Set Up Mail Proxy Server on Debian/Ubuntu/CentOS/RockyLinux

In previous tutorials, we discussed how to set up a mail server from scratch on Linux (Ubuntu version, CentOS/RHEL version), and how to use iRedMail or Modoboa to quickly set up your own mail server without having to manually configure each component of the mail server stack. This tutorial is going to show you how to set up mail proxy server.

When Do You Need Mail Proxy Server?

Some folks run email servers at home, but may have the following problems:

  • Port 25 is blocked, so the mail server can’t send emails directly to recipients.
  • They don’t have a static IP address, so emails are likely to be rejected or land in the spam folder.
  • They can’t create PTR record, so emails are likely to be rejected or land in the spam folder.

If you are in this situation, you can run a VPS (Virtual Private Server) at a data center and use it as a proxy for your mail server. The VPS has a static IP address and you can create PTR record for the IP address. Other email servers would think that the VPS runs your mail service and when you send an email, they would think the email comes from your VPS.

Set Up Mail Proxy Server

Yes, you can also use SMTP relay services such as Sendinblue to solve these problems, but there’s a limit on how many emails you can send each day and each month. If you upgrade to a paid account with Sendinblue, it costs at least $25 each month. The more emails you send, the higher your monthly cost will be. If you run a VPS and set up mail proxy, it costs about $4 per month no matter how many emails you are going to send.

The mail proxy server is very simple. We just need to set up a VPN tunnel between the mail server and the VPS, then configure port forwarding on the VPS. Previously I also wrote about setting up SMTP and IMAP proxy with HAProxy. HAProxy allows more flexible settings, but I think it’s too complicated for most users. So I’m writing this mail proxy server guide to make things easy.

Step 1: Choose the Right VPS for Mail Proxy

You need a VPS that

  • allows you to create PTR record
  • doesn’t block port 25
  • allows you to send unlimited emails without restrictions.

Not all VPS providers meet the above 3 requirements. For example, DigitalOcean blocks port 25 and it would not unblock port 25. Another problem is that big well-known hosting providers like DigitalOcean are abused by spammers. Often the server IP address is on several blacklists.

I run my mail servers on ScalaHosting and Kamatera VPS. I always recommend them when setting up a mail server. For a mail proxy that doesn’t require much CPU and RAM, you can choose Kamatera VPS. The 1 CPU, 1GB RAM plan costs only $4/month, and you will get one month for free. You can follow the tutorial below to create a Kamatera VPS.

You can choose any Linux distro for your VPS, but I recommend you to use Debian, Ubuntu, or RockyLinux/AlmaLinux.

To log into your server, you use an SSH client. If you are using Linux or macOS on your computer, then simply open up a terminal window and run the following command to log into your server. Replace with the IP address of your VPS.

ssh [email protected]

You will be asked to enter the password. If you are using Windows, please read the following article on how to use SSH client.

Step 2: Set Up VPN Server on Your VPS

You need to set up a VPN server on your VPS, so your VPS will be able to communicate with your mail server without being interrupted due to the change of IP address. The VPN server can also help you bypass port 25 blocking.

You can set up WireGuard VPN on your VPS by following one of the tutorials below. Why do I choose WireGuard instead of other VPN protocols like OpenVPN? Because WireGuard allows you to assign static private IP addresses to VPN clients.

When following the instructions in the above articles, your VPS is the VPN server and your mail server is the VPN client. Please note that you should not enable split tunneling or policy routing on the VPN client.

The VPS will become the default gateway for your mail server and all outbound traffic on your mail server will be tunneled through VPN, so receiving SMTP servers (Gmail, Hotmail, Yahoo Mail, etc) will think your emails come from the VPS.

