This page provides security options for the SMTP service. You can specify how the users will be required to authenticate their connection as defined on this page. No mail will be accepted for forwarding to the recipient if the correct logon is not used. Using the MAPS lookups can help reduce the risk of Spam attacks.
The following properties are available on this page:
Under most circumstances you will not want users to relay mail through your server unless they are on your local network. Under normal circumstances FTGate will only relay mail from mail clients that connect from an address defined in the Addresses page. Users outside this address range can still relay providing that they AUTHenticate with an SMTP AUTH command from their mail client.
This behaviour can be modified with the following options:
Option |
Description |
Allow relay from a POP3 validated machines. |
This option permits relay from users who are not within the allocated address range, have not issued an SMTP AUTH command BUT have accessed the POP3 server to collect mail. |
Prohibit relay messages from all sources |
Setting this option will prevent ALL mail from being relayed through the server, the server will not relay mail under ANY circumstances. |
Only relay if senders address is hosted by this server. |
This option is used to prevent mail from being relayed by a machine in the local address range that is trying to send with an address that is not hosted by this server. |
These options control the way that FTGate checks the validity of the sender.
Option |
Description |
Validate that senders domain exists |
Enabling this option will cause FTGate to check DNS servers proving that the domain exists. |
Validate sender with the MAPS DUL list |
Enabling this option will force the FTGate server to look up the sender's IP address against the MAPS DUL list. For more information please see the MAPS topic in the Security chapter of this document. |
Validate incoming servers with the MAPS RBL list |
Enabling this option will force the FTGate server to look up the sender's IP address against the MAPS RBL list. For more information please see the MAPS topic in the Security chapter of this document. |
These options control which users are allowed to send messages INTO and THROUGH the server..
Option |
Description |
Allow messages from all sources |
Selecting this option allows mail to be received by the server regardless of their authentication state. Relay controls still apply. |
Only allow messages from AUTHenticated sources. |
Selecting this option prevents ALL mail entering the server unless it executes an SMTP AUTH command. Selecting this option will prevent your ISP sending mail into your server unless you make special provision with them for handling SMTP AUTH. |
This option controls the specific handling of the SMTP AUTH command.
Option |
Description |
Allow AUTH logon with mailbox username and password. |
This option required that users who wish to use SMTP AUTH must specify their email address and password as the parameters for AUTH. |
Only allow AUTHorization using the following name and password |
This requires that all users who wish to use SMTP AUTH use the specific name and password listed in the Name and Password fields. |
Additional information on security issues can be found in the security section of this document or by following the links below: