How can I block IMAP access to allow only 1 external IP and all LAN IP's

I have a PostFix/Dovecot Standard OSX server setup and functioning perfectly, but I need to make a pretty major tweak.
Here is some background : I have 1 network connection that connects to the LAN and provides connection to the email server over the local LAN. I also have a satellite office that has access to the email server offsite over the internet on a different network connection.
What I want to do is limit IMAP access to the server so they cannot access the email server from home, smartphone, or any other device. I only want them to be able to access their email from work.
So I have a long list of local IP's 192.168.56/23 and one External IP 1xx.x.x.x I want to make sure has access to send and receive mail.
I have been researching this and it looks like the config has to take place in dovecot since that is the imap server, but I am a novice at dovecot. I would love to just turn off the imap port from the firewall but that would block the satellite office and they would be unable to connect
Anybody out there able to lead me in the right direction?

I'd go out on a limb here and suggest that your best solution lies in setting up a VPN between the main and satellite offices. That way the remote office can share whatever resources you like in the main office without fear of opening services to unwanted users.
Failing that, your next best option is some kind of policy/access control at your firewall/router. This may range anywhere from trivial to next-to-impossible depending on the make/model of your firewall/router.
If your firewall/router can't do it then you could run a software firewall on your server, with access controls for the IPs you want to allow/block, but it's a poor option IMHO.
Unfortunately there's no support for this kind of thing in dovecot itself, which is why you need to look further up the network for solutions.
It's also worth mentioning that restricting dovecot access will do nothing for who can connect to your server to send mail. Dovecot is only concerned with end-user access to their mailboxes (e.g. IMAP) and has no bearing on who can submit messages to the server. For that you need to understand Postfix's configuration and access controls, but it's highly unlikely you want to restrict incoming SMTP to specific addresses only since that would prevent other domains' mail servers from sending you mail.

Similar Messages

  • How can I remove the Apple ID authorization only on one computer and authorize another in his place?

    how can I remove the Apple ID authorization only on one computer and authorize another in his place?

    De-authorize the computer in question.
    Then authorize the new computer.
    Or de-authorize all computers and authorize only the ones that actually exist.

  • How can I download my iMac iTunes library to an external drive and reload the library to iTunes on a PC?

    How can I download my iMac iTunes library to an external drive and reload the library to iTunes on a PC?

    Hi Niel.  Can you be move specific for those of us not tech savy?   1 - Can you provide steps to back up the library?  2 - How do you organize the library?  3 - When you move the entire iTunes folder, does it include iTunes paid for music along with downloaded music from CDs?  Thanks

  • How can i limit the user to enter only A to Z and space in JFormattedText

    dear
    i want to use JFormatedTextField in two manners
    1.Limit the no of charecters.means in a text field only 20 charecters r allowed.
    2.and also check the enterd charecter must be a to z and space not other chareters r allowed.
    3.same for numbers means 0 to 9 and decimal.
    how can i do by using the JFormated TextFilef.

    Probably lacks in some cases but what the hell.
    * Filename:           JSMaskedTextField.java
    * Creation date:      22-mei-2004
    * Author:                Kevin Pors
    package jsupport.swingext;
    import java.awt.event.KeyEvent;
    import java.util.Arrays;
    import javax.swing.JTextField;
    * A masked textfield is a textfield which allows only a specific mask of
    * characters to be typed. If characters typed do not occur in the mask
    * provided, the typed character will not be 'written' at all. The default mask
    * for this <code>JSMaskedTextField</code> is <code>MASK_ALPHA_NUMERIC</code>
    * @author Kevin Pors
    * @version 1.32
    public class JSMaskedTextField extends JTextField {
        /** Masking for alphabetical lowercase characters only. */
        public static final String MASK_ALPHA_LCASE = "abcdefghijklmnopqrstuvwxyz ";
        /** Masking for alpha-numeric characters (lcase/ucase) only. */
        public static final String MASK_ALPHA_NUMERIC = "0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ ";
        /** Masking for alphabetical uppercase characters only. */
        public static final String MASK_ALPHA_UCASE = "ABCDEFGHIJKLMNOPQRSTUVWXYZ ";
        /** Masking for numbers only. */
        public static final String MASK_NUMERIC = "0123456789";
        /** Masking for hexadecimals. */
        public static final String MASK_HEXADECIMAL = "0123456789ABCDEF";
         * An array of keyevent constants defining which keys are always to be
         * allowed, no matter what.
        private final int[] ALWAYS_ALLOWED = new int[] { KeyEvent.VK_BACK_SPACE,
                KeyEvent.VK_DELETE, KeyEvent.VK_UP, KeyEvent.VK_DOWN,
                KeyEvent.VK_LEFT, KeyEvent.VK_RIGHT, KeyEvent.VK_SHIFT,
                KeyEvent.VK_HOME, KeyEvent.VK_END};
        /** Boolean specifying whether casing should be ignored. */
        private boolean ignoringCase = true;
        /** Specifying whether the maskin is enabled */
        private boolean isMaskingEnabled = true;
        /** The mask for the textfield. */
        private String mask = MASK_ALPHA_NUMERIC;
         * Creates a default number field.
        public JSMaskedTextField() {
            super(null, null, 0);
            Arrays.sort(ALWAYS_ALLOWED);
         * Creates a number field, with a specified number of columns.
         * @param columns The columnnumber.
        public JSMaskedTextField(int columns) {
            super(null, null, columns);
            Arrays.sort(ALWAYS_ALLOWED);
         * Creates a JSMaskedTextField with a masking.
         * @param mask The masking to be used.
        public JSMaskedTextField(String mask) {
            super(null, null, 0);
            Arrays.sort(ALWAYS_ALLOWED);
            setMask(mask);
         * Gets the masking for this masked textfield.
         * @return Returns the mask.
        public String getMask() {
            return this.mask;
         * Gets whether this JSMaskedTextField should be ignoring casing.
         * @return Returns if the component should be ignoring casing.
        public boolean isIgnoringCase() {
            return this.ignoringCase;
         * Checks whether masking is enabled. Default should be true.
         * @return Returns true if masking is enabled, false if not.
        public boolean isMaskingEnabled() {
            return this.isMaskingEnabled;
         * Sets whether it should be ignoring casing when checking for alpha-chars.
         * @param ignoringCase The ignoringCase to set.
        public void setIgnoringCase(boolean ignoringCase) {
            this.ignoringCase = ignoringCase;
         * Sets the masking for this textfield. The masking will determine which
         * characters can be typed. If the characters in de <code>mask</code> do
         * not occur in the typed character, it won't be typed.
         * @param mask The mask to set.
        public void setMask(String mask) {
            this.mask = mask;
         * Sets the masking enabled. If <code>false</code> this component will
         * behave just like a normal textfield.
         * @param isMaskingEnabled true if masking should be enabled.
        public void setMaskingEnabled(boolean isMaskingEnabled) {
            this.isMaskingEnabled = isMaskingEnabled;
         * Sets text of this textfield. If the blah blah.
         * @see javax.swing.text.JTextComponent#setText(java.lang.String)
        public void setText(String text) {
            for (int i = 0; i < text.length(); i++) {
                if (getMask().indexOf(text.charAt(i)) < 0) { // does not occur
                    return;
            super.setText(text);
         * @see javax.swing.JComponent#processKeyEvent(java.awt.event.KeyEvent)
        protected void processKeyEvent(KeyEvent e) {
            if (!isMaskingEnabled()) {
                return;
            char typed = e.getKeyChar();
            int code = e.getKeyCode();
            for (int i = 0; i < ALWAYS_ALLOWED.length; i++) {
                if (ALWAYS_ALLOWED[i] == code) {
                    super.processKeyEvent(e);
                    return;
            if (typed == KeyEvent.VK_BACK_SPACE) {
                super.processKeyEvent(e);
            if (isIgnoringCase()) {
                String tString = new String(typed + "");
                String ucase = tString.toUpperCase();
                String lcase = tString.toLowerCase();
                if (getMask().indexOf(ucase) < 0 || getMask().indexOf(lcase) < 0) {
                    e.consume();
                } else {
                    super.processKeyEvent(e);
                    return;
            } else { // not ignoring casing
                if (getMask().indexOf(typed) < 0) {
                    e.consume();
                } else {
                    super.processKeyEvent(e);
    }

