Solved

IIS SMTP

Posted on 2011-09-27
4
470 Views
Last Modified: 2012-08-13
Hi,

We have an IIS SMTP Gateway server which runs on Windows Server 2003 and I want to configure recipient validation on IIS SMTP. Has anyone done this before.

0
Comment
Question by:itc_sysadmin
  • 2
  • 2
4 Comments
 
LVL 10

Expert Comment

by:gaurav05
ID: 36714797
Hi,

-->Access Tab

The security configuration settings that can be configured for SMTP on the Access tab are:

Access Control section of the Access tab: Click the Authentication button to configure an authentication method for the SMTP virtual server. This authentication method will be utilized when remote hosts attempt to create an incoming connection with the SMTP virtual server. Clicking the Authentication button opens the Authentication dialog
box. You can configure the following authentication methods:
Anonymous Access: This is the default authentication method. It is recommended to leave Anonymous Access enabled when the server is connected to the Internet.
Basic Authentication: Basic authentication utilizes a clear text user name and password, and is considered the weaker authentication method. It is recommended to enable Transport Layer Security (TLS), a version of SSL encryption, when you use Basic Authentication.
Integrated Windows Authentication: When enabled, users would need to provide a user name and password for authentication. Integrated Windows Authentication is usually enabled when the SMTP virtual server is used for transmitting mail to recipients on the Internet.
Secure Communication section of the Access tab: You can click the Certificate button to start the Web Server Certificate Wizard to obtain and install a server certificate on the SMTP virtual server. After the server certificate is installed. Click the Communication button to require secure communications.
Connection Controlsection of the Access tab: Click the Connection button to specify which computers are allowed or denied to access the SMTP server. You can specify computers by the following parameters:
IP address.
Network ID and subnet mask.
DNS domain name.
Relay Restrictionssection of the Access tab: Click the Relay button to configure which SMTP hosts are restricted from relaying messages through the SMTP virtual server to users. Clicking the Relay button opens the Relay Restrictions dialog box:
You can select the Only The List Below option, and specify which hosts are allowed, or you can select the All Except The List Below option and then specify which hosts are disallowed.
It is recommended to select the Allow All Computers Which Succesfully Authenticate to Relay, Regardless Of The List Above checkbox.
When configuring security configuration settings for the SMTP virtual server, the recommended best practices are:

Enable Anonymous access for inbound connections.
Enable Windows Integrated Authentication for inbound connections.
Enable the Allow All Computers Which Successfully Authenticate to Relay, Regardless Of The List Above checkbox on the Relay Restrictions dialog box so that relay access is denied to all computers with the exception being those computers have been authenticated.
Configuring the above security configuration settings results in:

Users on the internal network can connect to the SMTP virtual server, and be authenticated through Windows Integrated Authentication. These users. messages can then be relayed to recipients of remote domain.
SMTP hosts residing on the Internet would use Anonymous access to convey messages to the SMTP virtual server. The SMTP virtual server forwards these messages to the POP3 server, where it is placed into the mailbox of the user.
SMTP hosts attempting to send messages through SMTP to users located in other domain are prevented from doing so.
0
 

Author Comment

by:itc_sysadmin
ID: 36714816
IIS SMTP acts as a SMTP smart host for our internal exchange server. I would like recipient validation be done from the IIS SMTP server instead of coming right in to the exchange server
0
 
LVL 10

Accepted Solution

by:
gaurav05 earned 500 total points
ID: 36714871
0
 

Author Closing Comment

by:itc_sysadmin
ID: 36958301
Thanks that site helped alot
0

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Following basic email etiquette rules will help you write a professional email and achieve a good, lasting impression with your contacts.
Phishing attempts can come in all forms, shapes and sizes. No matter how familiar you think you are with them, always remember to take extra precaution when opening an email with attachments or links.
The basic steps you have just learned will be implemented in this video. The basic steps are shown to configure an Exchange DAG in a live working Exchange Server Environment and manage the same (Exchange Server 2010 Software is used in a Windows Ser…
how to add IIS SMTP to handle application/Scanner relays into office 365.

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question