by Guest » Thu Apr 08, 2010 1:36 pm
Hello Community, Weve recently deployed a Cisco Spam & Virus Blocker in our network. Currently we
e sending a good amount of email traffic to it ~10k emails / hour, all seems to be going very well. For redundancy all our domains are configured with two MX records: MX10: (the cisco blocker)MX100: (a seperate fallback server) The MX10 normally grabs all the email, but some spammers tend to send email directly to the MX100 (our fallback server), which then forwards it to the Cisco Blocker. Ive configured our MX100 as an Incoming Relay, with the following details: Name: fallbackIP: (the IP of the server)Header: ReceivedParse After: fromHops: 1 Im hoping for some input on wether this is the correct setup, as I don want my fallback server to get a negative reputation score in SenderBase for obvious reasons. The fallback server is not between any firewalls, and relays mail directly to the Cisco Blocker once its received. Thanks for any input!
Hello Community, Weve recently deployed a Cisco Spam & Virus Blocker in our network. Currently we
e sending a good amount of email traffic to it ~10k emails / hour, all seems to be going very well. For redundancy all our domains are configured with two MX records: MX10: (the cisco blocker)MX100: (a seperate fallback server) The MX10 normally grabs all the email, but some spammers tend to send email directly to the MX100 (our fallback server), which then forwards it to the Cisco Blocker. Ive configured our MX100 as an Incoming Relay, with the following details: Name: fallbackIP: (the IP of the server)Header: ReceivedParse After: fromHops: 1 Im hoping for some input on wether this is the correct setup, as I don want my fallback server to get a negative reputation score in SenderBase for obvious reasons. The fallback server is not between any firewalls, and relays mail directly to the Cisco Blocker once its received. Thanks for any input!