This commit is contained in:
Zhang Huangbin 2015-12-30 23:42:21 +08:00
parent af5aa84409
commit 527cfe596a
4 changed files with 6 additions and 13 deletions

View File

@ -106,18 +106,17 @@ installer with below command instead of the original one (`bash iRedMail.sh`):
> `MYSQL_SERVER_ADDRESS`.
```
# MYSQL_SERVER_ADDRESS='192.168.1.100' MYSQL_SERVER_PORT='3306' MYSQL_ROOT_USER='admin_iredmail' MYSQL_GRANT_HOST='192.168.1.200' bash iRedMail.sh
# MYSQL_SERVER_ADDRESS='192.168.1.100' MYSQL_SERVER_PORT='3306' MYSQL_ROOT_USER='admin_iredmail' MYSQL_ROOT_PASSWD='admin_password' MYSQL_GRANT_HOST='192.168.1.200' bash iRedMail.sh
```
It will launch iRedMail installation wizard as usual. When it asks MySQL root
password, please input the password (`admin_password` in our case) we created
on remote MySQL server.
It will launch iRedMail installation wizard as usual.
Parameters we used in above command line:
* `MYSQL_SERVER_ADDRESS`: Remote MySQL server address.
* `MYSQL_SERVER_PORT`: Remote MySQL server port. Default is `3306`.
* `MYSQL_ROOT_USER`: MySQL user name we created on remote MySQL server before installing iRedMail.
* `MYSQL_ROOT_PASSWD`: MySQL password that we created on remote MySQL server before installing iRedMail.
* `MYSQL_GRANT_HOST`: Hostname or IP address of iRedMail server.
iRedMail will create new SQL users for applications like Postfix, Amavisd,

View File

@ -594,8 +594,6 @@ below line under `[Definition]` section:
Restarting Fail2ban service is required.
* Save your change and restart Postfix service.
### [OPTIONAL] Postfix: Remove one non-spam HELO identity in helo restriction
iRedMail ships a Postfix HELO rule file, `/etc/postfix/helo_access.pcre`, it

View File

@ -119,17 +119,16 @@ installer with below command instead of the original one (<code>bash iRedMail.sh
<code>MYSQL_SERVER_ADDRESS</code>.</li>
</ul>
</blockquote>
<pre><code># MYSQL_SERVER_ADDRESS='192.168.1.100' MYSQL_SERVER_PORT='3306' MYSQL_ROOT_USER='admin_iredmail' MYSQL_GRANT_HOST='192.168.1.200' bash iRedMail.sh
<pre><code># MYSQL_SERVER_ADDRESS='192.168.1.100' MYSQL_SERVER_PORT='3306' MYSQL_ROOT_USER='admin_iredmail' MYSQL_ROOT_PASSWD='admin_password' MYSQL_GRANT_HOST='192.168.1.200' bash iRedMail.sh
</code></pre>
<p>It will launch iRedMail installation wizard as usual. When it asks MySQL root
password, please input the password (<code>admin_password</code> in our case) we created
on remote MySQL server.</p>
<p>It will launch iRedMail installation wizard as usual.</p>
<p>Parameters we used in above command line:</p>
<ul>
<li><code>MYSQL_SERVER_ADDRESS</code>: Remote MySQL server address.</li>
<li><code>MYSQL_SERVER_PORT</code>: Remote MySQL server port. Default is <code>3306</code>.</li>
<li><code>MYSQL_ROOT_USER</code>: MySQL user name we created on remote MySQL server before installing iRedMail.</li>
<li><code>MYSQL_ROOT_PASSWD</code>: MySQL password that we created on remote MySQL server before installing iRedMail.</li>
<li><code>MYSQL_GRANT_HOST</code>: Hostname or IP address of iRedMail server.</li>
</ul>
<p>iRedMail will create new SQL users for applications like Postfix, Amavisd,

View File

@ -573,9 +573,6 @@ below line under <code>[Definition]</code> section:</p>
</code></pre>
<p>Restarting Fail2ban service is required.</p>
<ul>
<li>Save your change and restart Postfix service.</li>
</ul>
<h3 id="optional-postfix-remove-one-non-spam-helo-identity-in-helo-restriction">[OPTIONAL] Postfix: Remove one non-spam HELO identity in helo restriction</h3>
<p>iRedMail ships a Postfix HELO rule file, <code>/etc/postfix/helo_access.pcre</code>, it
contains some HELO identities which were treated as spammers by analizing