Time
2 hours 42 minutes
Difficulty
Beginner
CEU/CPE
3

Video Transcription

00:00
Hello and welcome back to the office 3 65 Migration primer I'm your instructor, Jim Daniels. And today we're going to continue a module to preparation
00:10
with going over ports and services.
00:13
So in this lesson, we're gonna talk about some of the ports that's used ball office for 65. How you can optimize, um, and how you manage those the Orioles on her in points.
00:25
So here we have a table of some of the common ports using office 3 65 implementations
00:31
things like a DFS. If you use that for an authentication method that requires port for for three of the TCP Protocol,
00:38
I'm not gonna read him all out. A lot of them or common.
00:42
Um, your SMTP
00:44
deal s email, secure email. Auto discover again, does of email. If you're doing I'm at four. Migration. The pop three migration. There's force associated with that,
00:55
um, exchange management cell show on the console. Your common http and https over SSL ports teams has a few ports as well. The most immediate flowed for teams has some ports that you may actually have to configure. So these were the ports.
01:14
We're also have a link to a reference on them on our reference material.
01:18
Whenever you have a network, it's always best to identify what traffic coming cross your network belongs to. What application and what environment. Office 3 65 is exactly the same way.
01:32
So when traffic is identified, then you can move to the organization face
01:37
you define officers, justified traffic,
01:41
and then you can write it accordingly.
01:42
And then, because you haven't defined,
01:45
you can actually look at trends. Look at analysis. Reduce, lighten, see improved performance.
01:51
One thing that Microsoft does is actually provide a rest based Web service with all of the girls and ports has required for their services. They keep it updated. You can use this. Rest are visible power show to modify your own network device configurations.
02:08
Or, you can ask will use a proxy otta config file.
02:14
And that's a pack file for Short
02:15
and that will actually go out and get this rest service and keep your your devices updated.
02:23
So whenever there is a change in Officer 65 ad dressing,
02:29
you won't have to worry about having opened up. Another thing I haven't opened up and identify another euro automatic will be updated through that service.
02:39
Here's an example.
02:42
Have a snippet from the rest of date.
02:45
Um, here we can see that they are looking at shareholding Alon. One Drop of business. It was the different Urals.
02:53
It also has some other ones that may be part of the content delivery network of SharePoint. Some of the back end addresses that Microsoft may pull from
03:01
you'll see here also specifies a TCP Ports 80 and 443 says for your http. Https,
03:10
um, express room. If you go that way, it will write a specifically over and this example. It doesn't
03:17
default category and is required, so this is just a snippet.
03:23
Typically, the PAC file for the rest has has about
03:29
a few 1000 lines. It's not huge, but it is a significant foul, and it's really easy to set up. Once you set up,
03:38
you get the updates automatically, so set it and forget it.
03:43
So with optimization,
03:45
use your Pak file to identify or 3 65 traffic and route through your eyes. P. One thing you can do If you have a VPN, you can split tunnel on bypass for V. P M.
03:55
Because again, why Do you wanna have a user on the outside? Go into your system
04:02
just to come back out. Go back in and you come back through the VPN for through ST Very now,
04:11
for instance, you can identify and split tunnel. And when that user is away from the office outside of the work network, even if their own a VPN, they won't utilize your band with they don't utilize your resource is the utilize whatever network they're connected to.
04:29
Um,
04:30
that's a very good organization scenario. Another one is a bypass traffic inspection for your ills identified through.
04:38
So if you have a list of these
04:41
200 euros, you know our office 3 65 verified traffic straight from Microsoft.
04:46
You can tell you that was, and you can bypass inspection.
04:50
That way you're not burning your firewall. Resource is you're not burning. Your process of resource is maybe with some of your appliances.
04:59
You can remove them from the equation because you know what kind of traffic
05:03
they are.
05:04
You can add additional egress points to allow remote offices to connect to the closest 3 65 entry point.
05:12
There are a lot of different, often optimization scenarios. Again, optimization is optional.
05:19
However, if you're a Lord, if your order organization or if your organization that is really trying to get the most out of the available band with, I would definitely recommend to look into organization
05:33
because think all of a sudden wants all of your users go from print. Email. Cloudy now
05:42
and you saw developing or SharePoint online presidents you saw developing your one drop business.
05:48
All of the traffics gonna increase. It's going to increase exponentially with adoption.
05:55
So if you optimize your network early,
05:59
you want experience those bottlenecks and those pain points the other organizations may experience. Because as your users adopt office 3 60 files and consumption increases, the band with will also
06:13
so for recap for this model,
06:15
the configuration of specific ports. They are required for data foot. So you have to have certain ports, and certainly your Lynne points open for communication for certain services and 3 65 toe work.
06:29
There is a rest service to help assist with identifying specific your oils and R P ranges.
06:34
Thank you for taking time out of your schedule to join me for this model

Up Next

Office 365 Migration

In this Office 365 migration training, we look at the migration processes involved with Office 365 including preparation, identity configuration and Exchange, SharePoint and OneDrive migrations. Multiple scenarios are covered with supported migration techniques.

Instructed By

Instructor Profile Image
Jim Daniels
IT Architect
Instructor