{"id":386,"date":"2012-04-10T08:48:47","date_gmt":"2012-04-10T13:48:47","guid":{"rendered":"http:\/\/www.exchangedefender.com\/blog\/2012\/04\/ip-restrictions-and-you\/"},"modified":"2012-04-10T08:48:47","modified_gmt":"2012-04-10T13:48:47","slug":"ip-restrictions-and-you","status":"publish","type":"post","link":"https:\/\/www.exchangedefender.com\/blog\/2012\/04\/ip-restrictions-and-you\/","title":{"rendered":"IP Restrictions and You"},"content":{"rendered":"<p>Odds are the folks looking at this probably don\u2019t do the bulk of the deployments for their companies. But in the odd chance that they are or have direct access to them, I\u2019m going to touch on a very important aspect of ExchangeDefender deployment: IP restrictions. First we\u2019ll start with a nice bright list of what the ranges are: <\/p>\n<blockquote>\n<p>\u00b7 <b><i>65.99.255.0\/24<\/i><\/b> <\/p>\n<p>\u00b7 <b><i>206.125.40.0\/24<\/i><\/b><\/p>\n<\/blockquote>\n<p>Now here\u2019s why you need to first off add them for your client\u2019s mail flow. Remember that in order for us to deliver mail on behalf of the original sender you have accept mail anonymously. This is very easy to do (it\u2019s just the next tab on the receive connector GUI. The downside to allowing anonymous delivery WITHOUT the restrictions is that you\u2019re one step away from being an \u201cOpen Relay\u201d. If you\u2019re an open relay, that will surely get your connection blacklisted on RBLs, it may get your access to our network revoked for a period of time based on the severity of the outbreak. So the cons of not setting these correctly are pretty huge: <\/p>\n<blockquote>\n<p>\u00b7 <b><i>Interrupted\/Inconsistent inbound mail flow<\/i><\/b> <\/p>\n<p>\u00b7 <b><i>Outbound mail flow restrictions<\/i><\/b><\/p>\n<\/blockquote>\n<p>Carlos Lascano<br \/>VP Support Services, ExchangeDefender<br \/><a href=\"mailto:carlos@ownwebnow.com\">carlos@ownwebnow.com<\/a><br \/>(877) 546-0316 x737<\/p>\n","protected":false},"excerpt":{"rendered":"<p> [&hellip;]<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-386","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts\/386","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/comments?post=386"}],"version-history":[{"count":0,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts\/386\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/media?parent=386"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/categories?post=386"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/tags?post=386"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}