Solved

IIS SMTP

Posted on 2011-09-27
4
449 Views
Last Modified: 2012-08-13
Hi,

We have an IIS SMTP Gateway server which runs on Windows Server 2003 and I want to configure recipient validation on IIS SMTP. Has anyone done this before.

0
Comment
Question by:itc_sysadmin
  • 2
  • 2
4 Comments
 
LVL 10

Expert Comment

by:gaurav05
ID: 36714797
Hi,

-->Access Tab

The security configuration settings that can be configured for SMTP on the Access tab are:

Access Control section of the Access tab: Click the Authentication button to configure an authentication method for the SMTP virtual server. This authentication method will be utilized when remote hosts attempt to create an incoming connection with the SMTP virtual server. Clicking the Authentication button opens the Authentication dialog
box. You can configure the following authentication methods:
Anonymous Access: This is the default authentication method. It is recommended to leave Anonymous Access enabled when the server is connected to the Internet.
Basic Authentication: Basic authentication utilizes a clear text user name and password, and is considered the weaker authentication method. It is recommended to enable Transport Layer Security (TLS), a version of SSL encryption, when you use Basic Authentication.
Integrated Windows Authentication: When enabled, users would need to provide a user name and password for authentication. Integrated Windows Authentication is usually enabled when the SMTP virtual server is used for transmitting mail to recipients on the Internet.
Secure Communication section of the Access tab: You can click the Certificate button to start the Web Server Certificate Wizard to obtain and install a server certificate on the SMTP virtual server. After the server certificate is installed. Click the Communication button to require secure communications.
Connection Controlsection of the Access tab: Click the Connection button to specify which computers are allowed or denied to access the SMTP server. You can specify computers by the following parameters:
IP address.
Network ID and subnet mask.
DNS domain name.
Relay Restrictionssection of the Access tab: Click the Relay button to configure which SMTP hosts are restricted from relaying messages through the SMTP virtual server to users. Clicking the Relay button opens the Relay Restrictions dialog box:
You can select the Only The List Below option, and specify which hosts are allowed, or you can select the All Except The List Below option and then specify which hosts are disallowed.
It is recommended to select the Allow All Computers Which Succesfully Authenticate to Relay, Regardless Of The List Above checkbox.
When configuring security configuration settings for the SMTP virtual server, the recommended best practices are:

Enable Anonymous access for inbound connections.
Enable Windows Integrated Authentication for inbound connections.
Enable the Allow All Computers Which Successfully Authenticate to Relay, Regardless Of The List Above checkbox on the Relay Restrictions dialog box so that relay access is denied to all computers with the exception being those computers have been authenticated.
Configuring the above security configuration settings results in:

Users on the internal network can connect to the SMTP virtual server, and be authenticated through Windows Integrated Authentication. These users. messages can then be relayed to recipients of remote domain.
SMTP hosts residing on the Internet would use Anonymous access to convey messages to the SMTP virtual server. The SMTP virtual server forwards these messages to the POP3 server, where it is placed into the mailbox of the user.
SMTP hosts attempting to send messages through SMTP to users located in other domain are prevented from doing so.
0
 

Author Comment

by:itc_sysadmin
ID: 36714816
IIS SMTP acts as a SMTP smart host for our internal exchange server. I would like recipient validation be done from the IIS SMTP server instead of coming right in to the exchange server
0
 
LVL 10

Accepted Solution

by:
gaurav05 earned 500 total points
ID: 36714871
0
 

Author Closing Comment

by:itc_sysadmin
ID: 36958301
Thanks that site helped alot
0

Featured Post

Better Security Awareness With Threat Intelligence

See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

Join & Write a Comment

Follow this checklist to learn more about the 15 things you should never include in an email signature from personal quotes, animated gifs and out-of-date marketing content.
Scam emails are a huge burden for many businesses. Spotting one is not always easy. Follow our tips to identify if an email you receive is a scam.
Familiarize people with the process of utilizing SQL Server stored procedures from within Microsoft Access. Microsoft Access is a very powerful client/server development tool. One of the SQL Server objects that you can interact with from within Micr…
Familiarize people with the process of retrieving data from SQL Server using an Access pass-thru query. Microsoft Access is a very powerful client/server development tool. One of the ways that you can retrieve data from a SQL Server is by using a pa…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now