Description
After a reminder of the overall functioning of corporate messaging, you will learn how to administer a Postfix server, configure its various components, secure its operation and integrate it with the application software in your environment.
Who is this training for ?
For whom ?
System engineer, or decision maker with technical skills, who must choose and implement an open source solution for mail distribution, archiving, and security.
Prerequisites
Good knowledge of Linux administration and corporate networks.
Training objectives
Training program
- Fundamental principles
- ■ Mail transfer agents
- Sendmail, the historic but complex solution.
- Postfix or Qmail alternatives.
- Xmail, a very complete mail server.
- ■ Sending, routing and receiving mail
- Format of an email address.
- Basic settings 'a client station.
- ■ The actors
- Transport and relay of messages with an MTA.
- Mail distribution agents.
- Mail servers.
- Mail management agents.
- Installation et configuration de Postfix
- ■ Installation
- A roundup of the latest versions.
- ■ Configuration
- Configuring DNS for email.
- The main master parameters.
- cf and main.
- cf.
- The minimum configuration.
- Relaying (client, server).
- ■ Lookup tables
- Postfix lookup tables.
- Example of using LDAP and MySQL with Postfix.
- Master the protocols
- ■ SMTP (Simple Mail Transport Protocol)
- SMTP is also a message format.
- Tags (EHLO, MAIL FROM, RCPT TO, DATA .
- ).
- Error codes (unknown recipient, refusal.
- ).
- SMTP and security: concept of open relay /closed.
- Tolerance by password or IP address.
- Encryption.
- ■ Mail routing
- The cycle MUA/MTA/MTA/.
- /MTA/MDA then .
- MUA.
- MX relays and incoming front-ends/
- ■ POP and IMAP
- POP3 tags (USER, PASS, STAT, DELE, TOP.
- ).
- Password encryption (MD5).
- POP3 limits and IMAP contributions.
- Exploitation de Postfix
- ■ On a daily basis
- Postfix queues.
- Postfix logs (syslog settings).
- Have access to statistics (pflogsumm.
- pl).
- ■ To go further
- Launch Postfix in "chroot" environment.
- Reporting of incidents (notify_classes, spam).
- » An environment to secure ■ Blocking unsolicited mail
- The different forms of spam.
- The risks incurred by a poorly configured system.
- ■ Authentication
- Limits of SMTP, contributions of SASL.
- Choice of the authentication method .
- ■ Encryption
- Guarantee the confidentiality of mail.
- TLS (Transport Layer Security) certificates.