IBM AH0QXML User Guide - Page 33

SMTP Listener/Server

Page 33 highlights

3.2.1 SMTP Listener/Server Incoming SMTP messages are processed by the SMTP Listener task. This task is responsible for accepting incoming requests to communicate with the Domino SMTP server. The SMTP Listener task and the configuration settings that it uses are your first line of defense against spam. The features employed by the SMTP Listener task include: DNS blacklist filtering Inbound relay control and enforcement Inbound intended recipient controls Disabled SMTP routing to groups Inbound connection controls Inbound sender controls For detailed discussion about the use of each of the listed feature, refer to Chapter 4, "Domino 6 Server anti-spam features" on page 29. The SMTP Listener uses the configuration settings to determine if an incoming connection should be accepted. Once a connection is established, the SMTP Listener checks additional information in any incoming message and determines if the incoming message should be accepted. DNS blacklist filtering allows you to use an alternative vendor to validate the sending IP address against their database. If an originating IP address is determined to be a source of spam, the connection can be denied, or the incoming message can be tagged or logged. Even without blacklist processing, the incoming connection can be denied based on the originating IP address or name. Incoming messages can be processed and/or rejected based on origin e-mail address, IP address, or domain name. Figure 3-3 and the list following the figure describe the sequence of configuration checking that occurs during the receipt of a message. Chapter 3. Domino 6 anti-spam architecture 21

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120

Chapter 3. Domino 6 anti-spam architecture
21
3.2.1
SMTP Listener/Server
Incoming SMTP messages are processed by the SMTP Listener task. This task
is responsible for accepting incoming requests to communicate with the Domino
SMTP server. The SMTP Listener task and the configuration settings that it uses
are your first line of defense against spam. The features employed by the SMTP
Listener task include:
±
DNS blacklist filtering
±
Inbound relay control and enforcement
±
Inbound intended recipient controls
±
Disabled SMTP routing to groups
±
Inbound connection controls
±
Inbound sender controls
For detailed discussion about the use of each of the listed feature, refer to
Chapter 4,
Domino 6 Server anti-spam features
on page 29.
The SMTP Listener uses the configuration settings
to determine if an incoming
connection should be accepted. Once a connection is established, the SMTP
Listener checks additional information in any incoming message and determines
if the incoming message should be accepted. DNS blacklist filtering allows you to
use an alternative vendor to validate the sending IP address against their
database. If an originating IP address is determined to be a source of spam, the
connection can be denied, or the incoming message can be tagged or logged.
Even without blacklist processing, the incoming connection can be denied based
on the originating IP address or name. Incoming messages can be processed
and/or rejected based on origin e-mail address, IP address, or domain name.
Figure 3-3 and the list following the figure describe the sequence of configuration
checking that occurs during the receipt of a message.