  • TS2755 My husband and I have a linked apple account and i cloud. Now he is receiving all of my text messages. How can I fix it to where he only receives his messages and not mine? Any help is appreciated!

    My husband and I both have iphones and both are linked to the app store and i cloud. Now my husband is receiving all of my text messages and has all my contacts. How can we get it to where he does not receive my messages anymore? Any help is appreciated!

    Best way is to get your own Apple ID, but until then have him go to Settings > Message > Receive at and remove your phone number.

  • How can I block the access to my address book?

    So yeah, the title says it. I actually wanna know how to manage the access of apps to my address book. Just like the location services.
    Is there any control panel? I was googling and searching on my iPhone but couldn't find anything.
    albin

    Yes, I am. But this example with Instagram doesn't sound like asking for permissions to me. I think that any app can load the contact list in the background and no one would notice it. I mean this is not right. However, it seems like I can't do anything. So yeah, thank you guys for your support.

  • How can I get Cookie Monster to allow only SOME 3rd party cookies?

    I am runnning Firefox 10.0.2. Is there a way to "whitelist" or "blacklist" all cookies and/or third party cookies? I think that existed about 7 revs back. For example, if you hated third party cookies but used one site that required acceptance, you could refuse to accept third party cookies but whitelist the site you wanted. Neither Firefox nor Cookie Monster seem to offer this as far as I can determine.

    Try accessing the permissions manager dialogue:
    in the awesome bar type- about:permissions , if it helps.

  • Bought a new Ipod for daughter for Xmas. How can I use ICLOUD to sync Itunes only to her IPOD

    Bought a new Ipod for daughter for Xmas. How can I use ICLOUD to sync Itunes only to her IPOD and not everything else on my iphone etc?

    On the iPod turn off iCloud for calender, contacts and other things (Settings>iCloud) and turn off automatic downloading for apps and books (Settings>Store).
    Aldso go to Settings Messages and Facetime and add her own email calling/messaging address and delete the Apple ID calling/messaging address.

  • How can i block users for a particular transaction???

    Hi SAP Experts,
    wishes for the day.
    TDS related entries should be passed from the accounting side but the tds entry has passed from MM side (while preparing miro) at my client place.and now they want to restrict the tds kind of entries to the MM users.How can i block the mm users for particular this kind of transactions.
    I have creted an Authorization group which consists only accounts users and assigned it to the tds related GL accounts.but still the problem not solved.
    Full points will be assigned for the right solutions.
    Regards,
    Sumeya Offrin

    Hi,
    You can use SU24 to see what all authorisation object SAP has provided which allows you to maintain.  Then you can control those values.  Once you identify the authorisation object and the value which you want to give, then you will have to sit with BASIS to create a role for these authorisation object with the values mentioned and attach it to the particular user.  With this you can control the access.
    Hope this info is of some help to you.
    Regards,
    Venkat

  • My neighbour's Mac Book Pro shows up as discoverable when Bluetooth is turned on in my iPad Air.  How can I block her device?  How can I prevent her pairing with my iPad Air. I need Bluetooth on to play music over my system.

    My neighbour's Mac Book Pro shows up as discoverable in my Bluetooth list on my iPad Air.  How can I block her Bluetooth device? How can I prevent her pairing with my device?  I need Bluetooth to stream music on my Bose system.  Thanks!

