This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Upstream SMTP relay host makes spam filter less effective

I have recently had to change my email infrastructure so that all incoming email is passed through a relay at a different site, and then forwarded to me on a port other than 25. I have set up DNAT to reroute the odd port back to 25 so that the email relay / spam filter will process incoming email. Since this time, I have received a significantly increased amount of SPAM making it past the filters. Some messages are being stopped, so I don't believe that this is a configuration issue with the non-standard port. My best assumption is that this phenomenon is caused by UTM not rejecting email based on the sender's IP address, since it is now all coming from one IP. Is there a way to make UTM parse the headers and reject based on the IP address prior to my upstream relay?

If there isn't a way to do this presently, this would be a really good feature request for those of us with unfortunate email infrastructures such as this.

Any insight would be greatly appreciated. Thanks!


This thread was automatically locked due to age.
Parents
  • At the top of the 'Relaying' tab - do you have the 'Upstream host list' configured?  If it's still not checking RBLs or rDNS, then greylisting might help.

    Cheers - Bob
     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
Reply
  • At the top of the 'Relaying' tab - do you have the 'Upstream host list' configured?  If it's still not checking RBLs or rDNS, then greylisting might help.

    Cheers - Bob
     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
Children
No Data