It is likely that you have a hostname for the IP of the External interface of the Astaro; for example, mail.ourdomain.com. There’s a way for that to point at the internal interface of the Astaro for users inside the firewall, normally including anyone who has VPN’d in via Astaro Remote Access.
This assumes that internal users are set up to check an internal DNS prior to looking for an external one on the internet. On your internal Domain Controller, make sure that in your internal DNS there is an entry in ‘Forward Lookup Zones’ in the ourdomain.com (substitute your domain name) folder that points mail (your sub domain) at the IP of the internal interface on your Astaro.
From ‘Management >> User Portal’, on the ‘Global’ tab, click on the folder beside ‘Allowed networks’ then drag ‘Any’ into the box. You may want to restrict this more, but it’s likely you will have people both inside and outside your firewall who will want to access the User Portal.
Select whether you want to allow all users or only a select group or individuals, and hit ‘Apply’.
On the ‘Advanced’ tab, put mail.ourdomain.com (your subdomain.domain), leave 443 as the standard ‘HTTPS port’* and hit ‘Apply’. [Sined, this may be where you are using something else. No DNAT shold be needed.]
Your users can now use the portal at https://mail.ourdomain.com/ regardless of where they are.
*Beginning with V7, Astaro moved WebAdmin access from port 443 to 4444 because many sites DNAT https traffic to an internal server. Our standard approach has been to create an additional IP on the External interface when we wanted to do things like offering Outlook Web Access via https. If it’s impractical for you to do this, then you’ll need to change the port. Astaro suggests 1443 and: https://mail.ourdomain.com:1443/.
It is likely that you have a hostname for the IP of the External interface of the Astaro; for example, mail.ourdomain.com. There’s a way for that to point at the internal interface of the Astaro for users inside the firewall, normally including anyone who has VPN’d in via Astaro Remote Access.
This assumes that internal users are set up to check an internal DNS prior to looking for an external one on the internet. On your internal Domain Controller, make sure that in your internal DNS there is an entry in ‘Forward Lookup Zones’ in the ourdomain.com (substitute your domain name) folder that points mail (your sub domain) at the IP of the internal interface on your Astaro.
From ‘Management >> User Portal’, on the ‘Global’ tab, click on the folder beside ‘Allowed networks’ then drag ‘Any’ into the box. You may want to restrict this more, but it’s likely you will have people both inside and outside your firewall who will want to access the User Portal.
Select whether you want to allow all users or only a select group or individuals, and hit ‘Apply’.
On the ‘Advanced’ tab, put mail.ourdomain.com (your subdomain.domain), leave 443 as the standard ‘HTTPS port’* and hit ‘Apply’. [Sined, this may be where you are using something else. No DNAT shold be needed.]
Your users can now use the portal at https://mail.ourdomain.com/ regardless of where they are.
*Beginning with V7, Astaro moved WebAdmin access from port 443 to 4444 because many sites DNAT https traffic to an internal server. Our standard approach has been to create an additional IP on the External interface when we wanted to do things like offering Outlook Web Access via https. If it’s impractical for you to do this, then you’ll need to change the port. Astaro suggests 1443 and: https://mail.ourdomain.com:1443/.