This page allows you to add, edit, and delete server black lists. All black lists that are currently configured for the server are displayed here. Server black list information is stored in the spamblkm.txt file which is located in the IMail top directory. For a list of the black lists that are configured by default, see Pre-configured Black Lists.
Note: Only black lists that are configured and enabled on this page are available for use by a host.
To add a DNS black list, click Add and the Server Black List Entry page is displayed. For more information on adding a DNS black list, see Adding a server black list entry.
To delete a black list, click the trash can icon located next to the entry you want to delete. To delete all black lists, click Delete All.
To edit a black list entry, click the pencil icon located next to the entry that you want to edit.
Display Labels:
Name. The display name that is used to identify the blacklist at the server and host levels, and in log files.
Server. The domain name or IP address of the DNS server to contact for black list queries. When an asterisk (*) is entered, the default IMail Server DNS is used for Black List queries.
Query Domain. The domain to query. This name usually matches the server domain name. However, sometimes a black list will contain multiple zones to query on the same server. When this happens, the server name and the query domain will be different.
Type. The type of lookup that the black list performs. Select one of the following types:
ADDR (address). Uses a message’s FROM address to determine if the message is spam.
DNS. Checks the IP address of the connecting SMTP agent against spam databases to determine if the message is spam. If the IP address is listed in one of the black lists databases, the message is identified as spam.
HELO. Checks the domain supplied in the HELO or EHLO command to determine whether the message is spam. The host name that is given in the HELO/EHLO command must match the IP address.
RHS (right-hand side). Checks the information following the @ symbol supplied in the "MAIL FROM" command to lookup the domain name to determine whether the message is spam.
Enabled. If the black list is enabled, Yes will be displayed, meaning that the black list can be used by hosts. If the black list is disabled, No will be displayed, meaning that the black list cannot be used by hosts.
TCP/IP First. Identifies black lists that require the use of TCP to query the black list.
Note: It is up to the administrator to know whether each black list uses UDP or TCP protocol.
Related Topics:
Adding a Server Black List Entry