This shows you the differences between two versions of the page.
Last revision | |||
— | how_to:vpop3_sending_high_volumes_of_unrecognised_mails [2009/07/07 14:12] – created mike | ||
---|---|---|---|
Line 1: | Line 1: | ||
+ | ======SMTP Relay Protection in VPOP3====== | ||
+ | SMTP Relay Protection should be used on ALL SMTP mail servers (such as VPOP3) which have a permanent connection to the Internet. You may also want to use it on servers which are only connected occasionally via a dial-up connection. | ||
+ | SMTP Relay Protection is needed because junk emailer' | ||
+ | |||
+ | There are several ways of protecting VPOP3 against this type of abuse. In general the best way is to make VPOP3 check the IP address of the computer which is connecting to it against a list of allowed addresses. If the connecting computer is an allowed one, VPOP3 will let it send local or outgoing mail, otherwise it will just allow it to send mail to local users (this is needed for incoming SMTP connections). | ||
+ | |||
+ | =====To protect VPOP3 2.0.0 and later===== | ||
+ | On the Services page, click on SMTP Server From the SMTP Anti-Relay Protection list choose Check Client IP Address. Then, in the ' | ||
+ | |||
+ | 192.168.1.0 255.255.255.0 | ||
+ | |||
+ | Note: If you have a proxy server between the Internet and VPOP3, this should be EXCLUDED from the access restrictions range allowed by VPOP3, eg if the proxy server is 192.168.1.100, | ||
+ | |||
+ | !192.168.1.100 255.255.255.255 | ||
+ | |||
+ | If you don't do this, any incoming connections through the proxy server will be allowed, regardless of where the user's computer is - this is because all these connections will appear to be coming from the proxy server' | ||
+ | |||
+ | =====To test the relay protection===== | ||
+ | Go [[http:// | ||
+ | |||
+ | {{tag> |