Link your domain with Exchange 2019
Link your domain with Exchange 2019
I set up my Exchange Server 2019 and need to link my domain. I added the DNS records on the DC, which works locally—messages come through mail.aftechservices.co.uk. Now I want to connect my domain for broader access, email sending, and receiving from anywhere.
To reach webmail remotely, you must redirect that subdomain to your external IP via your registrar, Cloudflare, or any provider managing your domain. Mail services also require their own DNS entries. Ideally the IP should remain fixed; otherwise dynamic DNS will be necessary. Wishing you success with self-hosting email. It’s quite possible to become a spam forwarder and get banned by major hosts.
Set up your external DNS mail records through your domain registrar or DNS service. Adjust Accepted Domains on your exchange server. This setup may not function properly because the domain points to a DDNS, and there are no PTR or SPF records, which could cause delivery problems and blacklisting.
You're experiencing issues because your dynamic IP is being routed through your home router, which isn't forwarding mail traffic correctly. To send emails from your mail server to your exchange, you'll need to configure your router to act as a mail proxy or use an alternative setup like a dedicated mail server with port forwarding enabled. Also, ensure your DMZ settings match the local IP of your exchange server and that ports 80 and 443 are open on its local address.
On a home Wi‑Fi link, ports 80 and 443 are likely restricted by your internet service provider. In this situation, you’ll need to switch to alternative ports and route them through your router’s forwarding settings on the server side.
It seems you're dealing with complex setup challenges. Are you configuring your own Exchange Server for data control or compliance? This might be driven by legal or sovereignty needs. Otherwise, an Exchange Online Plan could simplify things. Also, ensure DMZ is reserved for testing only—public exposure poses security risks. Confirm whether OWA/ECP or Auto-discovery is the issue, and check your router settings. Test connectivity from outside your network, as some devices behave unpredictably. Verify your IP isn’t shared (not on CG Nat) to avoid failures. Don’t forget certificates, backups, and regular patches via CU. Domain validation with a dynamic IP can block emails due to missing PTR records, which may trigger spam filters. Repeated problems could lead to blacklisting. This advice also applies to the Servers & NAS section.
Check the open status of ports 80 and 443 using an open port signal checker.
You’ve got the basics in place. To avoid being blacklisted, check your email headers, ensure proper authentication, and confirm your SSL configuration is correct. Also, verify that your server logs are not flagging suspicious activity.
You're also utilizing a changing IP address and a Dynamic DNS service.