Frequently Asked Questions (FAQ)

 

IP Blacklsting

What is IP blacklisting?

IP blacklisting is a technique used to block specific IP addresses to deliver email to a particular email system by rejecting connection.

How is a blacklist created?

To create a blacklist, an administrator must identify IP addresses that are abusive in any way (spam, malware or any other malicious acitivity) and shouldn’t be allowed to send any emails to the system.

How is a blacklist implemented?

The blacklist is implemented in the email system’s configuration, and the system will and reject incoming connection from the IP addresses on the whitelist.

What are the benefits of using a blacklist?

By using a blacklist, an email system can help ensure that abusive sources are unable to send messages, and can improve the security and reliability of the system.

Are there any drawbacks to using a blacklist?

One potential drawback to using a blacklist is that it can be difficult to manage and maintain. It is important to regularly review and update the blacklist to ensure that it remains accurate and effective.

IP Whitelisting

What is IP whitelisting?

IP whitelisting is a technique used to allow specific IP addresses to send email to a particular email system bypassing IP blacklists.

How is a whitelist created?

To create a whitelist, an administrator must identify the IP addresses that are trusted and should be allowed to send email to the system. These IP addresses are then added to a local whitelist or an IP whitelist system.

How is a whitelist implemented?

The whitelist is implemented in the email system’s configuration, and the system will accept incoming messages from the IP addresses on the whitelist.

What are the benefits of using a whitelist?

By using a whitelist, an email system can help ensure that only trusted sources are able to send messages, and can improve the security and reliability of the system.

Are there any drawbacks to using a whitelist?

One potential drawback to using a whitelist is that it can be difficult to manage and maintain. It is important to regularly review and update the whitelist to ensure that it remains accurate and effective.