Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Watchguard XTM 22 - Need to allow mail relay from specific IP address

Posted on 2012-03-29
3
Medium Priority
?
1,111 Views
Last Modified: 2012-03-29
Hi there,

Looking for some expertise on a Watchguard XTM product.  I have one in place that uses the SMTP Incoming Proxy.  I have an external company that I will be using for an online store application that requires the ability to send mail through my internal mail server (Exchange 2007 on an SBS 2008 server).  I've configured the Exchange server to allow the relay, but I seem to be getting hooked on at the Watchguard box.  What I have is the originating IP address of the external server that needs to be allowed to relay mail from my internal server.

Any ideas?
0
Comment
Question by:mphackett
  • 2
3 Comments
 
LVL 10

Expert Comment

by:joelsplace
ID: 37783382
I don't know about Watchguard but I called Barracuda last week about the same thing.  Barracuda does not support it.
If you have more than one public IP you could point the external company to a different IP and route it around your Watchguard.
0
 
LVL 10

Accepted Solution

by:
joelsplace earned 1500 total points
ID: 37783387
Even with one IP you could just use a different port to get around the Watchguard.
0
 

Author Comment

by:mphackett
ID: 37785298
Actually, I believe my situation has now changed - it's the Exchange server on the SBS 2008 box that is giving me the grief.  I had it setup and working for the relay, but it began to bounce other messages.

I'll close this question for now and re-post with my actual problem.

Sorry!
0

Featured Post

Get your Disaster Recovery as a Service basics

Disaster Recovery as a Service is one go-to solution that revolutionizes DR planning. Implementing DRaaS could be an efficient process, easily accessible to non-DR experts. Learn about monitoring, testing, executing failovers and failbacks to ensure a "healthy" DR environment.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Phishing emails are a popular malware delivery vehicle for attack.  While there are many ways for an attacker to increase the chances of success for their phishing emails, one of the most effective methods involves spoofing the message to appear to …
This article will show you step-by-step instructions to build your own NTP CentOS server.  The network diagram shows the best practice to setup the NTP server farm for redundancy.  This article also serves as your NTP server documentation.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Suggested Courses

926 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question