![]() |
|
![]() |
![]() |
![]() |
|||
|
|
MailGate Support Issues Q. How can I make MailGate secure against outside hacking? A. Although not a firewall in the true sense, when correctly configured and by using the proxy principle, a MailGate installation can be secured from outside intrusion. The configuration comprises two key steps, preventing access to TCP/IP service sockets and preventing access to NT services. 1. Preventing access to IP sockets It's unlikely that you'll require any of the services MailGate uses to be open for remote access - except SMTP if you receive a feed from your ISP, and possibly POP and SMTP if you have users out of office that need to send/receive mail via MailGate. In a standard POP3 collection installation there should be no need to allow external access to any MailGate IP service socket. If external access is via a secondary adapter (i.e. dial-up or network card on the same machine as MailGate), this can be achieved by simply binding the MailGate services to the internal adapter IP address:
![]() If external access is via a router attached directly to the local LAN, access can be controlled by carefully setting the Advanced Setup/Security settings to deny access via the router:
![]() Note: In both cases, if mail is sent into MailGate from an external location by SMTP then please check the FAQ concerning SMTP Relay. Care should also be taken to ensure that any other services running on the server are also secured. A typical example is Microsoft IIS which may also be active. Refer to the relevant product documentation for further information. 2. Preventing access to NT services
Visit grc.com for more information. ![]() |
![]() |
|