Restricting your email traffic
search cancel

Restricting your email traffic

book

Article ID: 421057

calendar_today

Updated On:

Products

Email Security.cloud

Issue/Introduction

How to restrict your email traffic in Email security cloud?

Environment

Email security cloud

Resolution

1. To ensure that your inbound email does not bypass the Email Services infrastructure, you must restrict the IP addresses you allow email traffic from to the Cloud security services IP ranges. Configure your mail gateway to only accept inbound mail from our IP ranges, which will help to prevent spammers from bypassing the scanning service and sending mail directly to your server’s IP address. Only port 25 traffic needs to be "locked down" to accept the cloud security services IP addresses.

Caution: The mail server (or firewall) configuration changes given here should be completed only after full MX record propagation is complete. Allow 72 hours after changing your MX records having been changed for full propagation across the Internet.

2. Depending on your organization’s network configuration, you must define the IP ranges to use in your mail server, firewall, or public cloud hosted email service, or any combination of these. The IP ranges that you need to configure in the allow list of your firewall, mail server, or public cloud hosted email service are listed in the Cloud security services IP ranges .

Note: Due to the diverse range of mail servers and firewalls in use, we cannot provide instructions or support for the configuration of IP address allow lists in firewalls or mail servers. Contact your IT department or IT consultant for assistance.