- CheckMates
- :
- Products
- :
- Quantum
- :
- Management
- :
- MTA first tier or not
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
MTA first tier or not
We currently have our MTA as first tier, and in sk114034 it is stated that this is not recommended.
We see the problems indicated, like invalid recipients not being detected.
Instead of just following the non-recommended solution, I wanted to know how other have their MTA and mail servers configured, and set up topology wise.
We use the checkpoint gateway as the first tier, and a secondary spam server as second tier, and then our mail server.
Do you have an additional spam filtering server in front of the firewall? how do you handle this?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
We see both, can depend if this is a perimeter gateway or dedicated TE appliance performing the MTA role.
(That said cloud hosted anti-spam services are common place, naturally these are outside... )
Historically the recommended topology helped to mitigate the risk of RBL / Back scatter challenges and help manage potential sizing constraints.
To your point avoiding system resources being consumed by unnecessary scanning / emulations due to processing of mail with spoofed sender addresses or lack of recipient verification is the way to go.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
We're running our checkpoint device with all blades enabled. our second anti spam is hosted internally.
I'm just wondering if I should put our second anti spam outside of the firewall, in which case I'd want to assign it it's own public IP and ensure it is hardened. I'm not sure if alternatively I could pass the mail directly to the internal anti spam, on the DMZ, for it to then pass back to the firewall to process with the MTA, to hand off to the exchange.
I'm mostly cautious of enabling VRFY on our internal exchange server for the MTA to query for recipient verification.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
That is one of the most poorly written SK's I've seen. I've submitted some feedback on it.
I'm not sure why the gateway can't just do ldap lookups or use it's relationship with active directory to do address verification, it seems almost every other product can do it.
We're going to look into a third party spam appliance to put at our perimeter, as suggested by checkpoint best practices. Hopefully checkpoint can become self sufficient in this area eventually.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