Step 3: Open Ports in Firewall

The VPS needs to open TCP port 22, 25, 587, 465, 143, 993, 110, 995, 80 and 443 in the firewall. Run the following commands to open these ports.


sudo apt install ufw 

sudo ufw allow 22,25,587,465,143,993,110,995,80,443/tcp

sudo ufw enable

CentOS/Rocky Linux/Alma Linux

sudo firewall-cmd --permanent --add-service={ssh,smtp,smtp-submission,smtps,imap,imaps,pop3,pop3s,http,https}

sudo systemctl reload firewalld

The mail server needs to open the above ports, except the SSH port. Run the following command.


sudo ufw insert 1 allow in from

sudo ufw allow 25,587,465,143,993,110,995,80,443/tcp

sudo systemctl restart ufw

CentOS/Rocky Linux/Alma Linux

sudo firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="" accept'

sudo firewall-cmd --permanent --add-service={ssh,smtp,smtp-submission,smtps,imap,imaps,pop3,pop3s,http,https}
sudo systemctl reload firewalld is the private IP range created by the VPN server, so the VPS can access all ports on the mail server.

Hint: If you use iRedMail’s built-in firewall, you need to disable it with the following command.

sudo systemctl disable --now iptables iptables-persistent

Step 4: Set Up Port Forwarding in Firewall

Now we need to set up port forwarding on the VPS, so incoming requests will be redirected from the VPS to the mail server. The following ports should be forwarded to the mail server.

  • TCP 25
  • TCP 587
  • TCP 465
  • TCP 143
  • TCP 993
  • TCP 110
  • TCP 995
  • TCP 80
  • TCP 443


Edit the /etc/ufw/before.rules file on the VPS.

sudo nano /etc/ufw/before.rules

Then add the following lines in the NAT table, above the COMMIT line. This tells UFW to use the DNAT target to forward requests to the host in the virtual private network. Replace with your VPS public IP address. is the mail server private IP address.

# Port Forwarding
-A PREROUTING -i enp3s0 -d -p tcp --dport 25 -j DNAT --to-destination
-A PREROUTING -i enp3s0 -d -p tcp --dport 587 -j DNAT --to-destination
-A PREROUTING -i enp3s0 -d -p tcp --dport 465 -j DNAT --to-destination 
-A PREROUTING -i enp3s0 -d -p tcp --dport 143 -j DNAT --to-destination
-A PREROUTING -i enp3s0 -d -p tcp --dport 993 -j DNAT --to-destination 
-A PREROUTING -i enp3s0 -d -p tcp --dport 110 -j DNAT --to-destination
-A PREROUTING -i enp3s0 -d -p tcp --dport 995 -j DNAT --to-destination
-A PREROUTING -i enp3s0 -d  -p tcp --dport 80 -j DNAT --to-destination
-A PREROUTING -i enp3s0 -d  -p tcp --dport 443 -j DNAT --to-destination

enp3s0 is the main network interface on my VPS. Yours might be different. You can run the following command to check.

ip addr
ufw port forwarding mail proxy

Hint: DNAT (Destination NAT) changes the destination IP address. A typical example is port forwarding. SNAT (Source NAT) changes the source IP address. A typical example is when a host behind a Wifi router wants to browse the Internet.

Flush the NAT table rules.

sudo iptables -F -t nat

Restart UFW to process all of the NAT rules.

sudo systemctl restart ufw

Now list all rules in the nat table.

sudo iptables -L -t nat

Sample output:

target     prot opt source               destination         
DNAT       tcp  --  anywhere     tcp dpt:smtp to:
DNAT       tcp  --  anywhere     tcp dpt:submission to:
DNAT       tcp  --  anywhere     tcp dpt:submissions to:
DNAT       tcp  --  anywhere     tcp dpt:imap2 to:
DNAT       tcp  --  anywhere     tcp dpt:imaps to:
DNAT       tcp  --  anywhere     tcp dpt:pop3 to:
DNAT       tcp  --  anywhere     tcp dpt:pop3s to:
DNAT       tcp  --  anywhere     tcp dpt:http to:
DNAT       tcp  --  anywhere     tcp dpt:https to:

Chain INPUT (policy ACCEPT)
target     prot opt source               destination         

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination         

target     prot opt source               destination         
MASQUERADE  all  --          anywhere

Note that the mail server must use the VPN server as the gateway. If it’s using another IP address as the gateway, port forwarding won’t work. So you should not configure split tunneling or policy routing in WireGuard VPN.

