Hello,
sorry misunderstood. So yes, Mobile Access Blade is enabled and active on this gateway.
Complete communication path that is:
external client --> perimeter gw with https inspection rule --> Load Balancer VIP rev.proxy --> reverse proxy servers --> Load Balancer VIP exchange --> exchange servers
maybe goin to remove the rev.proxy setup if we're satisfied withe the https decryption setup.
Same setup works on sharepoint, but surprisingly its blocked as "Trojan.Win32.Mitaka.TC.a"
kind regards,
mp2012