[ < ] [ > ]   [ << ] [ Up ] [ >> ]         [Top] [Contents] [Index] [ ? ]

A. : * -- A

Jump to:   "   $   *   +   -   .   /   8   @   _  
A   B   C   D   E   F   G   H   I   J   K   L   M   N   O   P   Q   R   S   T   U   V   W   X   Z  
Index Entry Section

*
*@ with single-key lookup9.6 Default values in single-key lookups
*@ with single-key lookup10.18 Address lists

+
`+caseful'10.19 Case of letters in address lists
`+caseful'11.7 Expansion conditions
`+defer_unknown'39.21 Using DNS lists
`+exclude_unknown'39.21 Using DNS lists
`+ignore_unknown'10.14 Behaviour when an IP address or name cannot be found
`+include_unknown'10.14 Behaviour when an IP address or name cannot be found
`+include_unknown'39.21 Using DNS lists

-
-be option11.3 Testing string expansions
-be option51.2 Root privilege
-bf option51.2 Root privilege
-bF option51.2 Root privilege
-bh option39.17 ACL modifiers
-bh option51.2 Root privilege
-bi option14.23 Alphabetical list of main options
-bp option14.23 Alphabetical list of main options
-bt option15. Generic options for routers
-bv option15. Generic options for routers
-bv option51.2 Root privilege
-C option51.2 Root privilege
-D option51.2 Root privilege
-f option5.3 Command line options
-f option5.3 Command line options
-f option5.3 Command line options
-f option51.7 Privileged users
-M option14.23 Alphabetical list of main options
-M option51.7 Privileged users
-os option14.23 Alphabetical list of main options
-q option14.23 Alphabetical list of main options
-q option51.7 Privileged users
-R option14.23 Alphabetical list of main options
-t option14.23 Alphabetical list of main options

.
.ifdef6.9 Conditional skips in the configuration file
.include in configuration file6.3 File inclusions in the configuration file
.include_if_exists in configuration file6.3 File inclusions in the configuration file

/
`/dev/null'22.6 Special items in redirection lists
`/etc/aliases'4.14 Installing Exim binaries and scripts
`/etc/mail/mailer.conf'4.18 Replacing another MTA with Exim
`/etc/passwd'9.4 Query-style lookup types
`/etc/passwd'14.23 Alphabetical list of main options
`/etc/passwd'15. Generic options for routers
`/etc/userdbshadow.dat'9.3 Single-key lookup types

8
8-bit characters5.3 Command line options
8-bit characters14.23 Alphabetical list of main options
8-bit characters14.23 Alphabetical list of main options
8BITMIME14.23 Alphabetical list of main options

@
@ in a domain list7.1 Main configuration settings
@ in a domain list10.8 Domain lists
@ in a host list10.11 Host list patterns that match by IP address
@@ with single-key lookup10.18 Address lists
@[] in a domain list10.8 Domain lists
@[] in a host list10.11 Host list patterns that match by IP address
@mx_any10.8 Domain lists
@mx_primary10.8 Domain lists
@mx_secondary10.8 Domain lists

_
_exim_monitor/EDITME_4.4 Pre-building configuration
_exim_monitor/EDITME_50. The Exim monitor

