FAQs

This is certified documentation and is protected for editing by isecurenet Employees & Moderators only.

Why I need a TLS?

STARTTLS is an extension to plain text communication protocols. It offers a way to upgrade a plain text connection to an encrypted (TLS or SSL) connection instead of using a separate port for encrypted communication.

STARTTLS for IMAP and POP3 is defined in RFC 2595, for SMTP in RFC 3207, One advantage of TLS is that it is application protocol independent. Higher-level protocols can layer on top of the TLS protocol transparently. The TLS standard, however, does not specify how protocols add security with TLS; the decisions on how to initiate TLS handshaking and how to interpret the authentication certificates exchanged are left to the judgment of the designers and implementors of protocols that run on top of TLS.[1]

What is VoIP?

Voice over Internet Protocol (Voice over IP, VoIP) is one of a family of internet technologies, communication protocols, and transmission technologies for delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet.

iMail-nG XE is the only product that supports VoIP and helps you in setting up a complete telephony system [VoIP+PBX] for SMB.

What is PBX?

A PBX (Private Branch Exchange) is a switch station for telephone systems. It consists mainly of several branches of telephone systems and it switches connections to and from them, thereby linking phone lines.

Companies use a PBX for connecting all their internal phones to an external line. This way, they can lease only one line and have many people using it, with each one having a phone at the desk with different number. The number is not in the same format as a phone number though, as it depends on the internal numbering. Inside a PBX, you only need to dial three-digit or four-digit numbers to make a call to another phone in the network. We often refer to this number as an extension.

What is SMTP?

SMTP is an acronym for Simple Mail Transfer Protocol. Majority of internet providers novadays, use this protocol to send email. When using SMTP, there should be a client sending the messages and the server receiving them. Advanced Emailer utilizes this protocol and acts as SMTP client to distribute email messages to subscribers. In most cases you will configure and use your Advanced Emailer the same way you do with your regular email client like Microsoft Outlook. You will specify the SMTP server that Internet provider gave you. When the SMTP Client sends email messages, it connects to the SMTP server you have specified and communicates to it using SMTP protocol.

What is SMTP Relay?

SMTP Relay is a service provided by most modern SMTP Servers. Whenever you send email to someone that is not on the same network as you are, somebody will need to deliver that email. This includes retrying in case the connection on the other party is slow and, in some cases, sending bounce back messages, informing you that this recipient cannot be reached. If you utilize an ISP's server, you can most likely count on the fact, that the server will be always up and running for you when you need it.

What is DKIM?

DomainKeys Identified Mail (DKIM) lets an organization take responsibility for a message while it is in transit. The organization is a handler of the message, either as its originator or as an intermediary. Their reputation is the basis for evaluating whether to trust the message for delivery. Technically DKIM provides a method for validating a domain name identity that is associated with a message through cryptographic authentication.

SPF, do I need that?

Sender Policy Framework (SPF), as defined in RFC 4408, is an e-mail validation system designed to prevent e-mail spam by tackling source address spoofing, a common vulnerability. SPF allows administrators to specify which hosts are allowed to send e-mail from a given domain by creating a specific SPF record (or TXT record) in the public Domain Name System (DNS). Mail exchangers then use the DNS to check that mail from a given domain is being sent by a host sanctioned by that domain's administrators.[1]

What are RBL and DNSBL?

A DNSBL (DNS-based Blackhole List, Block List, or Blacklist; see below) is a list of IP addresses published through the Internet Domain Name Service (DNS) either as a zone file that can be used by DNS server software, or as a live DNS zone that can be queried in real-time. DNSBLs are most often used to publish the addresses of computers or networks linked to spamming; most mail server software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists.

DNSBL is a software mechanism, rather than a specific list or policy. There are dozens of DNSBLs in existence,[1][2] which use a wide array of criteria for listing and delisting of addresses. These may include listing the addresses of zombie computers or other machines being used to send spam, listing the addresses of ISPs who willingly host spammers, or listing addresses which have sent spam to a honeypot system.

How Can I achieve Loadbalance and HA for the said Solution?

Since the entire product is based on Linux HA And/or Load balance can easily be achieved.

How can I integrate iMail-nG with my existing SPAM appliance?

Absolutely, our special recommendations and settings can easily allow iMail-nG to blend your network seamlessly.

Even going further our unique security approach gives you a freedom to block SPAMs and Unsolicited emails at gateway level directly without taking those in.

Search: