Index DocHome Next |
iPlanet Messaging Server 5.0 Administrator's Guide |
Contents
About This GuideWho Should Read This Book
Chapter 1 Introduction
What You Need to Know
How This Book is Organized
Document Conventions
Monospaced Font
Where to Find Related Information
Bold Monospaced Font
Italicized Font
Square or Straight Brackets
Command Line Prompts
Where to Find This Book Online
Support for Standard Protocols
Chapter 2 Configuring General Messaging Capabilities
Support for Hosted Domains
Support for User Provisioning
Support for Unified Messaging
Support for Webmail
Powerful Security and Access Control
Convenient User Interfaces
Post-Installation Directory and File Organization
Viewing Basic Server Information
Chapter 3 Managing Mail Users and Mailing Lists
Starting and Stopping Services
Configuring a Greeting Message
Configuring Languages for Auto-Reply Messages
Choosing a User-Preferred Language
Enabling Single Sign-On (SSO)
Configuring a Server Site Language
Messenger Express SSO Configuration Parameters
Customizing Directory Lookups
Messenger Express and Delegated Administrator for Messaging
Step 1a. Create a Proxy User Account
Step 1b. Create an ACI for Proxy Authentication
Step 2a. Add the Proxy User Credentials to the resource.properties File
Step 2b. Add the Single Sign-On Cookie Information
Step 2c. Add the Participating Servers Verification URL
Step 3. Restart the Enterprise Server
Encryption Settings
Introduction
Chapter 4 Configuring POP, IMAP, and HTTP Services
Managing Mail Users
Accessing Mail Users
Managing Mailing Lists
Creating a New User
Specifying User Email Addresses
Accessing an Existing User
Configuring Delivery Options
Specifying POP/IMAP Delivery
Specifying Forwarding Addresses
Specifying Program Delivery
Specifying UNIX Delivery
Configuring Auto-Reply Settings
Configuring Authorized Services
Accessing Mailing Lists
Creating a New Group
Specifying Mailing List Settings
Accessing an Existing Group
Specifying List Members
Defining Dynamic Membership Criteria
Defining Message-Posting Restrictions
Adding Mailing-List Members
Defining Moderators
General Configuration
Chapter 5 Messaging Multiplexor
Enabling and Disabling Services
Login Requirements
Specifying Port Numbers
Ports for Encrypted Communications
IMAP Over SSL
Service Banner
HTTP Over SSL
Password-Based Login
Performance Parameters
Certificate-Based Login
Number of Processes
Client Access Controls
Number of Connections per Process
Number of Threads per Process
Dropping Idle Connections
Logging Out HTTP Clients
Configuring POP Services
Configuring IMAP Services
Configuring HTTP Services
About Messaging Multiplexor
Chapter 6 About MTA Services and Configuration
Multiplexor Benefits
Configuring Multiplexor
How Multiplexor Works
Encryption (SSL) Option
Certificate-Based Client Authentication
User Pre-Authentication
Virtual Domains
Multiple Multiplexor Instances
Starting Multiplexor
A Sample Topology
IMAP Configuration Example
POP Configuration Example
The Message Transfer Agent (MTA)
Chapter 7 Configuring Rewrite Rules
Channels
Master and Slave Programs
Rewrite Rules
Channel Message Queues
The Job Controller
The Dispatcher
Creation and Expiration of Server Processes
The MTA Configuration File
Controlling the Dispatcher
Other MTA Configuration Files
Autoreply Option File
Aliases
Alias File
TCP/IP Channel Option Files
Conversion File
Dirsync Option File
Dispatcher Configuration File
Mapping File
Option File
Tailor File
Job Controller File
Examples of Use
The Alias Database
Command Line Utilities
The Alias File
Including Other Files in the Alias File
The MTA Directory Cache
Synchronization Configuration Parameters
SMTP Security and Access Control
Log Files
Rewrite Rule Structure
Chapter 8 Configuring Channel Definitions
Rewrite Rule Patterns and Tags
A Rule to Match Percent Hacks
Rewrite Rule Templates
A Rule to Match Bang-Style (UUCP) Addresses
A Rule to Match Any Address
Tagged Rewrite Rule Sets
Ordinary Rewriting Templates: A%B@C or A@B
How the MTA Applies Rewrite Rules to an Address
Repeated Rewrites Template, A%B
Specified Route Rewriting Templates, A@B@C@D or A@B@C
Case Sensitivity in Rewrite Rule Templates
Step 1. Extract the First Host or Domain Specification
Template Substitutions and Rewrite Rule Control Sequences
Step 2. Scan the Rewrite Rules
Step 3. Rewrite Address According to Template
Step 4. Finish the Rewrite Process
Rewrite Rule Failure
Syntax Checks After Rewrite
Handling Domain Literals
Username and Subaddress Substitution, $U, $0U, $1U
Handling Large Numbers of Rewrite Rules
Host/Domain and IP Literal Substitutions, $D, $H, $nD, $nH, $L
Literal Character Substitutions, $$, $%, $@
LDAP Query URL Substitutions, $]...[
General Database Substitutions, $(...)
