This leaves me with a problem, if I set Webshield to listen on port 25 and pass on mail that's found to be clean then the DNS Blackhole feature of IMail will become disabled because all mail will be seen to be coming from the internal servers IP address (Webshield SMTP adds its own Received header).

Correct. That's how most anti-spam products work (ours was actually the first to scan multi-hops, allowing scenarios such as yours to work).


Is there a way to have IMail ignore received headers from the localhost address and look back at the previous received header to see where it came from before it hit the localhost?

IMail v8's anti-spam cannot do that; you would need an addon (such as our Declude JunkMail) to do that.


Or can you think of any other configuration that would allow WebShield SMTP to interact with the IMail server so that IMail answers the door (so to speak) on port 25 passes the SMTP traffic off to WebShield which then passes it back to the IMail message store on another port?

Unfortunately, you're stuck -- you want WebShield to run before IMail, which means that IMail won't see the IP of the remote mailserver (you have a choice of it seeing 127.0.0.1 if WebShield runs on the same server, or the internal IP if it runs on another server).


Since you already have anti-spam software in your setup, you may want to use it instead of the IMail v8 anti-spam.

-Scott
---
Declude JunkMail: The advanced anti-spam solution for IMail mailservers since 2000.
Declude Virus: Ultra reliable virus detection and the leader in mailserver vulnerability detection.
Find out what you've been missing: Ask for a free 30-day evaluation.


---
[This E-mail was scanned for viruses by Declude Virus (http://www.declude.com)]


To Unsubscribe: http://www.ipswitch.com/support/mailing-lists.html List Archive: http://www.mail-archive.com/imail_forum%40list.ipswitch.com/ Knowledge Base/FAQ: http://www.ipswitch.com/support/IMail/

Reply via email to