Solved

Postfix multiple instance problem

Posted on 2011-02-26
2
1,016 Views
Last Modified: 2012-05-11

I have created  new instance of postfix as postfix-2 using postmulti command ,I have edited the master.conf of instance postfix-2 to open port 855 for smtp.But still unable to see or connect to open port 855.

Please fins main.cf and master for main instance and postfix-1 in attachement.

here are the steps which i did to create 2nd instance.

# postmulti -e init
# postmulti -I postfix-2 -e create

My requirement is to tun bot instances separately eg. 1st instance runs on port 25 and 2nd runs on port 855



 main-postfix.txt main-postfix.txt master-postfix.txt main-postfix-2.txt master-postfix-2.txt
0
Comment
Question by:oppofwar
2 Comments
 
LVL 6

Accepted Solution

by:
de2Zotjes earned 500 total points
ID: 34986324
From where are you connecting to this port 855? Because in the master-postfix-2 file that instance is told to only listen on localhost.

Could you run this command and paste the output here?
netstat -tlnp|grep master

Open in new window

0
 
LVL 3

Author Comment

by:oppofwar
ID: 34986534
here is the output you have asked for  :

tcp        0      0 127.0.0.1:10024         0.0.0.0:*               LISTEN      903/amavisd (master
tcp        0      0 0.0.0.0:855             0.0.0.0:*               LISTEN      14417/master    
tcp        0      0 0.0.0.0:825             0.0.0.0:*               LISTEN      1448/master    

Its working Thanks Buddy

root@mail:/etc/postfix-2# telnet 10.0.0.185 855
Trying 10.0.0.185...
Connected to 10.0.0.185.
Escape character is '^]'.
220 mail.localdomain ESMTP Postfix (@@DISTRO@@)


but i was confused due to nmap output , it didnt show 855 open

22/tcp    open  ssh
25/tcp    open  smtp
80/tcp    open  http
110/tcp   open  pop3
143/tcp   open  imap
993/tcp   open  imaps
995/tcp   open  pop3s
3306/tcp  open  mysql
10024/tcp open  unknown


Anyways thanks for clearing my confusion
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This process describes the steps required to Import and Export data from and to .pst files using Exchange 2010. We can use these steps to export data from a user to a .pst file, import data back to the same or a different user, or even import data t…
Fine Tune your automatic Updates for Ubuntu / Debian
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now