![]() |
![]() HP OpenVMS Systemsask the wizard |
![]() |
The Question is: We are using our vms server as an e-mail server in our organization. All is cool and we are able to send/receive e-mail all over the world except - we have a First Class by Centrinity e-mail server on our DMZ that we can receive e-mail from but cannot se nd to (e-mail bounces). Obviously we have connectivy (we can ping ...) since we are able to receive from this server. Please find configs below. Digital TCP/IP Services for OpenVMS Alpha Version V4.2 - ECO 3 on a AlphaServer 4100 5/533 4MB running OpenVMS V6.2-1H3 SMTP Configuration Options Initial interval: 0 00:30:00.00 Address_max: 16 NOEIGHT_BIT Retry interval: 0 01:00:00.00 Hop_count_max: 16 RELAY Maximum interval: 3 00:00:00.00 TOP_HEADERS Timeout Initial Mail Receipt Data Terminate Send: 5 5 5 3 10 Receive: 5 Alternate gateway: 192.168.203.31 General gateway: not defined Substitute domain: not defined Zone: not defined Postmaster: UCX_SMTP Log file: SYS$SPECIFIC:[UCX_SMTP]UCX$SMTP_LOGFILE.LOG Generic queue Queues Participating nodes UCX$SMTP_HAMWN1_00 1 HAMWN1 192.168.203.31 is our firewall which acts as a relay for our e-mail - all e-mail flows through the firewall. I have already contacted our firewall support and they have no clue! If you have anything to offer please do so. Thanks. The Answer is : With firewalls, basic connectivity tests such as ping are only marginally useful as routing diagnostics -- firewalls are very deliberately designed and deliberately intended to (adversely) effect network connectivity and network routing integrity. Various firewalls can also be configured to ignore or to filter ICMP (ping) traffic. Many firewalls are further configured for bi-directional filtering, as well -- with various email worms and with the common use of tunnels, clients located inside the firewall are not necessarily trustworthy. You will want to ask your firewall folks to consider some of the following debugging -- most obviously, briefly open the firewall and see if this permits the necessary access. Check for any authentication requirements on the outgoing connections. Send SMTP mail to the firewall. Also ask your firewall folks to check any logs that might be created by the SMTP traffic routing through firewall package. Check the DNS/bind information and configuration, and check for any routing-based "mis-filtering" that might be occuring in addition to the expected activities of the firewall. You will also want to use tools such as TCPTRACE, in an attempt to see where the IP routing disconnection occurs. You will also want to check the IP logs (particularly any SMTP logging) on the OpenVMS host. As a very simple and direct test of connectivity, you could telnet directly to the SMTP port on the target host. Having all SMTP mail traffic -- including internal email -- flow through the firewall server seems slow and potentially somewhat risky, and it introduces additional and arguably unnecessary loading and delays onto the firewall. Please contact the organization that supports your network for assistance with configuring the IP routing and the firewall.
|