Apply Specified Mapping, ${...}
Customer-supplied Routine Substitutions, $[...]
Single Field Substitutions, $&, $!, $*, $#
Unique String Substitutions
Source-Channel-Specific Rewrite Rules ($M, $N)
Destination-Channel-Specific Rewrite Rules ($C, $Q)
Direction-and-Location-Specific Rewrite Rules ($B, $E, $F, $R)
Host-Location-Specific Rewrites ($A, $P, $S, $X)
Changing the Current Tag Value, $T
Controlling Error Messages Associated with Rewriting ($?)
Testing Rewrite Rules
Rewrite Rules Example
Channel Structure
Chapter 9 Mail Filtering and Access Control
Predefined Channels
Configuring SMTP Channels
SMTP Command and Protocol Support
Configuring Message Processing and Delivery
Channel Protocol Selection and Line Terminators
TCP/IP Connection and DNS Lookup Support
EHLO Command Support
ETRN Command Support
VRFY Command Support
DNS Domain Verification
Character Set Labeling and Eight-Bit Data
Protocol Streaming
TCP/IP Port Number and Interface Address
SMTP Authentication and SASL
Caching for Channel Connection Information
DNS Lookups
IDENT Lookups
TCP/IP MX Record Support
Nameserver Lookups
Last Resort Host
Alternate Channels for Incoming Mail
Target Host Choice
Transport Layer Security
Channel Operation Type
Delivery of Messages
Configuring Messages Sent to the Postmaster
Processing Pools for Channel Execution Jobs
Service Job Limits
Message Priority Based on Size
SMTP Channel Threads
Expansion of Multiple Addresses
Undeliverable Message Notification Times
Configuring Channel Options
Configuring Channel Defaults
Configuring Logging for Channels
Configuring Debugging for Channels
Setting Up Program Delivery
Using the Hold Channel
Using the Conversion Channel
Selecting Traffic for Conversion Processing
Understanding Conversions
Configuration of the Conversion Channel
Conversion Control
Character Set Conversion and Message Reformatting Mapping
Character Set Conversion
Service Conversions
Message Reformatting
PART 1. MAPPING TABLES
Chapter 10 Managing the Message Store
Controlling Access with Mapping Tables
SEND_ACCESS and ORIG_SEND_ACCESS Tables
When Access Controls Are Applied
MAIL_ACCESS and ORIG_MAIL_ACCESS Mapping Tables
FROM_ACCESS Mapping Table
PORT_ACCESS Mapping Table
Testing Access Control Mappings
Configuring SMTP Relay Blocking
Differentiate Between Internal and External Mail
Handling Large Numbers of Access Entries
Differentiate Authenticated Users' Mail
Prevent Mail Relay
Allowing localhost Submissions to the SMTP Port
Mapping Table Flags
PART 2. MAILBOX FILTERS
Introduction
Creating Per-User Filters
Creating Channel-Level Filters
Creating MTA-Wide Filters
Routing Discarded Messages out The FILTER_DISCARD Channel
Debugging User Filters
Overview
Chapter 11 Configuring Security and Access Control
Message Store Directory Layout
How the Store Erases Message
Specifying Administrator Access to the Store
Adding an Administrator
About Message Store Quotas
Modifying an Administrator Entry
Deleting an Administrator Entry
User Quotas
Configuring Message Store Quotas
Domain Quotas and Family Group Quotas
Exceptions for Telephony Application Servers
Specifying a Default User Quota
Specifying Aging Policies
Enabling Quota Enforcement and Notification
