-
2
- #1
We have a permanent dial-up & experienced spamming via the open relay of Exchange 5.5 with an internet mail connector.
Six web searches later (& nearly bowing to MS's configuration charge of $300).LOL
These are 3 steps into closing that hole.
>
:O> 1: IMS (Internet Mail Service) CONNECTOR Properties
Select *Reroute incoming SMTP mail for:
<enter all your domain names that are directed to this mail server as inbound>
>
:O> 2: IMS CONNECTOR Properties
Routing restrictions:
Simply tick the second box 'Hosts & clients with these IP addresses'. Then (the bit MS don't tell you about) don't enter any IP addresses.
>
:O> 3: PROTOCOL Properties
I entered in this order of priority-
Accept/Reject:
Accept 192.168.1.0 255.255.255.0 (Internal IP range)
Accept <Own public Address & its SNM>
Reject 0.0.0.0 0.0.0.0
Then:
telnet mail-abuse.org
(on that server in case you are administering remotely)
& should pass all tests.
Six web searches later (& nearly bowing to MS's configuration charge of $300).LOL
These are 3 steps into closing that hole.
>
Select *Reroute incoming SMTP mail for:
<enter all your domain names that are directed to this mail server as inbound>
>
Routing restrictions:
Simply tick the second box 'Hosts & clients with these IP addresses'. Then (the bit MS don't tell you about) don't enter any IP addresses.
>
I entered in this order of priority-
Accept/Reject:
Accept 192.168.1.0 255.255.255.0 (Internal IP range)
Accept <Own public Address & its SNM>
Reject 0.0.0.0 0.0.0.0
Then:
telnet mail-abuse.org
(on that server in case you are administering remotely)
& should pass all tests.