BuycPanel Blog

BuycPanel Blog

Latest news and updates

Ways to Configure Greylisting

Posted by Allura on 11 09 2018.

Introduction
Greylisting is for cPanel and WHM version 64. One needs to navigate to (Home >> Email >> Greylisting) interface for properly configuring it.

This interface allows one to configure Greylisting, protects one’s server against unwanted email or spam. The mail server temporarily rejects any email from a sender that is not recognized by a server. The originating server tries to send it again after a delay in case it is a legitimate email. The server accepts the email after some time.

Greylisting identifies incoming email by triplets which is a collection of three pieces of data, that is, the IP address, the sender’s address, and the recipient’s address. Greylisting filters spam, allows legitimate email a second chance to pass through by delaying the unknown triplets.

One can access the Greylisting Configuration Settings, Trusted Hosts, and Reports sections of the interface. But before that, one must click on or off so as to enable…

Introduction

Greylisting is for cPanel and WHM version 64. One needs to navigate to (Home >> Email >> Greylisting) interface for properly configuring it.

This interface allows one to configure Greylisting, protects one’s server against unwanted email or spam. The mail server temporarily rejects any email from a sender that is not recognized by a server. The originating server tries to send it again after a delay in case it is a legitimate email. The server accepts the email after some time.

Greylisting identifies incoming email by triplets which is a collection of three pieces of data, that is, the IP address, the sender’s address, and the recipient’s address. Greylisting filters spam, allows legitimate email a second chance to pass through by delaying the unknown triplets.

One can access the Greylisting Configuration Settings, Trusted Hosts, and Reports sections of the interface. But before that, one must click on or off so as to enable the Greylisting feature.

Trusted Hosts

Add an IP Address To Trusted Hosts List

Steps:

  • One needs to select the Trusted Hosts tab.
  • Then, in the New Trusted Hosts text box, one needs to enter one or more IP addresses.
  • Thirdly, one needs to enter a comment in the Comment text box. This comment will apply to all of the IP addresses that one will add in this batch.
  • Finally, click on Add below the entry.

Delete an IP Address from Trusted Hosts List

If one deletes a single IP address then one can simply click the Delete icon to the right of the IP address.

To delete multiple IP addresses,

Steps:

  • Firstly, select the Trusted Hosts tab.
  • Then select the checkboxes to the left of each IP address to remove, or else select the checkbox to the left of the Host IP Address heading to select all of them.
  • Lastly, click the gear icon there on the top right of the list, and finally select Delete Selected.

Edit Comments for an IP Address on the Trusted Hosts List

Steps:

  • Firstly, select the Trusted Hosts tab.
  • Then one can click on the Edit icon to the right of the IP address.
  • In the Comment text box, enter a new comnent.
  • Lastly, click on Update to save the change, or click on Cancel to reject it.

Add Neighboring IP Address to Trusted Hosts List

Steps:

  • One needs to select the Trusted Hosts tab.
  • Then click on the gear icon on the top right of the list.
  • Finally, select Add Neighboring IP Addresses or Remove Neighboring IP Addresses.

Common Mail Providers

Trust Incoming Mails From Common Mail Providers

Steps:

  • Firstly, select the Common Mail Providers tab.
  • Then select Trust checkbox for each mail provider one wants to trust.
  • One can select Auto Update checkbox for automatically trusting any new IP addresses authorized to that mail provider.
  • Finally, click on Save to implement the changes.

One can click the gear icon on the top right of the list so as to select or deselect Trust and Auto Update  for all of the mail providers.

Conclusion

Greylisting proves it’s efficiency in various technical purposes with the help of Trusted Hosts and Common Mail Providers.