EmailServer:Mail Page: Difference between revisions
From Amar
Jump to navigationJump to search
Line 28: | Line 28: | ||
* [https://brokkr.net/2015/10/15/lets-do-postfix-again-but-slowly-and-properly-this-time-part-1-a-simple-local-mail-receiving-server/ Part 1: A simple local mail receiving server] | * [https://brokkr.net/2015/10/15/lets-do-postfix-again-but-slowly-and-properly-this-time-part-1-a-simple-local-mail-receiving-server/ Part 1: A simple local mail receiving server] | ||
* [https://brokkr.net/2015/10/22/lets-do-postfix-again-but-slowly-and-properly-this-time-part-3-opening-up-to-the-outside/ Part 3: Opening up to the outside] | * [https://brokkr.net/2015/10/22/lets-do-postfix-again-but-slowly-and-properly-this-time-part-3-opening-up-to-the-outside/ Part 3: Opening up to the outside] | ||
* [https://brokkr.net/2015/10/26/lets-do-postfix-again-but-slowly-and-properly-this-time-part-4-virtual-domains/ Part 4: Virtual Domains] | * [https://brokkr.net/2015/10/26/lets-do-postfix-again-but-slowly-and-properly-this-time-part-4-virtual-domains/ Part 4: Virtual Domains] | ||
* [https://brokkr.net/2020/08/13/rspamd/ Part 9: Using RSpamd as a spam milter] | * [https://brokkr.net/2020/08/13/rspamd/ Part 9: Using RSpamd as a spam milter] | ||
* [https://www.postfix.org/DEBUG_README.html Part 10: Restricting access] | * [https://www.postfix.org/DEBUG_README.html Part 10: Restricting access] | ||
* [https://brokkr.net/2020/08/30/postfix-11-pflogsumm/ Part 11: pflogsumm] | |||
== Let's do Dovecot slowly and properly == | == Let's do Dovecot slowly and properly == |
Revision as of 21:28, 3 November 2022
Email Server Setup
Postfix
- Install Postfix (with security)
- Multiple Mail Domains
- Set up SPF and DKIM with Postfix
- Postfix Virtual Domain Hosting
- Postfix Debugging
Dovecot
Roundcube
Postfix Admin
Let's do Postfix slowly and properly
- Setting up Postfix and Dovecot
- Part 1: A simple local mail receiving server
- Part 3: Opening up to the outside
- Part 4: Virtual Domains
- Part 9: Using RSpamd as a spam milter
- Part 10: Restricting access
- Part 11: pflogsumm