8 Exchange servers are trying to get out through our perimeter firewall. It's being rejected which is good, but why? I ran a Netmon (3.4) and noticed the following in the capture.....looks like Akamai addresses. Is this an OS thing, Exchange thing? See below for netmon trace. Any ideas here? What is Powershell doing or svchost.exe? We are not running Exchange Hosted Services, strictly internal email only. All the 24.x.x.x addresses are the external ones I refer to. Our internal network is 10.x.x.x 76294 2:45:26 PM 12/6/10 490.0643252 powershell.exe SVR-MB04 24.143.206.19 TCP TCP:Flags=......S., SrcPort=42282, DstPort=HTTP(80), PayloadLen=0, Seq=76298579, Ack=0, Win=8192 ( Negotiating scale factor 0x8 ) = 8192 {TCP:708, IPv4:707} 76295 2:45:26 PM 12/6/10 490.0646872 powershell.exe 24.143.206.19 SRV-MB04 TCP TCP:Flags=...A.R.., SrcPort=HTTP(80), DstPort=42282, PayloadLen=0, Seq=0, Ack=76298580, Win=8192 {TCP:708, IPv4:707} 81766 2:46:00 PM 12/6/10 524.1692033 svchost.exe SVR-MB04 24.143.206.9 TCP TCP:Flags=......S., SrcPort=42314, DstPort=HTTP(80), PayloadLen=0, Seq=2586803921, Ack=0, Win=8192 ( Negotiating scale factor 0x8 ) = 8192 {TCP:826, IPv4:825} 81767 2:46:00 PM 12/6/10 524.1695179 svchost.exe 24.143.206.9 SVR-MB04 TCP TCP:Flags=...A.R.., SrcPort=HTTP(80), DstPort=42314, PayloadLen=0, Seq=0, Ack=2586803922, Win=8192 {TCP:826, IPv4:825} Any help would be great, I'm stuck with this one.
December 7th, 2010 1:38pm

Who own this “24.143.206.19”? What kind of applications are on the external machine? Please verify if there’s any malfunction on the exchange servers currently Please check if there’s any warning or error event in the application log on the exchange servers that send these packages Please run ExBPA against the exchange servers for health check James Luo TechNet Subscriber Support in forum If you have any feedback on our support, please contact tngfb@microsoft.com Please remember to click Mark as Answer on the post that helps you, and to click Unmark as Answer if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread.
Free Windows Admin Tool Kit Click here and download it now
December 8th, 2010 1:51am

It looks like it's Symantec Mail doing this and those are the Live Update Akamai servers. I think we go this under control now. Thanks
December 9th, 2010 2:49pm

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics