22
Chapter 2: Managing SMTP Services
Configuring Network Services
You do not need to modify the IRIX configuration files on the firewall to support SMTP
traffic. This is a standard service, and you can use gauntlet-admin to modify the
configuration files. If you need to, you can instruct gauntlet-admin to not make
modifications so you can make the customizations for your site.
Configuring the Proxy Rules
You should not need to modify the proxy rules for SMTP services. If you do decide to
modify /usr/gauntlet/config/template.netperm-table, you may wish to add the badadmin
attribute for debugging purposes. Information sent to this alias aids greatly in debugging
mail delivery problems. See Appendix B, “Netperm Table” for more information on smap
and smapd options, netperm-table options, and order of precedence.
Advertising the Firewall as a Mail Exchanger
You need to advertise the firewall as the mail exchange site for your domain. The DNS
configuration in gauntlet-admin can do this for you. Consult the section on DNS
configuration for specific instructions.
Configuring Your Internal Mail Hub
As long as you are using transparency to pass all packets for outside networks to the
firewall, you do not need to configure your internal mail hub or mail agents. Because of
the transparency, attempts to deliver to outside network hosts will be grabbed by the
firewall.
If you are not using transparency, configure your internal mail hub to use the firewall as
a mail forwarder, and direct clients to the internal mail hub. If you don’t have an internal
mail hub, configure the clients to use the firewall directly as a mail forwarder.
Summary of Contents for Gauntlet
Page 1: ...Gauntlet for IRIX Administrator s Guide Document Number 007 2826 004 ...
Page 16: ......
Page 26: ......
Page 27: ...PART ONE Understanding the Gauntlet Internet Firewall I ...
Page 28: ......
Page 43: ...PART TWO Configuring and Using Proxies II ...
Page 44: ......
Page 50: ......
Page 56: ......
Page 64: ......
Page 72: ......
Page 94: ......
Page 109: ...PART THREE Administering General Gauntlet Firewall Services III ...
Page 110: ......
Page 140: ......
Page 147: ...Introductory Management Form 121 Figure 17 4 Gauntlet Introductory Management Form 2 of 3 ...
Page 155: ...Routing Configuration Form 129 Figure 17 8 Routing Configuration Form ...
Page 163: ...Proxy Servers Configuration Form 137 Figure 17 11 Proxy Servers Configuration Form 2 of 3 ...
Page 170: ...144 Chapter 17 The Graphical Management Interface Figure 17 13 DNS Configuration Form 1 of 2 ...
Page 171: ...DNS Configuration Form 145 Figure 17 14 DNS Configuration Form 2 of 2 ...
Page 177: ...Sendmail on Gauntlet Servers 151 Figure 17 15 Sendmail Configuration Form ...
Page 187: ...Logfiles and Reports Configuration Form 161 Figure 17 20 Reports and Logfiles Form 1 of 2 ...
Page 191: ...Authorizing Users Form 165 Figure 17 22 Authorizing Users Form ...
Page 192: ...166 Chapter 17 The Graphical Management Interface Figure 17 23 Add User Form ...
Page 214: ......
Page 232: ......
Page 233: ...Appendixes IV ...
Page 234: ......
Page 294: ......
Page 305: ......