Installing NoSpamProxy on a cloud service
Integrating the TCP proxy
NOTE: You must have a valid software maintenance contract to use the TCP Proxy.
It is possible that for cloud-based systems, e.g. Microsoft Azure, port 25 is blocked by the provider. However, port 25 is required for sending emails, and port 25 being blocked prevents NoSpamProxy from operating on such a system.
We offer a solution in the form of our TCP proxy. This system can be activated in NoSpamProxy as described below. Each outbound connection is routed to a routable IPv4 address on the TCP level through the TCP proxy for NoSpamProxy. The emails will be sent from the server via port 443 to the TCP proxy and from there via port 25 to the recipient system.
- Stop the Gateway Role via the NoSpamProxy console or the Windows services.
- Open a text editor using administrative rights on the system where the Gateway Role is installed.
- Open the configuration file "Gateway Role.config" from the directory C:\ProgramData\Net at Work Mail Gateway\Configuration.
- Search the file for <smtpServicePointConfiguration> and change/add the value isProxyTunnelEnabled="true" proxyTunnelAddress="proxy.nospamproxy.com"as attributes . If <smtpServicePointConfiguration is not present, search for <netatwork.nospamproxy.proxyconfiguration and add<smtpServicePointConfiguration isProxyTunnelEnabled="true" proxyTunnelAddress="proxy.nospamproxy.com" />directly under this value.
- Save the file and close the editor.
- Place the Root CA certificate in the Microsoft certificate store in the computer account under Trusted Root Certification Authorities > Certificates on the server with the Gateway Role.
- In the NoSpamProxy Command Center under Configuration > NoSpamProxy components > Gateway Roles edit the appropriate gateway role and change the value for SMTP Server Name to the value outboundproxy.nospamproxy.com.
- Restart the Gateway Role.
- Open the Gateway Role.config file again and check whether the value was retained at startup.
Adjusting the SPF entry
- If the TCP proxy is implemented, it acts as the sending system. Thus, the TCP proxy must also be included in your SPF record. We strongly recommend adding the following entry to your SPF record:include:_spf.proxy.nospamproxy.com
If applicable: Customising Office 365
If you send emails from Azure to your own Office 365 instance where a connector is bound to the IP addresses, please update the IP addresses to match the name outboundproxy.nospamproxy.com. Since with Office 365 the TLS certificates are checked against the HELO domain, it is only possible to implement this accordingly with significantly increased effort. We therefore recommend validation by name.
If necessary: Adjust the firewall
- If you specifically block outgoing connections, you should adjust the exception for the TCP proxy so that connections to the IP network 193.37.132.0/24 are allowed.
Setting up a static IP address
If you want to run NoSpamProxy or parts of it in a virtual machine in a Microsoft Azure environment, you must have an IP address that is retained even after the machine is restarted. To achieve this, you must set up a static IP address (reserved IP address). Otherwise, it is possible that a different IP address will be assigned after the machine is restarted.
NOTE: You make this setting on the Microsoft Azure virtual machine where NoSpamProxy is installed.
- Open the web page portal.azure.com.
- Under Home > Virtual Computers, click the virtual computer where NoSpamProxy is installed.
- Go to Network > Network interface > IP configurations and select the configuration relevant for NoSpamProxy.
- Enable the Public IP address option and then click Create new.
- Enter a name and select the Static option.
- Click OK.
The IP address is now displayed under the specified name.
NOTE: Also note the instructions on the corresponding page of the Microsoft Azure documentation.
Customizing the Reverse DNS Entry for the NoSpamProxy Server
- Go to portal.nospamproxy.com.
- Go to Dashboard > Resource Groups > [TheResourceGroupTheVirtualComputerBelongsTo] > [YourVirtualComputer] > Properties.
- Enter a name for the public IP address under DNS name label.
- Start the Azure Shell.
- Enter the following command, replacing the placeholders:az network public-ip update --resource-group [ResourceGroup] --name [IPAddressName] --reverse-fqdn [FullDNSName] --dns-name [DNSName]
NOTE: Also note the instructions on the corresponding page of the Microsoft Azure documentation.