Solved

Avoid mail loops when sharing smtp address space

Posted on 2008-06-23
1
762 Views
Last Modified: 2013-11-30
Hi all

I've used KB321721 to share a domain smtp address between two exchange 2003 servers in different orgs.

Because of the sharing, when a user types a non-existent email-address on that email domain, the mail loops between the two servers til' an NDR is generated.

¿Is there any way to avoid this?
0
Comment
Question by:ikerasd
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 71

Accepted Solution

by:
Chris Dent earned 125 total points
ID: 21856342

Hey,

Only by making one of the servers authoritative for the domain.

You would have to configure Contacts for the recipients on the other mail server if you do choose that option. The contacts would have to have an extra SMTP address outside the authoritative domain to get mail from the authoritative server.

e.g.

Server1 - Non-Authoritative. Forwards mail to Server2 if non-local recipient. All recipients have @domain.com and @server1.domain.com

Server2 - Authoritative. Holds contacts for all recipients on Server1. Forwards mail for recipients on server1 to @server1.domain.com (generally via an SMTP connector)

Otherwise there's simply no way to know whether a message is sent to a non-existent address because neither server really claims authority.

Chris
0

Featured Post

PeopleSoft Has Never Been Easier

PeopleSoft Adoption Made Smooth & Simple!

On-The-Job Training Is made Intuitive & Easy With WalkMe's On-Screen Guidance Tool.  Claim Your Free WalkMe Account Now

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When you’re making plans to join the modern business race, you should analyze various details that may affect your results. Nowadays, millions of businesses are trying to grow into established and appreciated professional enterprises.
As cyber crime continues to grow in both numbers and sophistication, a troubling trend of optimization has emerged over the last year.
The basic steps you have just learned will be implemented in this video. The basic steps are shown to configure an Exchange DAG in a live working Exchange Server Environment and manage the same (Exchange Server 2010 Software is used in a Windows Ser…
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question