Solved

How do I configure my receive connector to work with MX Logic

Posted on 2014-12-05
4
394 Views
Last Modified: 2015-04-13
We have configure our MX Logic Console and our MX records for spam filtering through MX Logic.  All emails are being rejected by the server with the message:host 208.65.144.245: no unauthenticated relaying permitted.

I added a new receive connector with the above IP address in the Receive mail from box on the network tab.  The "Use Local IP address" is set to (all available).

Authentication is set to Transport Layer Security (TLS); Basic authentication; integrated windows authentication

Permission group is set to: Anonymous users

I also have the default receive connector set as follows
Local IP address:  (all available) Port 25
Receive mail from remote servers (0.0.0.0-255.255.255.255)
Authentication: TLS; Basic authentication, other basic authentication only after starting tls; integrated windows authentication.
Permission groups: anonymous users; exchange users; exchange servers; legacy exchange servers.

Any help would be most appreciated.
0
Comment
Question by:Nancy Villa
  • 2
4 Comments
 
LVL 63

Expert Comment

by:Simon Butler (Sembee)
ID: 40483491
The default one will allow anyone to connect to your server. Therefore if you are following best practises then you should change that connector configuration.

HOWEVER, the true best practise is to limit the traffic to port 25 at your firewall, not on the Exchange server. I would only change the connector if the firewall isn't up to doing that.

Don't forget to restart the Transport service after making any changes.

Although looking at your message again, I am pretty sure that isn't an Exchange error. Turn on logging and see whether you are actually seeing connections from MXLOGIC.

Simon.
0
 
LVL 4

Expert Comment

by:SEHC
ID: 40483686
0
 

Accepted Solution

by:
Nancy Villa earned 0 total points
ID: 40713694
It was an issue with MX Logic that they resolved.
0
 

Author Closing Comment

by:Nancy Villa
ID: 40720416
Because their answers did not correct the issue.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Utilizing an array to gracefully append to a list of EmailAddresses
Marketers need statistics and metrics like everybody else needs oxygen. In this article we explain how to enable marketing campaign statistics for Microsoft Exchange mail.
In this video we show how to create a Distribution Group in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Recipients >>…
In this video we show how to create an Accepted Domain in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Mail Flow >> Ac…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now