How to change SMTP and port settings for the SecurityGateway server Print

  • 0

If you need to change the ports or other SMTP settings used by SecurityGateway, the Email Protocol page contains various options governing SecurityGateway's technical handling of email. For example, you will use this page to designate the ports that will be used for receiving mail, the maximum number of concurrent SMTP sessions allowed, whether or not SecurityGateway will honor VRFY requests, whether or not you will allow plain text passwords, and other similar advanced options

Log into SecurityGateway with a global administrator account

Click on Setup/Users in the lower-left corner





Locate the Mail Section

Click on Email Protocol





  1. From here, you can configure the following options:
    • HELO Domain Name

      This is the hostname given after the HELO/EHLO command when SecurityGateway connects to a remote server to send mail (i.e helo mail.domain.com or ehlo smtp.domain.com). It is also used in Received headers, authentication-results headers, and other places where it is necessary to identify exactly what server was processing a message. This should be the fully qualified domain name of the SecurityGateway server.

    • SMTP Ports

      This is where you can configure the ports on which SecurityGateway listens for incoming SMTP connections. Note that you can specify more than one port by putting a comma between each port you wish to use. By default, this is set to 25.

    • Dedicated SSL Ports

      This is for configuring the ports on which SecurityGateway listens on for secure SMTP connections using SSL/TLS. As above, you can choose to listen on more than one port. By default, this is set to 465.

    • MSA Ports

      This is for configuring the alternate ports on which SecurityGateway listens for incoming SMTP connections. The MSA port is used if the sending client cannot send on port 25 due to network configurations or policies. Note that connections on the MSA port must be authenticated with a username and password. By default, this is set to 587. It can be set to listen on more than one port as with SMTP ports.

    • Bind sockets to these IPs

      If you wish to bind SecurityGateway to specific IP addresses, list those IPs here separated by commas.

    • Maximum concurrent SMTP inbound sessions

      This value controls the number of concurrent inbound SMTP sessions that SecurityGateway will accept before it begins responding with a 'Server Too Busy' message. The default value is 100.

    • Maximum concurrent SMTP outbound sessions

      The value entered here is the maximum number of concurrent outbound SMTP sessions that will be created when sending mail. Each session will send outbound messages until all waiting messages are sent. For example, if this option is set to the default value of 30, then thirty sessions could be simultaneously created, allowing SecurityGateway to attempt to deliver 30 different messages at once..

    • Default domain

      Choose a domain from the drop-down list box. This is the domain that SecurityGateway will assume should be used when someone attempts to log in without including a domain name, and it is the domain that will be used for MAIL, RCPT, and VRFY commands when no domain is specified.

    • Use ESMTP whenever possible

      When enabled SecurityGateway will use Extended SMTP commands whenever possible. By default this is enabled.

    • Honor VRFY command

      Enabling this will allow connections to the SecurityGateway server to use the extended SMTP command VRFY to verify the existence of a local user. By default, this is disabled.

    • Allow plain text passwords (SSL or CRAM-MD5 not required)

      This allows incoming SMTP connections to use the SMTP AUTH command to authenticate the connection. By default, this is enabled.

    • Honor CRAM-MD5 authentication method

      This allows incoming connections to use the CRAM-MD5 authentication method to authenticate the connection without sending the password in plain-text. This is enabled by default.

    • Hide ESMTP SIZE command parameter

      This disallows the use of the extended SMTP command SIZE from being used to send the size of a message before it is transmitted. By default, this is disabled.

    • Check commands and headers for RFC compliance

      Enabling this will check all incoming and outgoing messages for compliance with the RFC standard for messages, which can help reduce spam, but can also prevent the sending of valid email as well. By default, this is not checked.

    • Allow this many RCPT commands per message

      This setting determines how many RCPT commands a sending server may issue before being rejected by SecurityGateway. By default, this is set to 100, which is the minimum total number recommended by RFC 2821.

    • Maximum acceptable SMTP message size

      Setting a value here will prevent SecurityGateway from accepting mail that exceeds a certain fixed size. When this feature is active SecurityGateway will attempt to use the ESMTP SIZE command specified in RFC-1870. If the sending agent supports this SMTP extension then SecurityGateway will determine the message size prior to its actual delivery and will refuse the message immediately. If the sending agent does not support this SMTP extension then SecurityGateway have to allow the sending server to begin transmitting the messages, but will reject the message later if the maximum size is reached. The default value of '0' mean that there is no size limit placed on messages.

    • Kill connection if data transmission exceeds ___:

      If the transmission of data during an SMTP connection exceeds this threshold, SecurityGateway will close the connection. The default value in this option is '0', meaning that there is no size limit.

    • Maximum message hop count

      This option will monitor the number of 'hops', or servers passed through, that incoming messages have taken as listed in the Received header of the message. If it goes over this number, it will stop the message from being delivered to prevent an infinite-loop situation. By default, this is set to 20 hops.
    When you have made the desired change, click on Save.

Additional Comments

Adding or changing any of SecurityGateway's port settings requires a restart of the service to allow for it to bind the new port information. This will happen automatically when you click Save.

 


Was this answer helpful?

« Back