Ir al contenido principal

Groupwise Internet Agent SMTP Relay

Para efectos de enviar correo utilizando el servidor de correo de Groupwise como Relé se debe abrir GWIA/Access Control Tab/SMTP Relay Settings: uilizando el Console One, alli se debe seguir lo siguiente: "Cabe precisar que lo mejor es utilizar Direcciones IP en el From"

Enabling SMTP Relaying
You can enable the Internet Agent to function as a relay host for Internet messages. You can allow relaying for messages received from all Internet hosts, or you can select specific hosts for which you will relay.

In ConsoleOne, right-click the Internet Agent object > click Properties.

Click the Access Control tab > click SMTP Relay Settings.

Under SMTP Relay Defaults, select whether you want to allow or prevent message relaying.
If you prevent message relaying, you can define exceptions that will allow message relaying for specific Internet hosts. This can also be done if you allow message relaying. We suggest that you select the option that enables you to define the fewest exceptions. The Prevent Message Relaying setting corresponds with the Internet Agent's /norouting switch.

To prevent relaying of messages larger than a specific size (regardless of the SMTP Relay Defaults setting), enable the Prevent Messages Larger Than option and specify the size limitation.

To define an exception, click Create to display the New Internet Address dialog box.

Fill in the following fields:
From: Enter the Internet address that must be in the messages From field for the exception to be applied. You can make the address specific (such as novell.com) or more general by using an asterisk (*) as a wildcard character (such as *.novell.com).
To: Enter the Internet address that must be in the message's To field for the exception to be applied. This is also the address that the message will be relayed to (in the case of an Allow exception). You can make the address specific (such as novell.com) or more general by using an asterisk (*) as a wildcard character (such as *.com or *).

Click OK to add the exception to the list.

When finished defining exceptions, click OK to save your changes.

podemos visitar el siguiente URL: http://www.novell.com/documentation/gw6/index.html?page=/documentation/gw6/gw6_admin/data/ab8teyk.html

Comentarios

Entradas populares de este blog

Configurar Shorewall en CENTOS y Debian

Tomado de  http://www.com-sl.org/staticpages/index.php?page=config-shorewall-2da-parte Como   configurar un Firewall con Shorewall en dos Interfaces de Red con políticas DROP en CentOS y Debian . Autor:  Henry D. Rosado T. Correo electrónico:  bleycklinx@gmail.com Otros Datos:   Clic Aqui En este tutorial indicare como se configura un Firewall con Shorewall con políticas DROP en dos interfaces de red para CentOS y para Debian. Shorewall Shorewall  (Shoreline Firewall) es una robusta y extensible  herramienta de alto nivel para la configuración de muros cortafuego .  Shorewall  solo necesita se le proporcionen algunos datos en algunos ficheros de texto simple y éste creará las reglas de cortafuegos correspondientes a través de  iptables .  Shorewall  puede permitir utilizar un sistema como muro cortafuegos dedicado, sistema de múltiples funciones como  puerta de enlace, dispositivo de encaminamiento y servidor . Shorewall no solo le permite configurar un firewall seguro,  poderoso y rob...

PHP On Tomcat

Fue tomado de http://fabien.duminy.ifrance.com/blog/archives/2007/08/entry_14.html tomcat and php Here are the steps to run php in tomcat : Download tomcat and unzip the archive where you want (=> TOMCAT_DIR ) Create the following directories : TOMCAT_DIR /webapps/testPHP If necessary, create directory TOMCAT_DIR /common/lib (it seems, at least with tomcat 6, that the directory is no more created) Edit the file TOMCAT_DIR /conf/catalina.properties and modify the line for property shared.loader : shared.loader=${catalina.home}/common/classes,${catalina.home}/common/lib/*.jar Edit the file TOMCAT_DIR /conf/web.xml and add the lines mentionned below (see ' lines to add to web.xml of your tomcat installation ') To download quercus ( a php 5 engine written in pure java), you must in fact download resin becau...

25 Useful IPtable Firewall Rules Every Linux Administrator Should Know

Tomado de http://www.tecmint.com/linux-iptables-firewall-rules-examples-commands/ Managing network traffic is one of the toughest jobs a system administrators has to deal with. He must configure the firewall in such a way that it will meet the system and users requirements for both incoming and outgoing connections, without leaving the system vulnerable to attacks.  25 IPtables Firewall Rules for Linux This is where iptables come in handy. Iptables is a Linux command line firewall that allows system administrators to manage incoming and outgoing traffic via a set of configurable table rules. Iptables uses a set of tables which have chains that contain set of built-in or user defined rules. Thanks to them a system administrator can properly filter the network traffic of his system. Per iptables manual, there are currently 3 types of tables: FILTER – this is the default table, which contains the built in chains for:IN...