    If your device is discoverable, the other BT device would try (I am not sure if that would be successful). If it was, it would appear in your system preferences>Bluetooth.
    Take a look at this re: security:
    http://support.apple.com/kb/PH10786
    This is from another Apple article:
    Use Bluetooth
    You can wirelessly transfer files between computers—even Mac to PC—using the Bluetooth File Exchange utility. You can even browse selected devices and retrieve files remotely. For extra security, you can stipulate that only trusted devices be allowed to connect to your Mac, and 128-bit over-the-air encryption is also available
    Barry
    P.S. Since I have not had the issue, I have not researched this before. Thank you for making me look into BT security
    Message was edited by: Barry Hemphill

  • How can I use Microsoft Access on my Mac?

    How can I use Microsoft Access on my Mac Pro?

    Welcome to Apple Support Communities
    Microsoft Access isn't available for OS X, so you can't use it. If you need it, you have to install Windows on a virtual machine.
    On a virtual machine, you can install the Windows version you most like and the Access version you need, so you won't have any problem using it. You just need a full Windows version with its DVD or ISO image and product key, and an application like Parallels, VMware Fusion or VirtualBox to create the virtual machine. If you want to save money, System Builder versions are cheaper and you can find them at Amazon or NewEgg.
    As you have a Mac Pro, I suppose you won't have any problem using a 64-bit version, but it's important you have enough memory. Open  > About this Mac, and check how much memory you have. I recommend 4 or 8 GB of memory at least.
    After installing Windows on the virtual machine, you will be able to install Access there.
    There are applications for OS X that allow you to run Windows applications without having to install Windows. Those apps often fail, so I don't recommend you to use them

  • How can I block all other mail account just to only use the exchange mailbox of our company? This is to prevent the user to setup his on company iPhone.

    How can I block all other mail account just to only use the exchange mailbox of our company? This is to prevent the user to setup his on company iPhone.

    I don't know if I'm asking this all in a way that can be understood? Thanks ED3K, however that part I do understand (in the link you provided!)
    What I need to know is "how" I can separate or rather create another Apple ID for my son-who is currently using "my Apple ID?" If there is a way to let him keep "all" his info on his phone (eg-contacts, music, app's, etc.) without doing a "reset?') Somehow I need to go into his phone's setting-create a new Apple ID and possibly a new password so he can still use our combined iCloud & Itunes account?
    Also then letting me take back my Apple ID & password, but again allowing us (my son and I) to use the same iCloud & Itunes account? Does that make more sense??? I'm sincerely trying to get this cleared up once and for all----just need guidance from someone who has a true understanding of the whole Apple iCloud/Itunes system!
    Thanks again for "anyone" that can help me!!!

  • How can you 'block' your Iphone, if somebody stole it? so that they can not mess with your social network accounts or anything alike?

    Yesterday night, somebody stole my Iphone.
    Now I'm trying to safe my privacy and everything trough itunes. But how can I 'block' the Iphone, so the thief won't be able to access my phone, or at least not my apps and stuff? is there anyway, -besides trying the impossible and getting it back- I can do??
    I'd really apprecciate any tipp and help at this one!!!