A
abandoning mail5.3 Command line options
abandoning mail22.6 Special items in redirection lists
accept39.14 ACL verbs
accept router16. The accept router
access control lists (ACLs)3.2 Policy control
access control lists (ACLs)7.2 ACL configuration
access control lists (ACLs)14.23 Alphabetical list of main options
access control lists (ACLs)14.23 Alphabetical list of main options
access control lists (ACLs)14.23 Alphabetical list of main options
access control lists (ACLs)14.23 Alphabetical list of main options
access control lists (ACLs)31.2 When does rewriting happen?
access control lists (ACLs)39. Access control lists
access control lists (ACLs)39.2 Specifying when ACLs are used
access control lists (ACLs)39.8 Finding an ACL to use
access control lists (ACLs)39.9 ACL return codes
access control lists (ACLs)39.10 Unset ACL options
access control lists (ACLs)39.11 Data for message ACLs
access control lists (ACLs)39.12 Data for non-message ACLs
access control lists (ACLs)39.13 Format of an ACL
access control lists (ACLs)39.13 Format of an ACL
access control lists (ACLs)39.15 ACL variables
access control lists (ACLs)39.16 Condition and modifier processing
access control lists (ACLs)39.16 Condition and modifier processing
access control lists (ACLs)39.17 ACL modifiers
access control lists (ACLs)39.18 Use of the control modifier
access control lists (ACLs)39.20 ACL conditions
access control lists (ACLs)39.20 ACL conditions
access control lists (ACLs)39.20 ACL conditions
access control lists (ACLs)39.20 ACL conditions
access control lists (ACLs)39.20 ACL conditions
access control lists (ACLs)39.20 ACL conditions
access control lists (ACLs)39.20 ACL conditions
access control lists (ACLs)39.20 ACL conditions
access control lists (ACLs)39.20 ACL conditions
access control lists (ACLs)39.20 ACL conditions
access control lists (ACLs)39.20 ACL conditions
access control lists (ACLs)39.20 ACL conditions
access control lists (ACLs)39.20 ACL conditions
access control lists (ACLs)39.20 ACL conditions
access control lists (ACLs)39.20 ACL conditions
access control lists (ACLs)39.20 ACL conditions
access control lists (ACLs)39.20 ACL conditions
access control lists (ACLs)39.20 ACL conditions
access control lists (ACLs)39.20 ACL conditions
access control lists (ACLs)39.20 ACL conditions
access control lists (ACLs)39.20 ACL conditions
access control lists (ACLs)39.20 ACL conditions
access control lists (ACLs)39.20 ACL conditions
access control lists (ACLs)39.20 ACL conditions
access control lists (ACLs)39.20 ACL conditions
access control lists (ACLs)39.20 ACL conditions
access control lists (ACLs)39.20 ACL conditions
access control lists (ACLs)39.21 Using DNS lists
access control lists (ACLs)39.39 Using an ACL to control relaying
acl39.20 ACL conditions
acl_not_smtp_mime40.4 Scanning MIME parts
acl_smtp_mime40.4 Scanning MIME parts
adding drivers53. Adding new drivers or lookup types
additional groups15. Generic options for routers
additional groups24. Generic options for transports
address1. Introduction
address1.9 Limitations
address5.3 Command line options
address5.3 Command line options
address5.3 Command line options
address11.6 Expansion operators
address14.23 Alphabetical list of main options
address14.23 Alphabetical list of main options
address15. Generic options for routers
address17.2 Private options for dnslookup
address20.1 Private options for manualroute
address43.3 Unqualified addresses
address43.18 Constructed addresses
address duplicate3.11 Duplicate addresses
address duplicate22.7 Duplicate addresses
address list10.18 Address lists
address list10.18 Address lists
address list10.18 Address lists
address list10.18 Address lists
address list10.18 Address lists
address list10.18 Address lists
address list10.18 Address lists
address list10.19 Case of letters in address lists
address list11.7 Expansion conditions
address list31.5 Rewriting patterns
address qualification5.3 Command line options
address redirection22. The redirect router
address redirection22.2 Forward files and address verification
address redirection22.4 Items in a non-filter redirection list
address redirection22.5 Redirecting to a local mailbox
address redirection22.5 Redirecting to a local mailbox
address redirection22.6 Special items in redirection lists
address redirection22.6 Special items in redirection lists
address redirection22.6 Special items in redirection lists
address redirection22.6 Special items in redirection lists
address redirection22.8 Repeated redirection expansion
address redirection22.9 Errors in redirection lists
address redirection22.10 Private options for the redirect router
address redirection22.10 Private options for the redirect router
address redirection22.10 Private options for the redirect router
address redirection22.10 Private options for the redirect router
address redirection39.36 Redirection while verifying
admin user5.2 Trusted and admin users
admin user14.23 Alphabetical list of main options
admin user50.1 Running the monitor
admin user51.7 Privileged users
alias file5.1 Setting options by program name
alias file5.3 Command line options
alias file9.6 Default values in single-key lookups
alias file22. The redirect router
alias file22.5 Redirecting to a local mailbox
alias file22.6 Special items in redirection lists
alias file22.10 Private options for the redirect router
alias file22.10 Private options for the redirect router
alias file22.10 Private options for the redirect router
alias for host10.13 Host list patterns that match by host name
alternate configuration file5.3 Command line options
angle brackets14.23 Alphabetical list of main options
appendfile transport26. The appendfile transport
appending to a file26.3 Operational details for appending
asterisk9.7 Partial matching in single-key lookups
asterisk10.8 Domain lists
asterisk10.8 Domain lists
asterisk10.10 Special host list patterns
asterisk10.13 Host list patterns that match by host name
asterisk10.18 Address lists
asterisk44.1 Outgoing SMTP and LMTP over TCP/IP
asterisk48.7 Logging deliveries
Athena2. Incorporated code
AUTH6.2 Configuration file format
AUTH7.7 Authenticators configuration
AUTH11.7 Expansion conditions
AUTH11.9 Expansion variables
AUTH14.23 Alphabetical list of main options
AUTH14.23 Alphabetical list of main options
AUTH14.23 Alphabetical list of main options
AUTH14.23 Alphabetical list of main options
AUTH14.23 Alphabetical list of main options
AUTH33. SMTP authentication
AUTH33.2 The AUTH parameter on MAIL commands
AUTH33.4 Testing server authentication
AUTH33.5 Authentication by an Exim client
AUTH34.1 Using plaintext in a server
AUTH39.2 Specifying when ACLs are used
AUTH48.6 Logging message reception
authenticated39.20 ACL conditions
authentication11.9 Expansion variables
authentication11.9 Expansion variables
authentication11.9 Expansion variables
authentication14.23 Alphabetical list of main options
authentication14.23 Alphabetical list of main options
authentication30.3 Private options for smtp
authentication30.3 Private options for smtp
authentication33. SMTP authentication
authentication33.1 Generic options for authenticators
authentication33.2 The AUTH parameter on MAIL commands
authentication33.3 Authentication on an Exim server
authentication33.4 Testing server authentication
authentication33.5 Authentication by an Exim client
authentication34.2 The PLAIN authentication mechanism
authentication34.3 The LOGIN authentication mechanism
authentication35. The cram_md5 authenticator
authentication37. The spa authenticator
authentication37. The spa authenticator
authentication39.20 ACL conditions
authentication48.6 Logging message reception
authentication id5.3 Command line options
authentication name5.3 Command line options
authentication sender5.3 Command line options
authenticators34. The plaintext authenticator
authenticators35. The cram_md5 authenticator
authenticators36. The cyrus_sasl authenticator
authenticators37. The spa authenticator
autoreply transport14.23 Alphabetical list of main options
autoreply transport27. The autoreply transport
av_scanner40.1 Scanning for viruses

Jump to:   "   $   *   +   -   .   /   8   @   _  
A   B   C   D   E   F   G   H   I   J   K   L   M   N   O   P   Q   R   S   T   U   V   W   X   Z  

[ << ] [ >> ]           [Top] [Contents] [Index] [ ? ]

This document was generated on July, 10 2007 using texi2html 1.76.