CentOS/Rocky Linux/Alma Linux

Run the following commands on the VPS. is the mail server private IP address.

sudo firewall-cmd --permanent --add-forward-port=port=25:proto=tcp:toport=25:toaddr=
sudo firewall-cmd --permanent --add-forward-port=port=587:proto=tcp:toport=587:toaddr=
sudo firewall-cmd --permanent --add-forward-port=port=465:proto=tcp:toport=465:toaddr=
sudo firewall-cmd --permanent --add-forward-port=port=143:proto=tcp:toport=143:toaddr=
sudo firewall-cmd --permanent --add-forward-port=port=993:proto=tcp:toport=993:toaddr=
sudo firewall-cmd --permanent --add-forward-port=port=110:proto=tcp:toport=110:toaddr=
sudo firewall-cmd --permanent --add-forward-port=port=995:proto=tcp:toport=995:toaddr=
sudo firewall-cmd --permanent --add-forward-port=port=80:proto=tcp:toport=80:toaddr=
sudo firewall-cmd --permanent --add-forward-port=port=443:proto=tcp:toport=443:toaddr=

sudo systemctl reload firewalld

Step 5: Create DNS Record

A Record

The A record of your mail server needs to be changed to the VPS public IP address. If your mail server also hosts other web applications like NextCloud, make sure all other sub-domains (like be pointed to the VPS public IP address.

PTR Record

You should set a PTR record, aka reverse DNS record, for your VPS. Kamatera doesn’t allow you to edit PTR record in the control panel. Instead, you need to open a support ticket and tell them to add PTR record for you. It’s not convenient, you might think, but this is to keep spammers away from the platform, so legitimate email senders like us will have a great IP reputation. Tell the support team to update the PTR record of your server IP address to

Hint: Kamatera might require you to run a website on their server in order to add the PTR record for you. If you have a website on their infrastructure, then you will be fine. If your website is hosted somewhere else, don’t panic. From my own experience and feedback from many other users, as long as you have a website and it looks legitimate (not a template), they will add the PTR record for you.

They say you need to run a website on their infrastructure because they don’t want to deal with spammers. Actually, if you followed my instructions to the letter, then Kamatera support staff will see that the A record points to the Kamatera VPS, so they will think your website is hosted on their infrastructure. In reality, all traffic is forwarded from the Kamatera VPS to the mail server.

Just tell them what your website URL is and they shall add a PTR record. Don’t provide extra information that’s not requested by them.

  • Don’t say where your website is hosted.
  • Don’t say what domain registrar you are using.
  • Don’t tell them what I tell you.

Step 6: Test

Now you can test if you can send and receive emails.

How to Bypass Email Blacklists

Your outgoing emails might be rejected due to IP address blacklisting. Even if you don’t send spam, sometimes your email server IP address can be blacklisted for reasons out of your control. Follow the tutorial below to learn how to get around blacklists.


I hope this tutorial helped you set up mail proxy server. As always, if you found this post useful, then subscribe to our free newsletter to get more tips and tricks. Take care 🙂

Rate this tutorial
[Total: 0 Average: 0]

Leave a Comment

  • Comments with links are moderated by admin before published.
  • Your email address will not be published.
  • Use <pre> ... </pre> HTML tag to quote the output from your terminal/console.
  • Please use the community ( for questions unrelated to this article.
  • I don't have time to answer every question. Making a donation would incentivize me to spend more time answering questions.

The maximum upload file size: 2 MB. You can upload: image. Links to YouTube, Facebook, Twitter and other services inserted in the comment text will be automatically embedded. Drop file here