¡Únete a Nuestra Comunidad en Discord!

Haz clic en el botón de abajo para unirte a nuestra nueva comunidad de Discord.

Unirse a Discord
Proxmox Mail Gateway

Proxmox Mail Gateway

Email security gateway protecting against spam, viruses and email threats

Version 9.0 app 1-Click Install
Deploy Now
Proxmox Mail Gateway

Getting started

Proxmox Mail Gateway (PMG) is the leading open-source email security solution that helps you protect your mail server against all email threats including spam, viruses, trojans, and phishing attacks. It works as a mail proxy between your firewall and internal mail servers.

  1. Go to https://my.cubepath.com/deploy
  2. Select a VPS plan (recommended: gp.starter or higher)
  3. Under Operating System, choose "Proxmox Mail Gateway"
  4. Click Deploy

Once deployment is complete (approximately 10-15 minutes), access the web interface at https://YOUR-IP:8006 and use credentials root@pam with your VPS root password.

Deploy via CubePath Cloud API

Via CubeCLI

cubecli vps create \
  --name pmg-server \
  --plan gp.starter \
  --template "Proxmox Mail Gateway" \
  --location us-mia-1 \
  --project <project-id>

Via API

curl -X POST https://api.cubepath.com/vps \
  -H "Authorization: Bearer YOUR_API_TOKEN" \
  -H "Content-Type: application/json" \
  -d '{
    "name": "pmg-server",
    "plan": "gp.starter",
    "template": "Proxmox Mail Gateway",
    "location": "us-mia-1",
    "project_id": "YOUR_PROJECT_ID"
  }'

Technical information

Initial access:
- URL: https://YOUR-IP:8006
- User: root@pam
- Password: Your VPS root password

Operating system:
- Debian 13 (Trixie)

Installed software:
- Proxmox Mail Gateway 9.0
- ClamAV Antivirus Engine
- SpamAssassin
- Postfix MTA
- PostgreSQL Database
- Kernel 6.14.11
- ZFS 2.3.4

Ports used:
- 22: SSH
- 25: SMTP (incoming/outgoing mail)
- 8006: PMG web interface (HTTPS)

Main features:
- Multi-layered spam and virus protection
- ClamAV antivirus integration
- SpamAssassin spam filtering
- Greylisting and DNS-based blacklists
- Message tracking and quarantine management
- High Availability (HA) clustering support
- Multi-domain support with unlimited domains
- Full TLS/SSL encryption support
- LDAP and Active Directory integration
- Detailed statistics and reporting
- Web-based administration interface

File locations:
- Configuration: /etc/pmg/
- Logs: /var/log/pmg/
- Quarantine: /var/spool/pmg/

System requirements:
- Minimum RAM: 4 GB
- Recommended RAM: 8 GB or more (plan gp.starter or higher)
- Disk space: Minimum 20 GB
- Processor: 2+ cores recommended

Useful commands

# Check PMG services status
systemctl status pmg-api
systemctl status postfix
systemctl status clamav-daemon

# Restart PMG services
systemctl restart pmg-api
systemctl restart postfix

# View mail logs
journalctl -u postfix -f

# View PMG tracking logs
pmgsh tracking list

# Update PMG to latest version
apt update
apt upgrade proxmox-mailgateway

# Check mail queue
pmgsh queue list

# Flush quarantine
pmgsh quarantine flush

# Reload configuration
pmgsh reload

Initial configuration

After accessing the web interface:

  1. Configure mail relay:
  2. Navigate to Configuration > Mail Proxy > Relaying
  3. Add your internal mail server as a relay domain
  4. Configure relay settings for your mail infrastructure

  5. Set up spam filtering:

  6. Go to Configuration > Spam Detector
  7. Adjust spam score thresholds
  8. Configure whitelists and blacklists

  9. Configure antivirus:

  10. Navigate to Configuration > Antivirus
  11. Ensure ClamAV is enabled and updating regularly

  12. Set up user authentication:

  13. Go to Configuration > User Management
  14. Configure LDAP/AD integration if needed
  15. Set up user access to quarantine

  16. Configure email routing:

  17. Navigate to Configuration > Mail Proxy > Transports
  18. Define how emails should be routed to your internal mail servers

Links