Article ID: 113343, created on Feb 21, 2012, last review on May 10, 2014

  • Applies to:
  • Operations Automation

Additional information

This article describes how to manage allowed IP addresses for SpamAssassin Services.

1. Log on to the POA Management Node.

2. Go to the directory, where the SpamAssassin_ctl is placed.

Linux-based POA MN: /usr/local/pem/bin/

Windows-based POA MN: C:\Program Files\SWsoft\PEM\bin\ (x32 OS) or C:\Program Files (x86)\SWsoft\PEM\bin\ (x64 OS)

3. Perform the required operation.

To view the list of allowed IP addresses of the required SpamAssassin Service, execute the following command:

SpamAssassin_ctl service listips SPAMASSASSIN_SERVICE_ID

To add allowed IP addresses, execute the following command:

SpamAssassin_ctl service addips SPAMASSASSIN_SERVICE_ID ALLOWED_IP_01 ALLOWED_IP_02 ...

To add allowed IP addresses to all SpamAssassin Services, execute the following command:

SpamAssassin_ctl addips ALLOWED_IP_01 ALLOWED_IP_02 ...

To remove allowed IP addresses, execute the following command:

SpamAssassin_ctl service removeips SPAMASSASSIN_SERVICE_ID ALLOWED_IP_01 ALLOWED_IP_02 ...


4. Wait until SpamAssassin configuration tasks are executed.

5. Restart the appropriate SpamAssassin Service(s) using the following command on the SpamAssassin Service host(s):

service spamassassin restart

Note: The SPAMASSASSIN_SERVICE_ID can be obtained in POA Provider Control Panel: select the required SpamAssassin Service host and go to the Applications tab.

Important: You must reconfigure your firewall if lists of allowed IP addresses are modified. For each affected SpamAssassin Service: if an IP address is added to the list of allowed IP addresses, allow connections from the IP address to the SpamAssassin Service host's BackNet IP address to the TCP ports 783, 784; if an IP address is removed from the list of allowed IP addresses, deny connections from the IP address to the SpamAssassin Service host's BackNet IP address to the TCP ports 783, 784;

5356b422f65bdad1c3e9edca5d74a1ae caea8340e2d186a540518d08602aa065 e12cea1d47a3125d335d68e6d4e15e07

Email subscription for changes to this article
Save as PDF