Step 1 – connect to your server, get root privileges and install this package.
apt-get install libgmp10 libperl5.18 unzip pax sysstat sqlite3 dnsmasq wget
Configure hostname and DNS Server
In this tutorial will use the ‘dnsmasq’ resolving nameserver to speedup DNS lookups in Zimbra. Dnsmask has been installed as prerequisite in the first chapter, so we just have to configure it now:
Step 1 – Edit hostname and hosts
change your hostname with this ‘mail.sendaljepit.local’.
add this line:
192.168.1.101 mail.sendaljepit.local mail
Step 2 – Edit dnsmasq configuration
server=192.168.1.101 domain=sendaljepit.local mx-host=sendaljepit.local, mail.sendaljepit.local, 5 mx-host=mail.sendaljepit.local, mail.sendaljepit.local, 5 listen-address=127.0.0.1
Step 3 – Reboot
Step 1 – Download Zimbra and extract it
wget https://files.zimbra.com/downloads/8.6.0_GA/zcs-8.6.0_GA_1153.UBUNTU14_64.20141215151116.tgz tar -xvf zcs-8.6.0_GA_1153.UBUNTU14_64.20141215151116.tgz cd zcs*
Step 2 – Run the Installer
At this step, zimbra will check the required packages and will ask you to agree to their installation and then choose the zimbra package :
here doesn`t need zimbra-dnscache, because in this tutorial use dnsmasq. You need to wait, because this installation takes some time. Next step is configure “zimbra-store” for getting admin password. See the picture:
Choose number “4” and enter. and then type your password:
Apply all Configuration:
and wait for Zimbra configuration finished.
to test your zimbra server is running, you can type a command :
su - zimbra zmcontrol status
try to access zimbra from web browser. https://192.168.1.101/ or try admin page ” https://192.168.1.101:7071/
Zimbra Server with DKIM Signing
Starting with Zimbra 8.0, the ability to add DKIM signing to outgoing mail is available. Signing is done at the domain level, including alias domains. Setting up signing consists of two steps:
- Running zmdkimkeyutil to generate the DKIM keys and selector. The generated data is stored in the LDAP server as part of the domain LDAP entry.
- Updating the DNS server with the public DNS entry
The zmdkimkeyutility should be run on an MTA server.
The zmdkimkeyutil utility
The zmdkimkeyutil script allows you to do the following:
- Add DKIM data to a domain that does not currently have DKIM enabled
- Update DKIM data for a domain that already has DKIM enabled
- Query the DKIM data for a domain
- Remove the DKIM data for a domain
The domain “example.com” will be used throughout this wiki. Substitute it with your domain.
Adding DKIM data to a domain with no existing DKIM configuration
/opt/zimbra/libexec/zmdkimkeyutil -a -d example.com
After the data is generated, the public DNS record data that must be added for the domain to your DNS server will be displayed:
email@example.com:~$ /opt/zimbra/libexec/zmdkimkeyutil -a -d example.com DKIM Data added to LDAP for domain example.com with selector 0E9F184A-9577-11E1-AD0E-2A2FBBAC6BCB Public key to enter into DNS: 0E9F184A-9577-11E1-AD0E-2A2FBBAC6BCB._domainkey IN TXT "v=DKIM1;=rsa; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDY5CBg15nZ2vYnRmrNub6Jn6ghQ2DXQbQgOJ/E5IGziUYEuE2OnxkBm1h3jived21uHjpNy0naOZjLj0xLyyjclVy1chrhSbsGAhe8HLXUsdXyfRvNTq8NWLsUnMEsoomtJCJ /6LYWYU1whOQ9oKZVAwWHSovAWZpByqNMZmFg7QIDAQAB" ; ----- DKIM 0E9F184A-9577-11E1-AD0E-2A2FBBAC6BCB for example.com
Testing DKIM and SPG settings:
Now you can quickly view your DomainKeys, DKIM, and SPF validitay, and SpamAssassin score in one place. Just send an email to any address @dkimvalidator.com. Better visit- http://dkimvalidator.com/