Restrict connections

You can prevent the connection of users who might abuse your e-mail server.

Unwanted users might connect to your server, and send unsolicited mail. This unsolicited e-mail takes a great amount of central processing unit (CPU) cycles and space. Also, if your server allows others to relay unsolicited mail, other servers might block the mail that comes from your server.

You can specify IP addresses of known unwanted users, or you can connect to a host that contains a Realtime Blackhole List (RBL) server. These Realtime Blackhole Lists provide a listing of known IP addresses that send unsolicited mail. See the Mail Abuse Prevention System (MAPS) LLC Web site for an example of a host that contains a Realtime Blackhole List.

To specify known IP addresses or a host with a Realtime Blackhole List, complete the following steps:

  1. In iSeries™ Navigator, expand your iSeries Server > Network > Servers > TCP/IP.
  2. Right-click SMTP and select Properties.
  3. Click the Connection Restrictions page.
  4. Click Add to add host names of servers with Realtime Blackhole Lists that you would like to use.
  5. Click Add to add specific IP addresses to restrict attempted connections.
  6. Click Help for more information.
  7. Click OK.
Related concepts
Control e-mail access
Related information
MAPS (Mail Abuse Prevention System LLC)