MX records and adding them

Explore discuss data innovations to drive business efficiency forward.
Post Reply
Reddi2
Posts: 305
Joined: Sat Dec 28, 2024 8:50 am

MX records and adding them

Post by Reddi2 »

MX lines are responsible for redirecting to servers that will process emails.

There may be several such lines. For example, MX records of the corporate mail server and MX records of the email distribution service ( RuSender servers ).

Open the resource record editor and add a new record of the "MX" type. Copy the parameters from those offered in your corporate mail service.
If the TTL field is present, you can specify a value of 21600.

Instead of the @ sign, you can enter a fully qualified domain name or leave the field blank.

3. SPF records and their addition
SPF lines are responsible for setting up trusted mail servers philippines phone number data and the rules for processing emails from them. The syntax of these records can be quite complex, since here you can specify from which subnets to accept email, how to work with redirects, with erroneously sent emails, etc.

In reality, data on SPF settings is entered using classic TXT records.

The remaining parameters, if required for adding, will be the same as for MX records (domain - @, TTL - 21600).

If you need to connect sending from an SMTP server and a mailing service in parallel, the SPF record will look more complicated:

Mai.ru (VK Workmail) + SMTP on a fixed IPv4 address (123-456-789-112) + mailings via Rusender:

v=spf1 ip4: 123-456-789-112 include:_spf.mail.ru include:msndr.net ~all
One domain can have only one SPF record.

That is why, for simplicity of SPF setup separately for mailings, all the corresponding resource records are moved to the subdomain service .your.domain. It turns out that the subdomain can have its own SPF line.

4. DKIM signatures and their addition
DKIM is the most effective protection against spam. In fact, it is the open part of the key on which the digital signature of the email is encrypted. There is also a closed key storage, which is accessed by trusted nodes of the mail system (mail servers and mail clients). The final recipient or their mail client that accepts the letter can check the digital signature. If the signature is correct, then the sender can be trusted.
Post Reply