I hope this helps:

 In SMTP Security (IMail Administrator | localhost) you
  want Relay for Addresses. List the IP addresses 
  (and/or subnets) that you want to Relay Mail For.

  It is necessary to stop and re-start the SMTP service after the
change.

  Your users who send from IP addresses that you do not list can set
their
  mail clients to do an SMTP login ("My outgoing mail server requires
authentication").

  Please see:

  http://support.ipswitch.com/kb/IM-19980116-JB02.htm
  IMail - Mail Relay Options

  Dave


In reply to 11 Jun message from [EMAIL PROTECTED]:


>HI

> I have managed to get very confused about mail relay options
>can some one elaborate on this.

>Cheers

>Jez




>-----Original Message-----
>From: [EMAIL PROTECTED]
>[mailto:[EMAIL PROTECTED]]On Behalf Of Mark
>McDonald Sent: 11 June 2001 11:16
>To: [EMAIL PROTECTED]
>Subject: RE: [IMail Forum] DoS attacks, behind the keyboard 


>This "Mr. Gibson guy" goes "through what every networking
>rookie seeing and trying to combat their first dos attack." 
>Yea right.  I'm really sure you're capable of writing the
>software he has and the time to invest in IRC bots,
>decompiling code, etc.  Unlike ISP's which just want the
>problem fixed, Mr. Gibson seems to view it more as a learning
>experience and wants to see how it REALLY works.  He knew
>there's nothing he could on his own against a DOS attack, and
>neither can anyone else without the help of their upstream
>provider which at times can still be of no use.

>-Mark McDonald
>Siteserver Account Executive

>EMail: [EMAIL PROTECTED]
>Voice: 800.610.9856 Ext 231
>Cell:  805.857.5614
>Fax:   888.333.2710



>-----Original Message-----
>From: Jon Hall [mailto:[EMAIL PROTECTED]]
>Sent: Sunday, June 10, 2001 12:15 PM
>To: [EMAIL PROTECTED]
>Subject: Re: [IMail Forum] DoS attacks, behind the keyboard 


> Scott Perry wrote:

>>
>>> So...Mr. grc was finally DOS'd and he write's a long essay about
>>> something
>>> we have been fighting for years, and somehow it's BlackIce's fault?
>>
>>
>> They are actually very well written and informative articles (both
the

>> original and the follow-up).  I saw the BlackIce comment, but to me
>> the comment didn't really seem anything out of the ordinary.  If I
>> recall correctly, BlackIce allowed trojan horses to send and receive
>> packets without being caught.  That's an extremely bad thing for a
>> firewall to do.  If the trojan horse bypassed BlackIce's security
>> system somehow, it's not BlackIce's fault, it is the users' fault for
>> using a software firewall and opening a bad attachment.  But, it
>> sounds like it is a flaw specific to BlackIce (they just aren't
>> scanning some ports).
>>
>>                                                            -Scott

>Ok, so this Gibson guy, figures out what a dos attack is. He
>goes through what every networking rookie seeing and trying
>to combat 

>their first dos attack.
>He apparently does not know what subseven does or how it
>works even though he has been writing about it for years
>, and even more bizarrely goes about coding a " Markov-chain 
>finite-state statistical dialog modeller" to
>hunt these hackers down on their own turf, irc! He could have
>just knocked....
>Then he has a wonderful insight on how to scan for these
>trojans, which every 10 year old has known for years.

>He winds up this huge newbiefest by badmouthing BlackIce for
>not doing something it is not designed to do. I'm amazed that
>he did not know this 

>already after evangelizing about it for years.

>You like Mr Gibson  apparently don't see the difference
>between ZoneAlarm and BlackIce. For BlackIce to block
>potential trojan's it would need to work more like ZoneAlarm,
>which necessitates permissions before sending any traffic.
>This is impossible in a server environment, where the
>BlackIce's superiority as an information gathering tool is 
>invaluable. BlackIce is not free, and is aimed at a totally
>different market. It's NOT a trojan blocker and never claimed
>to be one. I kind of hope Mr. Gibson scares a whole lot of
>the clueless away from BlackIce though. Working at an isp,
>not a week goes by where some moron does not call wondering
>why he is getting hacked, and he has all sorts of evidence
>because he has BlackIce now. Good riddance! 

>If I was Network Ice, I'd have already sent him a letter
>demanding his slanderous remarks be removed from his site.
>In the end, all of his problems are really Verio's fault for
>not configuring grc's upstream routers properly from the
>start. 

>jon


>Please visit
>http://www.ipswitch.com/support/mailing-lists.html to be
>removed from this list.

>An Archive of this list is available at:
>http://www.mail-archive.com/imail_forum%40list.ipswitch.com/ 

>Please visit
>http://www.ipswitch.com/support/mailing-lists.html to be
>removed from this list.

>An Archive of this list is available at:
>http://www.mail-archive.com/imail_forum%40list.ipswitch.com/ 


>Please visit
>http://www.ipswitch.com/support/mailing-lists.html to be
>removed from this list.

>An Archive of this list is available at:
>http://www.mail-archive.com/imail_forum%40list.ipswitch.com/ 




Please visit http://www.ipswitch.com/support/mailing-lists.html 
to be removed from this list.

An Archive of this list is available at:
http://www.mail-archive.com/imail_forum%40list.ipswitch.com/

Reply via email to