Solved

Setup the Antivirus/antspam gateway for the dipartments of college

Posted on 2003-11-05
5
315 Views
Last Modified: 2013-12-15
hello experts,

 I have on requirement. where i need to setup a intermidiate server for my college departments.

each departments have their own domainnames (like el.amt.gcoe.edu, cs.amt.gcoe.edu.. etc) and IPs.

Regrdless of those diff. IPs and domain names I want to setup a gateway server where all emails for the departments (or can say domain) I can receive on my server and scan with antivirus also check for spam filter and then forward it to that particular user/domain.


For this requirement what configuration I need on my gateway.(i will prefer RedHat for a gateway).

As per my knowledge I will use
 Sendmail/postfix ( mail Exchanger)
 DSPAM ( spam filter)
 KAV/Mcfee (antivirus)

Now my questions are as..
1. Is it sufficient for having the gateway server to work? Please give me requirement lists for my       particular application.
2. What steps should I fallow to get my server setup?
3. how should I use Dspam and Antivirus programs for scanning/filtering?
   3.1. I will write down the routines to call those filter/scanner but how should i call those routine          in sendmail/postfix?
4. Is any other tool avaliable in linux ( preferably in RedHat) that does all those stuf together.

As I have to finish this project urgently to get time for my exam studies, your help will be very helpfull for me.

Thanks in advance...

0
Comment
Question by:pssolanki
5 Comments
 
LVL 40

Accepted Solution

by:
jlevie earned 138 total points
ID: 9688944
What you want is pretty easy to accomplish. I'd use sendmail+MailScanner+McAfee (or CA's eTrust) and have the anti-spam/anti-virus gateway relay the mail to the appropriate internal mail server. MailScanner isn't too hard to set up, especially on a RedHat system and it does a really good job of anti-spam control. you can read more about it at http://www.sng.ecs.soton.ac.uk/mailscanner/index.html
0
 
LVL 12

Assisted Solution

by:paullamhkg
paullamhkg earned 137 total points
ID: 9815638
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Currently, there is not an RPM package available under the RHEL/Fedora/CentOS distributions that gives you a quick and easy way to allow PHP to interface with Oracle. As a result, I have included a set of instructions on how to do this with minimal …
Network Interface Card (NIC) bonding, also known as link aggregation, NIC teaming and trunking, is an important concept to understand and implement in any environment where high availability is of concern. Using this feature, a server administrator …
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now