Page 97 - Mercury Manual.book
P. 97

The MercuryI IMAP4rev1 server  92
                                                                                             Connection Control



                                    Lingering mailboxes
                                    One setting that has a significant impact on the behaviour and performance of MercuryI is the
                                    Lingering mailboxes setting in the Core module configuration Files page. This option con-
                                    trols when Mercury breaks down the memory image it creates for mailboxes, and thus im-
                                    pacts on the time it takes MercuryI to establish new connections. Please see the Core Module
                                    Configuration section for more information on this setting and how to use it.

                                    Connection Control


                                    The Connection Control page allows you to place restrictions on the hosts from which Mer-
                                    curyI will accept connections. A connection control entry can apply to a single address, or to
                                    a range of addresses. To add an entry to the list, click the Add restriction button; if you wish
                                    to create a restriction for a single address, enter that address in the "From" (left-hand) address
                                    field in normal dotted IP notation. To create a restriction for a range of addresses, enter the
                                    lowest address in the range you want to restrict in the "From" field, and the highest address
                                    you want to restrict in the "To" field. The addresses are inclusive, so both the addresses you
                                    enter are considered part of the range.

                                    If you check the Refuse connections radio control, Mercury will not accept incoming connec-
                                    tions from this address. Use this to prevent unwanted IMAP connections from unauthorized
                                    or hijacked hosts, or to prevent specific machines on your network (for instance, public Kiosk
                                    machines) from accessing IMAP services.

                                    Checking the Allow radio button marks the connection as “good”, and enables an extra option
                                    for matching connections:

                                    Allow plaintext logins even if they would otherwise be disabled This lets you allow certain
                                    trusted systems to login to MercuryI without first establishing a secure SSL connection. This
                                    option is primarily intended for the benefit of webmail servers or other trusted devices that
                                    are behind the same firewall as Mercury.

                                    To edit a connection control entry, highlight it in the list, then click the Change selection but-
                                    ton.
                                    How Mercury applies connection control entries

                                    The list of connection control entries you create can contain entries that overlap (i.e, entries
                                    that refer to addresses also covered by other entries). In the case of overlapping entries, Mer-
                                    cury uses the following method to select the entry it should use for any given address: if there
                                    is an entry that refers to the address on its own (not as part of a range), then Mercury will
                                    automatically use that entry; otherwise, it looks for the range that most closely encompasses
                                    the address and uses that.

                                       Example: You have a Refuse entry covering the range from 198.2.5.1 to
                                       198.2.5.128, and an Allow entry covering the range from 198.2.5.10 to
                                       198.2.5.20: if a machine with the address 198.2.5.12 connects to Mercury, it will
                                       select the Allow entry to cover the connection, because the allow entry most tightly
                                       encompasses the connecting address (the range covers 11 addresses, where the Refuse
                                       entry's range covers 128 addresses).

                                    IMAP Login name aliasing
                                    There may be occasions where you want a user to be able to login via IMAP using a username
                                    that differs from his or her “real world” username on your network. As an example, many
   92   93   94   95   96   97   98   99   100   101   102