IBM AH0QXML User Guide - Page 73

Perform anti-relay checks for authenticated users, Allow all authenticated users to relay

Page 73 highlights

By default the inbound relay controls are enabled for external hosts. If the connecting host's IP address resolves to a name in one of the local Internet domains, the host is considered internal. IP addresses that resolve to host names outside the local Internet domains or that do not have DNS entries are considered external. You can change this so that all or no hosts are subject to the inbound relay controls. "Exceptions for authenticated users:" Specifies whether users who supply login credentials when connecting to the server are exempt from enforcement of the inbound relay controls. Choose one: - Perform anti-relay checks for authenticated users - The server does not allow exceptions for authenticated users. Authenticated users are subject to the same enforcement as non-authenticated users. - Allow all authenticated users to relay - Users who log in with a valid name and password are exempt from the applicable inbound relay controls. Use this to enable relaying by POP3 or IMAP users who connect to the network from ISP accounts outside the local Internet domain. This field provides an exception mechanism so that POP3 and IMAP users will be able to send internet e-mail through this server. "Exclude these connecting hosts from anti-relay checks:" You create an exceptions list containing the IP addresses or host names of hosts that relay to any permitted domain. For each specified exception, the inbound relay controls will not be enforced. Enter the IP addresses or host names of hosts to be exempted from the restrictions specified in the Inbound relay controls section. - Enter IP addresses or host names of specific servers that should be able to relay messages through this server. - IP addresses are entered in brackets. Wildcards can be used to indicate all addresses in one subnet. Also ranges of addresses can be specified. [156.16.25.1] [156.16.25.*] [156.16.25.128-255] apps1.lotus.com Note: You can use wildcards to represent an entire subnet address, but not to represent values in a range. For example, [127.*.0.1] is valid; [123.123.12-*.123] is not. If you want to specify a range, you can do it by entering, for example [127.0.0.128-255]. - Set the previous field to "All connecting hosts" and enter IP addresses or host names of internal servers that are allowed to relay in order to prevent unauthorized use of your SMTP servers by internal departments. Chapter 4. Domino 6 Server anti-spam features 61

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120

Chapter 4. Domino 6 Server anti-spam features
61
By default the inbound relay controls are enabled for external hosts. If the
connecting host
s IP address resolves to a name in one of the local Internet
domains, the host is considered internal. IP addresses that resolve to host
names outside the local Internet domains or that do not have DNS entries are
considered external. You can change this so that all or no hosts are subject to
the inbound relay controls.
±
Exceptions for authenticated users:
Specifies whether users who supply login credentials when connecting to the
server are exempt from enforcement of the inbound relay controls. Choose
one:
Perform anti-relay checks for authenticated users -
The server does not
allow exceptions for authenticated users. Authenticated users are subject
to the same enforcement as non-authenticated users.
Allow all authenticated users to relay -
Users who log in with a valid name
and password are exempt from the applicable inbound relay controls. Use
this to enable relaying by POP3 or IMAP users who connect to the network
from ISP accounts outside the local Internet domain.
This field provides an exception mechanism so that POP3 and IMAP users
will be able to send internet e-mail through this server.
±
Exclude these connecting hosts from anti-relay checks:
You create an exceptions list containing the IP addresses or host names of
hosts that relay to any permitted domain. For each specified exception, the
inbound relay controls will not be enforced. Enter the IP addresses or host
names of hosts to be exempted from the restrictions specified in the Inbound
relay controls section.
Enter IP addresses or host names of specific servers that should be able
to relay messages through this server.
IP addresses are entered in brackets. Wildcards can be used to indicate
all addresses in one subnet. Also ranges of addresses can be specified.
[156.16.25.1]
[156.16.25.*]
[156.16.25.128-255]
apps1.lotus.com
Note: You can use wildcards to represent an entire subnet address, but not
to represent values in a range. For example, [127.*.0.1] is valid;
[123.123.12-*.123] is not. If you want to specify a range, you can do it by
entering, for example [127.0.0.128-255].
Set the previous field to
All connecting hosts
and enter IP addresses or
host names of internal servers that are allowed to relay in order to prevent
unauthorized use of your SMTP servers by internal departments.