The information in this article applies to:
IMPORTANT: This article contains information about editing the registry. Before you edit the registry, make sure you understand how to restore it if a problem occurs. For information about how to do this, view the "Restoring the Registry" Help topic in Regedit.exe or the "Restoring a Registry Key" Help topic in Regedt32.exe. SUMMARY
Administrators of Microsoft Exchange Server version 5.5 can prevent their server from acting as a relay host for unsolicited commercial
e-mail (UCE) messages. Using Exchange Server version 5.5 Service Pack 1 (SP1), the administrator can configure these options on the Routing tab in the properties of the Internet Mail Service object. MORE INFORMATIONWARNING: Using Registry Editor incorrectly can cause serious problems that
may require you to reinstall your operating system. Microsoft cannot
guarantee that problems resulting from the incorrect use of Registry Editor
can be solved. Use Registry Editor at your own risk. 550 relaying prohibited.To configure relay restrictions in the registry, use the values in the following registry key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Service\MSExchangeIMC\ParametersThe following examples outline the value, the data type, and the function the value performs. After you make the changes, stop the Internet Mail Service, and then restart it.
Defines which relay control rules are in effect. Specifies hosts that cannot relay messages through your server. Specifies hosts that can relay messages through your server. Specifies the local IP addresses of the server that an SMTP client can connect to and relay mail. This is useful for multi-homed servers that have internal and external interfaces. Enabling IP forwarding disables this feature. Net[;mask]If the mask is omitted, the default used is 255.255.255.255. A net address matches a rule if the bitwise-AND of the IP address and the mask equals the net. That is: (IP Address AND mask) = netFor example:
192.168.0.0;255.255.0.0 192.168.1.17;255.255.255.255
Set bit 1 of RelayFlags (set its decimal value to 1), and add a rule to RelayDenyList for each host or group of hosts that you want to deny. To prevent all hosts on the subnet 192.168.17.0 from relaying mail, add the following line to RelayDenyList: 192.168.17.0;255.255.255.0 Set bit 2 of RelayFlags (set its decimal value to 2), and add a rule to RelayAllowLists for each host or group of hosts that you want to allow. To allow all hosts on subnet 192.168.1.0 to relay mail, add the following line to RelayAllowList. 192.168.1.0;255.255.255.0 To allow all hosts on a subnet, set bit 2 of RelayFlags (set its decimal value to 2), and add a rule to RelayAllowList to match the subnet. For the subnet 192.168.1.0, the following rule works: 192.168.1.0;255.255.255.0To prevent a subset of the hosts on subnet 192.168.1.0 from relaying mail, also set bit 1 in RelayFlags in addition to bit 2, (which was set above); the net result is to set its decimal value to 3. Add the IP address of each host to RelayDenyList. If the subset of hosts is grouped together, you can add a single rule to match all of them. For example, if 192.168.1.1 through 192.168.1.7 are not allowed to relay, the following rule is adequate. Listing each address explicitly in RelayDenyList also works. 192.168.1.0;255.255.255.248 If you set the SMTP Interface Events diagnostics logging category to minimum or a higher logging level in the Internet Mail Service Diagnostic Logging property page, when a message is denied for relay through the Internet Mail Service an event is logged to the application event log. The event indicates the sender's IP address, sender's host name (if available), the sender's authentication account (if authentication was used), and the recipient address for the message. Additional query words: XADM anti spam anti-spam
Keywords : exc55 |
Last Reviewed: November 4, 1999 © 2000 Microsoft Corporation. All rights reserved. Terms of Use. |