Part 1 contains the following sections:
18.2 Controlling Access with Mapping Tables
18.3 Access Control Mapping Table Flags
18.4 When Access Controls Are Applied
18.5 To Test Access Control Mappings
18.6 To Add SMTP Relaying
18.7 Configuring SMTP Relay Blocking
18.8 Handling Large Numbers of Access Entries