    What To Do If Your iDevice or Computer Is Lost Or Stolen
    iPhone, iPod Touch, and iPad
    If you activated Find My Phone before it was lost or stolen, you can track it only if Wi-Fi is enabled on the device. What you cannot do is track your device using a serial number or other identifying number. You cannot expect Apple or anyone else to find your device for you. You cannot recover your loss unless you insure your device for such loss. It is not covered by your warranty.
    If your iPhone, iPod, iPod Touch, or iPad is lost or stolen what do you do? There are things you should have done in advance - before you lost it or it was stolen - and some things to do after the fact. Here are some suggestions:
    This link, Re: Help! I misplaced / lost my iPhone 5 today morning in delta Chelsea hotel downtown an I am not able to track it. Please help!, has some good advice regarding your options when your iDevice is lost or stolen.
      1. Reporting a lost or stolen Apple product
      2. Find my lost iPod Touch
      3. AT&T. Sprint, and Verizon can block stolen phones/tablets
      4. What-To-Do-When-Iphone-Is-Stolen
      5. iCloud- Use Lost Mode
      6. What to do if your iOS device is lost or stolen
      7. 6 Ways to Track and Recover Your Lost/Stolen iPhone
      8. Find My iPhone
      9. Report Stolen iPad | Stolen Lost Found Online
    It pays to be proactive by following the advice on using Find My Phone before you lose your device:
      1. Find My iPhone
      2. Setup your iDevice on iCloud
      3. OS X Lion/Mountain Lion- About Find My Mac
      4. How To Set Up Free Find Your iPhone (Even on Unsupported Devices)
    Mac Computer
           Find My Mac can be used from Find My Phone at iCloud.com and via Find
           My Phone on your iDevice.
          The following is third-party anti-theft software:
               1.  STEM 2.1
               2.  MacPhoneHome 3.5
               3.  MacTrack 7.5.0
               4.  VUWER 1.7
               5.  Sneaky Bastar* 0.2.0
               6.  Undercover 5.1.1
               7.  LoJack for Laptops
               8. Hidden 2.0
               9. Prey 0.6.2

  • How can I use MS Access in Lab View

    how can I use MS Access in Lab View
    Its urgent

    There are a couple of routes you can take to communicate with MS Access in LabVIEW. The preferred method is our Database Connectivity Toolset. This allows you to use VIs to communicate with your database. Here is a link to the product for more information.
    http://sine.ni.com/apps/we/nioc.vp?cid=6429〈=US
    Your other choice would be to use ActiveX. I believe there are a couple of examples on our web site using it. Overall you will probably spend a lot more time taking this route.
    Matt Kisler
    Applications Engineer
    National Instruments

  • Hi ,my name is napoleon from Australia ,just want to know like I went for holiday in the philippines and someone stole my iPhone 4S,how can I blocked that phone so that no one can use it?

    Hi my name is Napoleon and I just know what will happen to my iPhone 4S ,I went for a holiday in the Philippines las 2 weeks ago and some stole my iPhone 4S, how can I block the phone so that no one can use it?

    You can't block it from use worldwide. Some carriers will block phones reported as stolen. I hope you had a passcode on it and that you had set the option to erase the phone after 10 failed tries. If you didn't change every password on every account ever accessed from the iPhone. And cancel any credit cards that you have used from the iPhone.

Maybe you are looking for

  • SAP ERP 2005 SR 2 IDES installation error in step "Run ABAP Reports"

    Hello, I'm installing SAP ERP 2005 SR 2 IDES on Win2003 R2 SP2 and Oracle 10.2 to create a test-system for my diploma thesis. During the step "Import ABAP" I got the following message: object_checker.log ERROR: 2008-05-21 20:50:38 1 objects have erro

  • Triple monitor Card for CS5.5?

    I am looking to expand my desktop from 2 monitors to three but still get the plusses of CUDA and hardware acceleration. Does anyone know what options I have? I have a Matrox MXO2 mini on the system for HDMI output to am HD flatscreen, but would dearl

  • Calculate stall time during HTTPNetStream.seek()

    Hi, I am trying to calculate the time taken for a HDS stream to seek from point A to B. So far I have been calculating it using org.osmf.events::MediaPlayerStateChangeEvent, the state changes to buffering as soon as seek commences and changes to play

  • My iTunes plays a song for 5 seconds then skips to the next track.  what the ****?

    i recently moved my itunes library from  my imac to im new Macbook pro.  now when i play back in itunes (v10.6.1) random artists only play back like 5 seconds of a song before going to the next track.  what happen?

  • Gracenote isn't naming the tracks on a CD I want to import

    Every time I try to import a CD, Gracenote doesn't name the tracks. I've tried several CD's and tried importing the same CD on a friends computer and it worked fine. I've checked all the settings in Itunes I know to check here's a list of what I've a