Part 1 contains the following sections:
Controlling Access with Mapping Tables
When Access Controls Are Applied
To Test Access Control Mappings
To Add SMTP Relaying
Configuring SMTP Relay Blocking
Handling Large Numbers of Access Entries
Access Control Mapping Table Flags