IBM AH0QXML User Guide - Page 35
Router, 3.3 Domino 6 anti-spam configuration, Router
![]() |
View all IBM AH0QXML manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 35 highlights
7. Originating SMTP server sends the DATA command to initiate the transfer of the message contents. 8. Domino SMTP Listener acknowledges start of DATA. 9. Originating SMTP server sends END OF DATA to indicate data transfer is complete. Domino SMTP Listener checks any inbound file size restrictions. Server mail rules are run, but only "Don't accept message" action is applied here. 10.Domino SMTP acknowledges END OF DATA and awaits disconnect or next message. (Note: Steps 3 through 10 are repeated for additional messages.) 11.Originating SMTP server sends QUIT, initiating close session sequence. 12.Domino SMTP acknowledges QUIT and closes connection. The earlier in this sequence that you can detect and reject a spam message, the fewer server resources are wasted by the spam. 3.2.2 Router Once a message has been received by the SMTP Listener, it is analyzed against the Server mail rules. The Server mail rules are evaluated against any incoming message as it is placed into the server MAIL.BOX. Server Mail rules are your second line of defense. Inbound controls can and should be used to block all mail to or from specific users and domains. The Server mail rules allow more flexibility and control by allowing you to specify additional conditions to be tested. You can also specify additional actions to be taken on the message other than just denying the delivery of it. If a message passes all testing in the server rules, it is then processed by the router for forwarding to another Domino server (which might have a different set of rules), or for placement into an end-user mail file. The mail file rules are typically established by the end-user of the mail file. Mail file rules are evaluated for any incoming messages on the server, before delivering the message to the user's mail file. Every Domino installation is different, and your particular circumstances will dictate where and how stringently you control incoming spam. 3.3 Domino 6 anti-spam configuration The best defense against spam is knowing the options available to you as the administrator. Being able to identify what messages are considered spam, versus those that were unsolicited, will help in eliminating it. Spam comes in many forms, from Web hoaxes, chain letters, and unsolicited sales and marketing material for a product you'd never buy, to the most common, offensive adult-rated Chapter 3. Domino 6 anti-spam architecture 23
![](/manual_guide/products/ibm-ah0qxml-user-guide-c7a8df4/35.png)