1 SMTP Transport Configuration SMTP Configurations and Virtual Servers Customizing the SMTP Service.

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

Internet Applications INTERNET APPLICATIONS. Internet Applications Domain Name Service Proxy Service Mail Service Web Service.
FIREWALLS Chapter 11.
1 Firewall installation STEP 1: INSALL WINDOWS 2003 SETP 2:INSTALL ISA 2000 WITH SP1 STEP 3:CONFIGURE ISA 2000 STEP 4: DNS.
Module 6 Implementing Messaging Security. Module Overview Deploying Edge Transport Servers Deploying an Antivirus Solution Configuring an Anti-Spam Solution.
IT:Network:Apps.  Hosts  Root Servers  Zones  Name Resolution  Reverse and forward Lookups  CName  MX Records  NSLookup  IPconfig.
Configuring an SMTP Mail Server © N. Ganesan, Ph.D.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 5 Introduction to DNS in Windows Server 2008.
CCNA2 Routing Perrine modified by Brierley Page 18/6/2015 Module 11 Access Control Non e0e1 s server.
IT:Network:Applications.  Exchange Recipients  Defining Addresses  Managing Mailboxes  Mailbox Types  Assigning Permissions.
Office 365 SMTP Relay June Relay Method Send to rcpts in domain Relay to Internet via O365 Configuration Requirements Requires Authentication.
Introduction to the Secure SMTP Server service. Secure SMTP server is a secure, reliable SMTP mail relay server for your outgoing mail. Secure SMTP service.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
POP Configuration Microsoft Outlook What is POP? Short for Post Office Protocol, a protocol used to retrieve from a mail server. Most.
1 Enabling Secure Internet Access with ISA Server.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
1 Message Routing Administration Routing Group Planning Connecting Routing Groups Link Status Information.
Copyright © 2000, ZipLink Inc. Patent Pending 1 Mail Message Metering or, how to block outbound spam Robert D. Haskins.
Securing Your GroupWise ® System Morris Blackham Software Engineer Novell, Inc. Danita Zanrè Senior Consultant Caledonia.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
SIM309. Connection Analysis (IP-based edge blocks) Reputation Analysis Connection Filtering Protect businesses from receiving –borne viruses.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
SMTP PROTOCOL CONFIGURATION AND MANAGEMENT Chapter 8.
ProtectionProfiles. 2 Fortinet Technologies Protection Profiles Protection profiles control t the type of traffic protected t HTTP t FTP t IMAP t POP3.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Internet-Based Client Access
Module 6: Manage and Configure Messaging. Configuring Internet Mail Using Small Business Server (SBS) 2008 Console Configuring Protection Configuring.
Chapter 6: Packet Filtering
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Services Working at a Small-to-Medium Business or ISP – Chapter 7.
INSTALLING MICROSOFT EXCHANGE SERVER 2003 CLUSTERS AND FRONT-END AND BACK ‑ END SERVERS Chapter 4.
Copyright 2003 CCNA 1 Chapter 9 TCP/IP Transport and Application Layers By Your Name.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Two Installing and Configuring Exchange Server 2003.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Access Control List (ACL)
Module 6: Integrating ISA Server 2004 and Microsoft Exchange Server.
Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs.
Module 5 Managing Message Transport. Module Overview Overview of Message Transport Configuring Message Transport.
Module 2: Overview of IIS 7.0 Application Server.
Module 5 Planning and Deploying Message Transport in Microsoft® Exchange Server 2010.
IS 4506 Establishing Microsoft SMTP Service.  Overview Introduction to Microsoft SMTP Service SMTP Service features SMTP administration interface SMTP.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chapter 3 Managing IP Traffic. Objectives Upon completion of this chapter you will be able to perform the following tasks: Configure IP standard access.
1 Hosted security and continuity. 2 GFI MAX MailProtection overview GFI MAX MailProtection is a cloud-based security solution » Inbound .
A Quick Look At How Works Understanding the basics of how works can make life a lot easier for any user. Especially those who are interested.
CITA 310 Section 6 Providing Services (Textbook Chapter 8)
Linux Operations and Administration Chapter Twelve Configuring a Mail Server.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Module 5: Managing Addresses and Address Lists.
CCNA4 Perrine / Brierley Page 12/20/2016 Chapter 05 Access Control Non e0e1 s server.
Access Control List (ACL) W.lilakiatsakun. Transport Layer Review (1) TCP (Transmission Control Protocol) – HTTP (Web) – SMTP (Mail) UDP (User Datagram.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
11 MAINTAINING A NETWORK INFRASTRUCTURE Chapter 9.
Web Server Administration Chapter 11 Monitoring and Analyzing the Web Environment.
Fighting Spam in an Exchange Environment Tzahi Kolber IT Supervisor - Polycom Israel.
Working at a Small-to-Medium Business or ISP – Chapter 8
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Roadrunner Error 530 Call 1 (888) Toll-free
Working at a Small-to-Medium Business or ISP – Chapter 7
Lesson #10 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 10 Configuring Network and Firewall Settings.
Working at a Small-to-Medium Business or ISP – Chapter 7
IIS.
* Essential Network Security Book Slides.
Firewalls Purpose of a Firewall Characteristic of a firewall
Simple Mail Transfer Protocol
Working at a Small-to-Medium Business or ISP – Chapter 7
Pavel Dobrý Engineering Director
 Zone in name space  DNS IN THE INTERNET  Generic domains :There are fourteen generic domains, each specifying an organization type.
Presentation transcript:

1 SMTP Transport Configuration SMTP Configurations and Virtual Servers Customizing the SMTP Service

2 SMTP Configurations and Virtual Servers Configuring additional Simple Mail Transfer Protocol (SMTP) servers Managing incoming message traffic Global settings SMTP virtual server settings

3 Multiple SMTP Virtual Servers

4 Incoming Message Traffic DNS MX and A Records are required for successful message delivery. Recipient policy configuration is required for successful message delivery.

5 Configuring a Recipient Policy for Additional SMTP Addresses

6 Global Settings Internet Message Formats container: Defaults object Message Delivery object settings

7 Default Message Delivery Settings

8 SMTP Virtual Server Settings General tab Access tab Messages tab Delivery tab

9 Defining a Filter on Global Settings

10 Applying Filtering to the SMTP Virtual Server

11 Controlling Message Relay

12 SMTP Virtual Server Message Settings

13 Forwarding Unresolved Recipients

14 Configuring Delivery Options

15 Reverse DNS Lookup

16 Smart Host Message Relay

17 Customizing the SMTP Service SMTP transport event handling of the OnArrival event Protocol event handling Event binding Using transport event sinks for virus protection

18 SMTP Transport Event Handling of the OnArrival Event To add standard notifications to incoming messages To block unsolicited messages To create mailing list services To set up incoming message logging To redirect messages To perform virus checks

19 Protocol Event Handling Inbound protocol events Outbound protocol events

20 Event Binding Use SEO.DLL to manage event sink bindings. Use MetaEdit to view event sink bindings.

21 Chapter Summary SMTP Configurations and Virtual Servers Customizing the SMTP Service