Solved

IIS SMTP

Posted on 2011-09-27
4
478 Views
Last Modified: 2012-08-13
Hi,

We have an IIS SMTP Gateway server which runs on Windows Server 2003 and I want to configure recipient validation on IIS SMTP. Has anyone done this before.

0
Comment
Question by:itc_sysadmin
  • 2
  • 2
4 Comments
 
LVL 10

Expert Comment

by:gaurav05
ID: 36714797
Hi,

-->Access Tab

The security configuration settings that can be configured for SMTP on the Access tab are:

Access Control section of the Access tab: Click the Authentication button to configure an authentication method for the SMTP virtual server. This authentication method will be utilized when remote hosts attempt to create an incoming connection with the SMTP virtual server. Clicking the Authentication button opens the Authentication dialog
box. You can configure the following authentication methods:
Anonymous Access: This is the default authentication method. It is recommended to leave Anonymous Access enabled when the server is connected to the Internet.
Basic Authentication: Basic authentication utilizes a clear text user name and password, and is considered the weaker authentication method. It is recommended to enable Transport Layer Security (TLS), a version of SSL encryption, when you use Basic Authentication.
Integrated Windows Authentication: When enabled, users would need to provide a user name and password for authentication. Integrated Windows Authentication is usually enabled when the SMTP virtual server is used for transmitting mail to recipients on the Internet.
Secure Communication section of the Access tab: You can click the Certificate button to start the Web Server Certificate Wizard to obtain and install a server certificate on the SMTP virtual server. After the server certificate is installed. Click the Communication button to require secure communications.
Connection Controlsection of the Access tab: Click the Connection button to specify which computers are allowed or denied to access the SMTP server. You can specify computers by the following parameters:
IP address.
Network ID and subnet mask.
DNS domain name.
Relay Restrictionssection of the Access tab: Click the Relay button to configure which SMTP hosts are restricted from relaying messages through the SMTP virtual server to users. Clicking the Relay button opens the Relay Restrictions dialog box:
You can select the Only The List Below option, and specify which hosts are allowed, or you can select the All Except The List Below option and then specify which hosts are disallowed.
It is recommended to select the Allow All Computers Which Succesfully Authenticate to Relay, Regardless Of The List Above checkbox.
When configuring security configuration settings for the SMTP virtual server, the recommended best practices are:

Enable Anonymous access for inbound connections.
Enable Windows Integrated Authentication for inbound connections.
Enable the Allow All Computers Which Successfully Authenticate to Relay, Regardless Of The List Above checkbox on the Relay Restrictions dialog box so that relay access is denied to all computers with the exception being those computers have been authenticated.
Configuring the above security configuration settings results in:

Users on the internal network can connect to the SMTP virtual server, and be authenticated through Windows Integrated Authentication. These users. messages can then be relayed to recipients of remote domain.
SMTP hosts residing on the Internet would use Anonymous access to convey messages to the SMTP virtual server. The SMTP virtual server forwards these messages to the POP3 server, where it is placed into the mailbox of the user.
SMTP hosts attempting to send messages through SMTP to users located in other domain are prevented from doing so.
0
 

Author Comment

by:itc_sysadmin
ID: 36714816
IIS SMTP acts as a SMTP smart host for our internal exchange server. I would like recipient validation be done from the IIS SMTP server instead of coming right in to the exchange server
0
 
LVL 10

Accepted Solution

by:
gaurav05 earned 500 total points
ID: 36714871
0
 

Author Closing Comment

by:itc_sysadmin
ID: 36958301
Thanks that site helped alot
0

Featured Post

Optimizing Cloud Backup for Low Bandwidth

With cloud storage prices going down a growing number of SMBs start to use it for backup storage. Unfortunately, business data volume rarely fits the average Internet speed. This article provides an overview of main Internet speed challenges and reveals backup best practices.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A phishing scam that claims a recipient’s credit card details have been “suspended” is the latest trend in spoof emails.
A list of top three free exchange EDB viewers that helps the user to extract a mailbox from an unmounted .edb file and get a clear preview of all emails & other items with just a single click on mailboxes.
In this video we show how to create a Resource Mailbox in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: Navigate to the Recipients >> Resources tab.: "Recipients" is our default selection …
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question