On Thursday, February 3, 2005 at 2:21:28 AM, [EMAIL PROTECTED] confabulated:
>> How often to most on this list modify the SMTP control access >> list? > I find it much easier to do this at the Windows TCP/IP stack level, > or, better yet, at the router or firewall; In my case router would be a good choice. Firewall wouldn't. I've been working for the same Internet provider going on 7 years now and up until two years ago (because of a buy out) the e-mail servers were outside the firewall. Not once did we ever have an issue. Now, unfortunately, they are behide a firewall. I will eventually get them back outside. I'm always bugging one of our engineers to open ports up. Two of the servers have the full capacity for defending themselves through blocks right at the SMTP connection. > in both cases, you don't have to recycle any services. I totally forgot the fact you would have to stop/start the SMTP service. Then again, I myself can't recall the last time I did any modifications to the access list. > Doing this at the application level isn't, IMO, a best practice (though an > explicit > 'deny all except' at the app level is fine). > --Sandy > ------------------------------------ > Sanford Whiteman, Chief Technologist > Broadleaf Systems, a division of > Cypress Integrated Systems, Inc. > e-mail: [EMAIL PROTECTED] > SpamAssassin plugs into Declude! > > http://www.mailmage.com/products/software/freeutils/SPAMC32/download/release/ > Defuse Dictionary Attacks: Turn Exchange or IMail mailboxes into IMail > Aliases! > > http://www.mailmage.com/products/software/freeutils/exchange2aliases/download/release/ > > http://www.mailmage.com/products/software/freeutils/ldap2aliases/download/release/ ----- Duane Hill Sr E-Mail Administrator http://www.yournetplus.com To Unsubscribe: http://www.ipswitch.com/support/mailing-lists.html List Archive: http://www.mail-archive.com/imail_forum%40list.ipswitch.com/ Knowledge Base/FAQ: http://www.ipswitch.com/support/IMail/
