Allow : Internal (Network) -> Email Messaging -> {Group with DNS Hosts for imap.gmail.com, smtp.gmail.com, mail.toupin.org, etc.}
SNAT : Internal (Network) -> Email Messaging -> Internet : from External [Messaging] (Address)
If you put "Any" into 'Host-based relay', you will create an "open relay" and will get your IP blacklisted within hours as spammers will find it quickly. The only thing that should be in there is the Host definition for your Exchange server.
If people are allowed to use email clients internally to access other email services (like Google, etc.), then you should make one or more firewall rules like:Allow : Internal (Network) -> Email Messaging -> {Group with DNS Hosts for imap.gmail.com, smtp.gmail.com, mail.toupin.org, etc.}
I don't like to open that up generally to "Internet" unless you have an extra IP on the External interface so that you canSNAT : Internal (Network) -> Email Messaging -> Internet : from External [Messaging] (Address)
You might want to add "VPN Pool (SSL)" or other to "Internal (Network)" in the firewall and NAT rules.
As for allowing relay without the individuals connecting to Exchange, that's possible, but why?
Cheers - Bob
2013:01:09-13:25:54 HS1ASG exim-in[26985]: 2013-01-09 13:25:54 H=78.sub-70-215-7.myvzw.com ([10.***.***.***]) [70.215.x.xx]:33252 F= rejected RCPT : Relay not permitted
Ahhhh... Is the SMTP Proxy in transparent mode?
Do you have a separate public IP for the devices to reach the server (not the one that the FQDN in your MX record points to)?
Cheers - Bob
Sorry for any short responses! Posted from my iPhone.
PS Please compare your configuration to: Exchange with SMTP Proxy
In general, a packet arriving at an interface is handled only by one of the following, in order:
DNATs first, then VPNs and Proxies and, finally, manual Routes and Firewall rules.
DNAT : Internet -> Email Messaging -> External [Exchange] (Address) : to {Exchange server}
The Exchange server has to have the UTM listed as its smart host, preferably in the Exchange SMTP Connector. The rest looks great!
This situation is addressed by something I've said here hundreds of times. Actually, there are several things things like that so I finally put them into a list for me to reference and copy. My Rule #2 applies here:In general, a packet arriving at an interface is handled only by one of the following, in order:
DNATs first, then VPNs and Proxies and, finally, manual Routes and Firewall rules.
The users need a DNAT to get SMTP to Exchange from their Androids, so you have to use a different IP for the SMTP DNAT. I would suggest an FQDN like exchange.yourdomain.com that points at the additional IP. Then, you can use that for OWA and everything else, including SMTP to Exchange. You would wind up with a NAT rule like:DNAT : Internet -> Email Messaging -> External [Exchange] (Address) : to {Exchange server}
Leave the service change blank and select auto firewall rules.
Did that work for you?
Cheers - Bob
PS You might want to tighten things up a bit and just list the services you want instead of the entire Email Messaging group - then you could include HTTP/S for OWA.
Just a little confused by what you said about the "additional" IP. Do we need another separate IP from that to do the DNAT with SMTP for the devices?
50.**.***.122 (the external IP used for OWA access)
No, the one is fine. Just add the needed services (SMTP, etc.) to your current DNAT.
If this already works, then the following is meant only for others that read this thread. Assuming that this IP is an Additional Address named "Exchange" on the External interface, the traffic selector can't work with a regular Host definition in the traffic selector - the target must be the object created by WebAdmin when the address was defined: "External [Exchange] (Address)".
Cheers - Bob
Hi Bob, have been waiting for a non-crucial time here to try this so there's no interruption of email. Thanks for the info will let you know the outcome.
Traffic selector: Any → Exchange DNAT (Port 80, 143, 25) → External (WAN) (Address)
Destination translation: Internal mail server
Automatic Firewall rule: checked