Results 1 to 8 of 8

Thread: HOWTO: using alternative port for SMTP and PLESK

  1. #1
    Tera Poster
    Join Date
    Aug 2001
    Posts
    754

    Default HOWTO: using alternative port for SMTP and PLESK

    Your customer may complain sometime they cannot use their SMTP server to sending mails out. Most probably the ISP started blocking 3rd party smtp servers.
    In this case you can provide an alternative port for your customers to send mails out.
    Or
    Some customers having problem accessing your PLESK control panel using from their work but it working fine from their home. This is a case network admin at work is blocking the port 8443.

    Here is a simple solution.
    You can use your firwall to route all traffic coming to one port to another, no need to change or configure anything in the PLESK. no need to configure things again and again after every PLESK upgrade.

    Just preroute the ports.

    e.g: routing smtp port 25 to 3525
    iptables -t nat -I PREROUTING -p tcp --dport 3625 -j REDIRECT --to-port 25

    e.g: routing PSA access port 8443 to 3636
    iptables -t nat -I PREROUTING -p tcp --dport 3636 -j REDIRECT --to-port 8443

    if you are using APF firewall then just add following line to the preroute.rules file.
    $IPT -t nat -I PREROUTING -p tcp --dport 3625 -j REDIRECT --to-port 25
    $IPT -t nat -I PREROUTING -p tcp --dport 3636 -j REDIRECT --to-port 8443


    Use it, test it. And I should not be held responsible for any misconfiguration of your firewall settings.
    regards,
    NightMan
    ------------
    100% hack free = DENY 0.0.0.0 - 255.255.255.255 :)



  2. #2
    Product Expert
    Join Date
    Nov 2002
    Location
    Washington, DC
    Posts
    3,751

    Default

    Or just use port 465 :P
    Atomicorp
    www.atomicorp.com
    Secure your server now: http://www.atomicorp.com/products.html Atomic Secured Linux



  3. #3
    Tera Poster
    Join Date
    Aug 2001
    Posts
    754

    Default

    Originally posted by atomicturtle
    Or just use port 465 :P
    that will prompt for a ssl certificate error(if you dont have installed a vaild one.) am I right?
    regards,
    NightMan
    ------------
    100% hack free = DENY 0.0.0.0 - 255.255.255.255 :)



  4. #4
    Kilo Poster
    Join Date
    Sep 2006
    Posts
    27

    Default

    That worked great. Thanks.



  5. #5
    Kilo Poster
    Join Date
    Sep 2006
    Posts
    27

    Default

    Just one question:

    Will that command make the iptables rule permanent, or do I need to do something else?

    I remember on my old box when I would block IP's with iptables, that the rules would be gone when I rebooted.

    Please let me know. Thanks!



  6. #6
    Tera Poster
    Join Date
    Aug 2001
    Posts
    754

    Default

    you have to load your iptable rules after the reboot.

    To autostart apf on reboot, run this:

    chkconfig --level 2345 apf on

    To remove it from autostart, run this:

    chkconfig --del apf

    some usefull information here.
    http://gentoo-wiki.com/HOWTO_Iptables_for_newbies
    regards,
    NightMan
    ------------
    100% hack free = DENY 0.0.0.0 - 255.255.255.255 :)



  7. #7
    Tera Poster madsere's Avatar
    Join Date
    May 2005
    Posts
    352

    Default

    Why make it so complicated? What's wrong with using this method:

    http://kb.swsoft.com/article_22_837_en.html
    Rene @ Webscorpion.com
    Web Hosting, VPS servers and support - http://www.webscorpion.com



  8. #8
    Tera Poster
    Join Date
    Aug 2001
    Posts
    754

    Default

    Originally posted by madsere
    Why make it so complicated? What's wrong with using this method:

    http://kb.swsoft.com/article_22_837_en.html
    nothing wrong with this method. but when you upgrade the PLESK, then you have to make the changes again.

    firewall method is simple and not affected by the PLESK upgrade. the same way you can give access to the PSA by another port than 8443.
    regards,
    NightMan
    ------------
    100% hack free = DENY 0.0.0.0 - 255.255.255.255 :)



Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •