I use native 80/443 for OWA and RPC over HTTP requests, SME is not involved with these incoming port requests. 80/443 are port forwarded from the IPCop to exchange 2003. For the users ease of use, they connect to OWA by entering "advsmail.azdvs.gov" which is the default site on exchnage 2k3 IIS. I have a meta header redirect in the default iisstart.htm file that redirects to:
https://advsmail.azdvs.gov/exchange which forces a ssl connection without having to put the 's' on http and the /exchange on the address.
So when a user connects, they actually connect through IPCop twice.
Note: this address will not work on the LAN if SME is the proxy since SME thinks it is azdvs.gov and has no record of 'advsmail'. My AD DNS uses the ISP DNS for a forwarder, not SME.
My users know to accept the untrusted ssl cert warning they see when using OWA. I created the certificate for exchange on SME rather than purchasing one from a trusted root ssl vendor. The only reason https is needed is to protect clear text passwords, which is my requirement, not the end user.
The SME server only deals with incoming mail as it is the primary MX for the domain. This is unrelated to OWA pass thru access provided by IPCop.
make sense? I'm not sure after reading it..but submitting now anyway....
ryan