Previous | Contents | Index |
General PMDF configurations are usually set up to allow very flexible address rewriting, fixing up as many sorts of addresses as possible no matter what source the address comes in from. In a firewall configuration, however, you can want to control which sorts of rewriting happen for which sorts of messages. Therefore source and destination specific, and direction specific rewrite rules can be of particular interest. (This is akin/related to the point below regarding centralized naming, that a technique such as a directory channel (with a directory database), which isolates the address transformation to a particular channel, allowing for greater control at the cost of some additional overhead, can be more appropriate than the (more efficient but more "inline") alias database, general database, or mapping table sorts of approaches.)
For instance, consider a common setup where externally originating
messages to internal users are expected to be addressed using a
centralized format without internal node names, and where a directory
channel (with a directory database) is then used to transform the
addresses to the true internal address format. In a firewall
configuration you can want to ensure not only that the centralized
addresses work, but that only the centralized addresses work.
So for instance, you might have a rewrite rule for the centralized
domain routing it to the directory channel, and then make the rewrite
rules for the true internal domains (routing such addresses to channels
for sending internal) be source channel specific rewrite rules that
only apply for messages coming from the directory
channel.
28.4.4.1 Sample Configuration Controlling Internal Domain Rewriting
For instance, consider a site that wants to accept messages addressed
in the form First.Last@example.com
, route such
messages to the directory
channel where a directory
database will transform the address to internal addresses such as
FLast@hosta.example.com
, or
Last@hostb.example.com
, or "First
Last"@ccmail.example.com
, but, for whatever reason, does
not want to accept messages that come in from the external world
already addressed to any of the domains hosta.example.com
,
hostb.example.com
, or ccmail.example.com
.
Note that unless the site has MX
records for
hosta.example.com
, hostb.example.com
, or
ccmail.example.com
pointing to the e-mail firewall system,
then messages addressed using such explicit internal domain names would
not normally ever reach the e-mail firewall system in the first place
--- unless the sender used explicit routing in the address,
e.g.,
Last%hostb.example.com@emailfirewalldomain |
To achieve the goal of routing messages addressed to
example.com
to the directory channel for expansion to
internal addresses, but rejecting messages that come in from the
external world already addressed to such an internal address,
appropriate rewrite rules and channels might be along the lines of:
example.com $U%example.com@DIRECTORY-DAEMON hosta.example.com $U@bogus$?Explicit domain addressing not allowed$Ntcp_local hosta.example.com $U%hosta.example.com@GTCP-DAEMON$Mdirectory hosta.example.com $U%hosta.example.com@GTCP-DAEMON$Mdefragment hosta.example.com $U%hosta.example.com@GTCP-DAEMON$Mconversion hostb.example.com $U@bogus$?Explicit domain addressing not allowed$Ntcp_local hostb.example.com $U%hosta.example.com@GTCP-DAEMON$Mdirectory hostb.example.com $U%hosta.example.com@GTCP-DAEMON$Mdefragment hostb.example.com $U%hosta.example.com@GTCP-DAEMON$Mconversion ccmail.example.com $U@bogus$?Explicit domain addressing not allowed$Ntcp_local ccmail.example.com $U%hosta.example.com@GTCP-DAEMON$Mdirectory ccmail.example.com $U%hosta.example.com@GTCP-DAEMON$Mdefragment ccmail.example.com $U%hosta.example.com@GTCP-DAEMON$Mconversion ... .AD $U%$H$D@TCP-DAEMON ... .ZW $U%$H$D@TCP-DAEMON ... tcp_local ... TCP-DAEMON tcp_internal ... GTCP-DAEMON directory ... DIRECTORY-DAEMON |
Previous | Next | Contents | Index |