Fulltext results:
- SMTP Server Lua Scripting
- ddress** - (IN) - string - dotted notation client IP address (eg "192.168.1.1") * **ValidClientAddress** - (IN/OUT) - boolean - TRUE if the client IP address is in an 'allowed' IP address range * **LocalClientAddress** - (IN/OUT) - boolean - TRUE if client IP address is in an 'allowed' IP address range and a
- Outgoing Message Scripting
- subject of the message. * SenderIPAddress - The IP address of the message sender (if generated from
- Error Handling Scripting
- = * 1 = Protocol (SMTP, POP3, NNTP) * 2 = TCP/IP * 8 = Misc ===Severities=== This is a bit-mask
- loginaudit Database table
- crementing ID of loginaudit entry * ipaddress - IP address the login attempt came from * datetime ... ssful * ignore - Whether the login attempt should be ignored for VPOP3's IP address blocking system
- Spam Filter Rules: Variables
- dresses in the message header) |2.1.7+ | ^${SenderIP} |The sender's IP address (for SMTP mail only) |2.1.7+ | ^${Subject} |The subject of the message |2
- Access Restrictions Internal Format
- rnal Format====== VPOP3 internally stores service IP Access Restrictions in its settings database usin... (0) Subsequent entries each encode a line in the IP Access Restrictions rule list, with 7 fields, sep... Type: 0 = special, 2 = IPv4, 23 = IPv6, 100 = GeoIP - IP Address in text form - IP Address Prefix. Or, if Type = 0, then 0 = 'Any', 1 = 'Local Networ
- Archive Script
- <type>, <sender email>, <authenticated sender>, <ip address>, <message-id>, <size>, <attachments>, <r
- Spam Filter Rules
- tDecodedSection]] * [[spamrules_statement_getgeoip|GetGeoIP]] * [[spamrules_statement_getmd5|GetMD5]] * [[spamrules_statement_getrfc822date|GetRFC82... spam header marker]] * [[spamrules_ipwhitelist|Allow messages through from a specific IP address]]
- Allow messages through from a specific IP address
- ======Allow messages through from a specific IP address====== This script allows messages through the ... ile gets processed on all messages. If ${SenderIP} == "1.2.3.4" Stop EndIf This checks for the sender IP address being "1.2.3.4" and then aborts the spam
- Spam Filter Rules: DNSBL
- onto the spam filter score. <code> DNSBL ${SenderIP} sbl.spamhaus.org dnsresult IfMatch ${dnsresult} "/^127\.0\.0\.2$/" Log "(${SenderIP}) found in SBL.Spamhaus (${dnsresult})" ${Score
- Monitor Scripting
- ts the message has been Bcc'd to * **ClientIPAddress** is the IP address the message was sent from
- Mail Connectors -> Mail Senders -> SMTP Direct
- ect sending working you should have: * A fixed IP address * A reverse DNS entry set up for your m... erver(s) which handle mail for the target domain (IP addresses are not allowed, they must be host name... .com** name. This name may resolve to one or more IP addresses, so the sending mail server will try to connect to all the IP addresses of 'mail.example.com' (in a random orde
- SMTP Service -> VRFY/EXPN Tab
- , you can enable them, but restrict access to the IP address(es) you trust. ====Enable VRFY and EXPN ... Restrictions' for these commands in this section. IP addresses and networks which are allowed here wil... l be able to access the VRFY/EXPN commands, other IP addresses will receive an error if they try to us
- SMTP Server -> IDS/IPS
- s on the SMTP service and can automatically block IP addresses which try to do bad things. =====IDS L... tamp in ISO8601 format - %I = the SMTP client's IP address (as seen by VPOP3) - %e = the [[IDS eve... rder of events is: * VPOP3 looks at the client IP address. * VPOP3 checks the **Never Block List**. If the IP address is there, the connection is allowed * V
- IDS Log Event Numbers
- ese are often an indication of something trying to bypass virus scanners) * 900 = IP address blocked