Enabling Quota Enforcement
Setting a Grace Period
Enabling Quota Notification
Defining a Quota Warning Message
Specifying a Quota Threshold
Configuring Message Store Partitions
Adding a Partition
Performing Maintenance and Recovery Procedures
Managing Mailboxes
Backing Up and Restoring the Message Store
The mboxutil Utility
Monitoring Quota Limits
The hashdir Utility
The readership Utility
Monitoring Disk Space
Using the stored Utility
Repairing Mailboxes and the Mailboxes Database
Rebuilding Mailboxes
Moving a User's Account
Checking and Repairing Mailboxes
Removing Orphaned Accounts
reconstruct Performance
Creating a Backup Policy
How Users Are Provisioned
Creating Backup Groups
Peak Business Loads
Full and Incremental Backups
Parallel or Serial Backups
Messaging Server Backup and Restore Utilities
The imsbackup Utility
Considerations for Partial Restore
The imsrestore Utility
Using Legato Networker
Backing Up Data Using Legato Networker
Restoring Data Using Legato Networker
About Server Security
Chapter 12 Logging and Log Analysis
About HTTP Security
Configuring Authentication Mechanisms
Configuring Access to Plaintext Passwords
User Password Login
Transitioning Users
IMAP, POP, and HTTP Password Login
Configuring Encryption and Certificate-Based Authentication
SMTP Password Login
Obtaining Certificates
Configuring Administrator Access to Messaging Server
Managing Internal and External Modules
Enabling SSL and Selecting Ciphers
Requesting a Server Certificate
Installing the Certificate
Installing Certificates of Trusted CAs
Managing Certificates and Trusted CAs
Creating a Password File
About Ciphers
Setting Up Certificate-Based Login
Hierarchy of Delegated Administration
Configuring Client Access to POP, IMAP, and HTTP Services
Providing Access to the Server as a Whole
Restricting Access to Specific Tasks
How Client Access Filters Work
Configuring Client Access to SMTP Services
Filter Syntax
Wildcard Names
Filter Examples
Wildcard Patterns
EXCEPT Operator
Server-Host Specification
Client User-Name Specification
Mostly Denying
Creating Access Filters for Services
Mostly Allowing
Allowing Only Identified Users
Denying Access to Spoofed Domains
Controlling Access to Virtual Domains
Denying an Individual User
Creating Access Filters for HTTP Proxy Authentication
PART 1: Introduction
Glossary
Logged Services
PART 2: Service Logs (Message Store and Administration Server)
Analyzing Logs with Third-Party Tools
Log Characteristics
PART 3: Service Logs (MTA)
Logging Levels
Log File Format
Categories of Logged Events
Filename Conventions for Message Store and Administration Logs
Log-File Directories
Defining and Setting Logging Options
Flexible Logging Architecture
Searching and Viewing Logs
Planning the Options You Want
Setting Logging Options
Search Parameters
Specifying a Search and Viewing Results
Enabling MTA Logging
Specifying Additional MTA Logging Options
MTA Log Entry Format
Managing the MTA Log Files
Examples of MTA Message Logging
Index
Index DocHome Next
Copyright © 2000 Sun Microsystems, Inc. Some preexisting portions Copyright © 2000 Netscape Communications Corp. All rights reserved.
Last Updated September 14, 2000