- #Zimbra outlook client 553 how to#
- #Zimbra outlook client 553 software#
- #Zimbra outlook client 553 password#
In order to allow the emails with TLS enabled, disable the ESMTP inspection feature as shown in the next example. If you use Transport Layer Security (TLS) encryption for email communication, then the Extended Simple Mail Transfer Protocol (ESMTP) inspection feature (enabled by default) in the ASA drops the packets. !- SMTP/ESMTP to inspect the application. !- The inspect esmtp command (included in the map) allows Policy-map type inspect dns preset_dns_map Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute !- Hosts that access the mail server from the outsideĪccess-group outside_int in interface outside !- This Auto-NAT uses address translation. !- Inside hosts appear on the DMZ with their own addresses. !- This network static does not use address translation. !- IP address 172.16.31.10 for the SMTP port from outside.Īccess-list outside_int extended permit tcp any4 host 172.16.31.10 eq smtp !- This access list allows hosts to access Xlate per-session deny udp any6 any6 eq domain Xlate per-session deny udp any6 any4 eq domain Xlate per-session deny udp any4 any6 eq domain Xlate per-session deny udp any4 any4 eq domain
#Zimbra outlook client 553 password#
This is the ASA configuration for this example: show runĮnable password 8Ry2YjIyt7RRXU24 encrypted In order for the outside users to access the mail server, you must configure a static NAT and an access list, which is outside_int in this example, in order to permit the outside users to access the mail server and bind the access list to the outside interface. In order for the mail server to be accessed by the inside network, you must configure the identity Network Address Translation (NAT). The mail server with IP address 172.16.31.10 is located in the DMZ network. The network setup that is used in this example has the ASA with an inside network at 10.1.1.0/24 and an outside network at 203.0.113.0/24. They are RFC 1918 addresses that have been used in a lab environment. Note: The IP addressing schemes that are used in this document are not legally routable on the Internet. The configuration that is described in this section uses this network setup: Note: Use the Command Lookup Tool ( registered customers only) to obtain more information on the commands that are used in this section.
#Zimbra outlook client 553 how to#
This section describes how to configure the ASA in order to reach the mail server in the DMZ network, the inside network, or the outside network. Refer to the Cisco Technical Tips Conventions for more information on document conventions. If your network is live, make sure that you understand the potential impact of any command.
All of the devices used in this document started with a cleared (default) configuration. The information in this document was created from the devices in a specific lab environment.
#Zimbra outlook client 553 software#
Cisco 2800C Series Router with Cisco IOS ® Software Release 15.1(4)M6.Cisco ASA that runs software Version 9.1 or later.The information in this document is based on these software and hardware versions:
There are no specific requirements for this document. This document describes how to configure a Cisco Adaptive Security Appliance (ASA) for access to a Simple Mail Transfer Protocol (SMTP) server that is located in the Demilitarized Zone (DMZ), the inside network, or the outside network.